Analysis
-
max time kernel
47s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 08:49
Static task
static1
Behavioral task
behavioral1
Sample
3d2201ef729d8ebfc0a49b6bcbd1494f73d283cdf2c7df5a6b1ba0571793faa8.dll
Resource
win7-20220901-en
General
-
Target
3d2201ef729d8ebfc0a49b6bcbd1494f73d283cdf2c7df5a6b1ba0571793faa8.dll
-
Size
120KB
-
MD5
a262bd6d985aa4071d33213cb797229a
-
SHA1
08aa4c23b118a7723d79eba9748031eec974c010
-
SHA256
3d2201ef729d8ebfc0a49b6bcbd1494f73d283cdf2c7df5a6b1ba0571793faa8
-
SHA512
7efeb5a229950f28efcd33f2dc6cf5d2d2c8cd65117ad6e18995ad2c322462a49fd4274bf28bc6ffd8d4dd634da3660b0953d7d0124c041e99eb5cf9f3cf62e2
-
SSDEEP
1536:mErVQGRq8rajkeo2y08mbdQD6gYAplSPLreIUwZEkx0rzgdigYanuu:mEWGrrajMgbdQD2NZEU0rz+
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 6c1508.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 6c1508.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 6c1508.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6c1508.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 6c1508.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 6c1508.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 6c1508.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 6c1508.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 6c1508.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 6c1508.exe -
Executes dropped EXE 3 IoCs
pid Process 1188 6c1508.exe 1528 6c195b.exe 2032 6c37d3.exe -
resource yara_rule behavioral1/memory/1188-61-0x00000000005F0000-0x00000000016AA000-memory.dmp upx behavioral1/memory/1188-72-0x00000000005F0000-0x00000000016AA000-memory.dmp upx behavioral1/memory/1672-75-0x0000000000310000-0x0000000000322000-memory.dmp upx behavioral1/memory/1188-85-0x00000000005F0000-0x00000000016AA000-memory.dmp upx behavioral1/memory/1188-87-0x00000000005F0000-0x00000000016AA000-memory.dmp upx behavioral1/memory/1528-89-0x0000000000920000-0x00000000019DA000-memory.dmp upx -
Loads dropped DLL 6 IoCs
pid Process 1672 rundll32.exe 1672 rundll32.exe 1672 rundll32.exe 1672 rundll32.exe 1672 rundll32.exe 1672 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 6c1508.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 6c1508.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 6c1508.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 6c1508.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 6c1508.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 6c1508.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 6c1508.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6c1508.exe -
Enumerates connected drives 3 TTPs 8 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: 6c1508.exe File opened (read-only) \??\L: 6c1508.exe File opened (read-only) \??\E: 6c1508.exe File opened (read-only) \??\F: 6c1508.exe File opened (read-only) \??\G: 6c1508.exe File opened (read-only) \??\H: 6c1508.exe File opened (read-only) \??\I: 6c1508.exe File opened (read-only) \??\J: 6c1508.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\6c16fb 6c1508.exe File opened for modification C:\Windows\SYSTEM.INI 6c1508.