Analysis

  • max time kernel
    150s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    06/11/2022, 18:28

General

  • Target

    ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe

  • Size

    1.6MB

  • MD5

    073676f4808c9f4b936919fa40ff647d

  • SHA1

    c71d46f804b1a05da52a31576915f0c084efca23

  • SHA256

    ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd

  • SHA512

    cab98b867e550580cac44f053dc2a481b5d1194eb4467e82ed86a59b91ebd3a4fc9c02209d3cbc8c982b53e3c6675116cb1d8b4b4ee53ac55f09f7b276435546

  • SSDEEP

    49152:4p/5Ubd+WdBw4ptu63RnJB++++SM5D1JG1+0KM//M8++B+++++a+++x+Sg4+ItpL:Y/WdBw4ptu63RnJB++++SM5D1JG1+0Kn

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Signatures

  • Modifies firewall policy service 2 TTPs 3 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 12 IoCs
  • Windows security modification 2 TTPs 7 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 6 IoCs
  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
      PID:1332
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1368
        • C:\Users\Admin\AppData\Local\Temp\ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe
          "C:\Users\Admin\AppData\Local\Temp\ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe"
          2⤵
          • Loads dropped DLL
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2016
          • \??\c:\users\admin\appdata\local\temp\ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 
            c:\users\admin\appdata\local\temp\ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 
            3⤵
            • Modifies firewall policy service
            • UAC bypass
            • Windows security bypass
            • Executes dropped EXE
            • Windows security modification
            • Checks whether UAC is enabled
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:1168
            • C:\Windows\system32\mmc.exe
              "C:\Windows\system32\mmc.exe"
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:2000
          • C:\Windows\Resources\Themes\icsys.icn.exe
            C:\Windows\Resources\Themes\icsys.icn.exe
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:524
            • \??\c:\windows\resources\themes\explorer.exe
              c:\windows\resources\themes\explorer.exe
              4⤵
              • Modifies visiblity of hidden/system files in Explorer
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Drops file in System32 directory
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1520
              • \??\c:\windows\resources\spoolsv.exe
                c:\windows\resources\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in Windows directory
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:1488
                • \??\c:\windows\resources\svchost.exe
                  c:\windows\resources\svchost.exe
                  6⤵
                  • Modifies visiblity of hidden/system files in Explorer
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Adds Run key to start application
                  • Drops file in System32 directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: GetForegroundWindowSpam
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:1568
                  • \??\c:\windows\resources\spoolsv.exe
                    c:\windows\resources\spoolsv.exe PR
                    7⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1944
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 01:18 /f
                    7⤵
                    • Creates scheduled task(s)
                    PID:1016
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 01:19 /f
                    7⤵
                    • Creates scheduled task(s)
                    PID:828
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 01:20 /f
                    7⤵
                    • Creates scheduled task(s)
                    PID:764
              • C:\Windows\Explorer.exe
                C:\Windows\Explorer.exe
                5⤵
                  PID:288
        • C:\Windows\system32\taskhost.exe
          "taskhost.exe"
          1⤵
            PID:1244

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 

            Filesize

            1.4MB

            MD5

            fc5b377e6622849e59b86354f805f296

            SHA1

            e34a419d968d939c9c7910917d3599456e6c86f7

            SHA256

            070f27afc6522274eb3eb4f53159601bee1998ed5446d0b903efb4f3193de596

            SHA512

            120be2ad772e543e11ef1b4ef4e14b0170e20dad3dad46eac162c9a9d14aa1d2195609bf371c0c3a396a02a86612bc927a053840c8e2b1a2e68f8cb8fe9d03c6

          • C:\Windows\Resources\Themes\explorer.exe

            Filesize

            215KB

            MD5

            4ef5f790eb6a746616c65bcf0d9264d4

            SHA1

            f8210e718cafe04e89a23f53aee56855337893a5

            SHA256

            6967b95019981702a6d78b066999af717a19dbd5634e2ea444b674d67db1028c

            SHA512

            c6ccdf21eec3f8a968fa92ab0e55d3cc9ccb3a062a7ddd436624ebcfd3aeb7ed38ab2edd50a8564c5e335f4ad0b53fe4142313d3440ef7c85b40cac6713d8b57

          • C:\Windows\Resources\Themes\icsys.icn.exe

            Filesize

            215KB

            MD5

            01e080311f8c53a9a480cce15a6cc081

            SHA1

            b05f9d24a1c50081065293b5db724b11bccecaea

            SHA256

            ab4fb9e9411af1ec95ba64eeb1436dbc6d86b77b99566e972169948e8bc5f0f1

            SHA512

            aa27909b3ad8f9848ae1171b888c1add28b8fadcfa6f9b7412443ef1e1d5767ac11dcf71631fd352864732131e0ff2acb5e37928e9361e20d317887f4652d319

          • C:\Windows\Resources\spoolsv.exe

            Filesize

            215KB

            MD5

            654b26ead67f849c894672edadef533c

            SHA1

            ed168f18858f0c5601f5c4708e9bfa420e6e91a6

            SHA256

            45e8572a9f94c2fadac3b6fe00eba9ac0ef7a14675ccd646d2b9ec9d91e615a1

            SHA512

            6bc605fd765beea735788e306b90c0208db0ba5d7bc314cf4a7822cca869f7486d66414966d3f4ccc109c6c9dc8761e84e15c3abf995b5538c8ce325567f2c91

          • C:\Windows\Resources\spoolsv.exe

            Filesize

            215KB

            MD5

            654b26ead67f849c894672edadef533c

            SHA1

            ed168f18858f0c5601f5c4708e9bfa420e6e91a6

            SHA256

            45e8572a9f94c2fadac3b6fe00eba9ac0ef7a14675ccd646d2b9ec9d91e615a1

            SHA512

            6bc605fd765beea735788e306b90c0208db0ba5d7bc314cf4a7822cca869f7486d66414966d3f4ccc109c6c9dc8761e84e15c3abf995b5538c8ce325567f2c91

          • C:\Windows\Resources\svchost.exe

            Filesize

            215KB

            MD5

            3d0109b83e9af1a1656adf5c4e801134

            SHA1

            fa3873c4b949ac7aa24e15db6eea09574090049f

            SHA256

            3a03f66cfb5920e10727668b3b1f945d22e22d461a9ffcd6ab92bdb1bd95eb9e

            SHA512

            f01d1bf539ff93f0f0a3b9ddc7260c37a27cf8842ff11a3a7fe3ecf0513f32b2249f4e003ba7b7968c57f2cd0adbe0d4683448442f41962670ef845544e57dd3

          • \??\c:\users\admin\appdata\local\temp\ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 

            Filesize

            1.4MB

            MD5

            fc5b377e6622849e59b86354f805f296

            SHA1

            e34a419d968d939c9c7910917d3599456e6c86f7

            SHA256

            070f27afc6522274eb3eb4f53159601bee1998ed5446d0b903efb4f3193de596

            SHA512

            120be2ad772e543e11ef1b4ef4e14b0170e20dad3dad46eac162c9a9d14aa1d2195609bf371c0c3a396a02a86612bc927a053840c8e2b1a2e68f8cb8fe9d03c6

          • \??\c:\windows\resources\spoolsv.exe

            Filesize

            215KB

            MD5

            654b26ead67f849c894672edadef533c

            SHA1

            ed168f18858f0c5601f5c4708e9bfa420e6e91a6

            SHA256

            45e8572a9f94c2fadac3b6fe00eba9ac0ef7a14675ccd646d2b9ec9d91e615a1

            SHA512

            6bc605fd765beea735788e306b90c0208db0ba5d7bc314cf4a7822cca869f7486d66414966d3f4ccc109c6c9dc8761e84e15c3abf995b5538c8ce325567f2c91

          • \??\c:\windows\resources\svchost.exe

            Filesize

            215KB

            MD5

            3d0109b83e9af1a1656adf5c4e801134

            SHA1

            fa3873c4b949ac7aa24e15db6eea09574090049f

            SHA256

            3a03f66cfb5920e10727668b3b1f945d22e22d461a9ffcd6ab92bdb1bd95eb9e

            SHA512

            f01d1bf539ff93f0f0a3b9ddc7260c37a27cf8842ff11a3a7fe3ecf0513f32b2249f4e003ba7b7968c57f2cd0adbe0d4683448442f41962670ef845544e57dd3