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1188 6c1508.exe 1188 6c1508.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeDebugPrivilege 1188 6c1508.exe Token: SeDebugPrivilege 1188 6c1508.exe Token: SeDebugPrivilege 1188 6c1508.exe Token: SeDebugPrivilege 1188 6c1508.exe Token: SeDebugPrivilege 1188 6c1508.exe Token: SeDebugPrivilege 1188 6c1508.exe Token: SeDebugPrivilege 1188 6c1508.exe Token: SeDebugPrivilege 1188 6c1508.exe Token: SeDebugPrivilege 1188 6c1508.exe Token: SeDebugPrivilege 1188 6c1508.exe Token: SeDebugPrivilege 1188 6c1508.exe Token: SeDebugPrivilege 1188 6c1508.exe Token: SeDebugPrivilege 1188 6c1508.exe Token: SeDebugPrivilege 1188 6c1508.exe Token: SeDebugPrivilege 1188 6c1508.exe Token: SeDebugPrivilege 1188 6c1508.exe Token: SeDebugPrivilege 1188 6c1508.exe Token: SeDebugPrivilege 1188 6c1508.exe Token: SeDebugPrivilege 1188 6c1508.exe Token: SeDebugPrivilege 1188 6c1508.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1380 wrote to memory of 1672 1380 rundll32.exe 27 PID 1380 wrote to memory of 1672 1380 rundll32.exe 27 PID 1380 wrote to memory of 1672 1380 rundll32.exe 27 PID 1380 wrote to memory of 1672 1380 rundll32.exe 27 PID 1380 wrote to memory of 1672 1380 rundll32.exe 27 PID 1380 wrote to memory of 1672 1380 rundll32.exe 27 PID 1380 wrote to memory of 1672 1380 rundll32.exe 27 PID 1672 wrote to memory of 1188 1672 rundll32.exe 28 PID 1672 wrote to memory of 1188 1672 rundll32.exe 28 PID 1672 wrote to memory of 1188 1672 rundll32.exe 28 PID 1672 wrote to memory of 1188 1672 rundll32.exe 28 PID 1188 wrote to memory of 1076 1188 6c1508.exe 19 PID 1188 wrote to memory of 1144 1188 6c1508.exe 18 PID 1188 wrote to memory of 1212 1188 6c1508.exe 16 PID 1188 wrote to memory of 1380 1188 6c1508.exe 15 PID 1188 wrote to memory of 1672 1188 6c1508.exe 27 PID 1188 wrote to memory of 1672 1188 6c1508.exe 27 PID 1672 wrote to memory of 1528 1672 rundll32.exe 29 PID 1672 wrote to memory of 1528 1672 rundll32.exe 29 PID 1672 wrote to memory of 1528 1672 rundll32.exe 29 PID 1672 wrote to memory of 1528 1672 rundll32.exe 29 PID 1672 wrote to memory of 2032 1672 rundll32.exe 30 PID 1672 wrote to memory of 2032 1672 rundll32.exe 30 PID 1672 wrote to memory of 2032 1672 rundll32.exe 30 PID 1672 wrote to memory of 2032 1672 rundll32.exe 30 PID 1188 wrote to memory of 1076 1188 6c1508.exe 19 PID 1188 wrote to memory of 1144 1188 6c1508.exe 18 PID 1188 wrote to memory of 1212 1188 6c1508.exe 16 PID 1188 wrote to memory of 1528 1188 6c1508.exe 29 PID 1188 wrote to memory of 1528 1188 6c1508.exe 29 PID 1188 wrote to memory of 2032 1188 6c1508.exe 30 PID 1188 wrote to memory of 2032 1188 6c1508.exe 30 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6c1508.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3d2201ef729d8ebfc0a49b6bcbd1494f73d283cdf2c7df5a6b1ba0571793faa8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3d2201ef729d8ebfc0a49b6bcbd1494f73d283cdf2c7df5a6b1ba0571793faa8.dll,#12⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\6c1508.exeC:\Users\Admin\AppData\Local\Temp\6c1508.exe3⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1188
-
-
C:\Users\Admin\AppData\Local\Temp\6c195b.exeC:\Users\Admin\AppData\Local\Temp\6c195b.exe3⤵
- Executes dropped EXE
PID:1528
-
-
C:\Users\Admin\AppData\Local\Temp\6c37d3.exeC:\Users\Admin\AppData\Local\Temp\6c37d3.exe3⤵
- Executes dropped EXE
PID:2032
-
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1144
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1076
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD588acf78a32049d70c6eeec1677076304
SHA106da2ff9265a46440ea23745b2f16fdb3d4ca7e3
SHA2560e70c9a345823a550a165debc922e1263a4e83a794f53422483efceeb26627a4
SHA5124b841073a29050a3ae7b7205dc5ee598ab0b6731ab128d8a8e078873a73ccc89eb51f7c8e99e056774a90d09d7ae7690ad0cadf972633deff92927daa9c063e6
-
Filesize
97KB
MD588acf78a32049d70c6eeec1677076304
SHA106da2ff9265a46440ea23745b2f16fdb3d4ca7e3
SHA2560e70c9a345823a550a165debc922e1263a4e83a794f53422483efceeb26627a4
SHA5124b841073a29050a3ae7b7205dc5ee598ab0b6731ab128d8a8e078873a73ccc89eb51f7c8e99e056774a90d09d7ae7690ad0cadf972633deff92927daa9c063e6
-
Filesize
97KB
MD588acf78a32049d70c6eeec1677076304
SHA106da2ff9265a46440ea23745b2f16fdb3d4ca7e3
SHA2560e70c9a345823a550a165debc922e1263a4e83a794f53422483efceeb26627a4
SHA5124b841073a29050a3ae7b7205dc5ee598ab0b6731ab128d8a8e078873a73ccc89eb51f7c8e99e056774a90d09d7ae7690ad0cadf972633deff92927daa9c063e6
-
Filesize
97KB
MD588acf78a32049d70c6eeec1677076304
SHA106da2ff9265a46440ea23745b2f16fdb3d4ca7e3
SHA2560e70c9a345823a550a165debc922e1263a4e83a794f53422483efceeb26627a4
SHA5124b841073a29050a3ae7b7205dc5ee598ab0b6731ab128d8a8e078873a73ccc89eb51f7c8e99e056774a90d09d7ae7690ad0cadf972633deff92927daa9c063e6
-
Filesize
97KB
MD588acf78a32049d70c6eeec1677076304
SHA106da2ff9265a46440ea23745b2f16fdb3d4ca7e3
SHA2560e70c9a345823a550a165debc922e1263a4e83a794f53422483efceeb26627a4
SHA5124b841073a29050a3ae7b7205dc5ee598ab0b6731ab128d8a8e078873a73ccc89eb51f7c8e99e056774a90d09d7ae7690ad0cadf972633deff92927daa9c063e6
-
Filesize
97KB
MD588acf78a32049d70c6eeec1677076304
SHA106da2ff9265a46440ea23745b2f16fdb3d4ca7e3
SHA2560e70c9a345823a550a165debc922e1263a4e83a794f53422483efceeb26627a4
SHA5124b841073a29050a3ae7b7205dc5ee598ab0b6731ab128d8a8e078873a73ccc89eb51f7c8e99e056774a90d09d7ae7690ad0cadf972633deff92927daa9c063e6
-
Filesize
97KB
MD588acf78a32049d70c6eeec1677076304
SHA106da2ff9265a46440ea23745b2f16fdb3d4ca7e3
SHA2560e70c9a345823a550a165debc922e1263a4e83a794f53422483efceeb26627a4
SHA5124b841073a29050a3ae7b7205dc5ee598ab0b6731ab128d8a8e078873a73ccc89eb51f7c8e99e056774a90d09d7ae7690ad0cadf972633deff92927daa9c063e6
-
Filesize
97KB
MD588acf78a32049d70c6eeec1677076304
SHA106da2ff9265a46440ea23745b2f16fdb3d4ca7e3
SHA2560e70c9a345823a550a165debc922e1263a4e83a794f53422483efceeb26627a4
SHA5124b841073a29050a3ae7b7205dc5ee598ab0b6731ab128d8a8e078873a73ccc89eb51f7c8e99e056774a90d09d7ae7690ad0cadf972633deff92927daa9c063e6
-
Filesize
97KB
MD588acf78a32049d70c6eeec1677076304
SHA106da2ff9265a46440ea23745b2f16fdb3d4ca7e3
SHA2560e70c9a345823a550a165debc922e1263a4e83a794f53422483efceeb26627a4
SHA5124b841073a29050a3ae7b7205dc5ee598ab0b6731ab128d8a8e078873a73ccc89eb51f7c8e99e056774a90d09d7ae7690ad0cadf972633deff92927daa9c063e6