          • \??\c:\windows\resources\themes\explorer.exe

            Filesize

            215KB

            MD5

            4ef5f790eb6a746616c65bcf0d9264d4

            SHA1

            f8210e718cafe04e89a23f53aee56855337893a5

            SHA256

            6967b95019981702a6d78b066999af717a19dbd5634e2ea444b674d67db1028c

            SHA512

            c6ccdf21eec3f8a968fa92ab0e55d3cc9ccb3a062a7ddd436624ebcfd3aeb7ed38ab2edd50a8564c5e335f4ad0b53fe4142313d3440ef7c85b40cac6713d8b57

          • \??\c:\windows\resources\themes\icsys.icn.exe

            Filesize

            215KB

            MD5

            01e080311f8c53a9a480cce15a6cc081

            SHA1

            b05f9d24a1c50081065293b5db724b11bccecaea

            SHA256

            ab4fb9e9411af1ec95ba64eeb1436dbc6d86b77b99566e972169948e8bc5f0f1

            SHA512

            aa27909b3ad8f9848ae1171b888c1add28b8fadcfa6f9b7412443ef1e1d5767ac11dcf71631fd352864732131e0ff2acb5e37928e9361e20d317887f4652d319

          • \Users\Admin\AppData\Local\Temp\ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 

            Filesize

            1.4MB

            MD5

            fc5b377e6622849e59b86354f805f296

            SHA1

            e34a419d968d939c9c7910917d3599456e6c86f7

            SHA256

            070f27afc6522274eb3eb4f53159601bee1998ed5446d0b903efb4f3193de596

            SHA512

            120be2ad772e543e11ef1b4ef4e14b0170e20dad3dad46eac162c9a9d14aa1d2195609bf371c0c3a396a02a86612bc927a053840c8e2b1a2e68f8cb8fe9d03c6

          • \Users\Admin\AppData\Local\Temp\ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 

            Filesize

            1.4MB

            MD5

            fc5b377e6622849e59b86354f805f296

            SHA1

            e34a419d968d939c9c7910917d3599456e6c86f7

            SHA256

            070f27afc6522274eb3eb4f53159601bee1998ed5446d0b903efb4f3193de596

            SHA512

            120be2ad772e543e11ef1b4ef4e14b0170e20dad3dad46eac162c9a9d14aa1d2195609bf371c0c3a396a02a86612bc927a053840c8e2b1a2e68f8cb8fe9d03c6

          • \Windows\Resources\Themes\explorer.exe

            Filesize

            215KB

            MD5

            4ef5f790eb6a746616c65bcf0d9264d4

            SHA1

            f8210e718cafe04e89a23f53aee56855337893a5

            SHA256

            6967b95019981702a6d78b066999af717a19dbd5634e2ea444b674d67db1028c

            SHA512

            c6ccdf21eec3f8a968fa92ab0e55d3cc9ccb3a062a7ddd436624ebcfd3aeb7ed38ab2edd50a8564c5e335f4ad0b53fe4142313d3440ef7c85b40cac6713d8b57

          • \Windows\Resources\Themes\explorer.exe

            Filesize

            215KB

            MD5

            4ef5f790eb6a746616c65bcf0d9264d4

            SHA1

            f8210e718cafe04e89a23f53aee56855337893a5

            SHA256

            6967b95019981702a6d78b066999af717a19dbd5634e2ea444b674d67db1028c

            SHA512

            c6ccdf21eec3f8a968fa92ab0e55d3cc9ccb3a062a7ddd436624ebcfd3aeb7ed38ab2edd50a8564c5e335f4ad0b53fe4142313d3440ef7c85b40cac6713d8b57

          • \Windows\Resources\Themes\icsys.icn.exe

            Filesize

            215KB

            MD5

            01e080311f8c53a9a480cce15a6cc081

            SHA1

            b05f9d24a1c50081065293b5db724b11bccecaea

            SHA256

            ab4fb9e9411af1ec95ba64eeb1436dbc6d86b77b99566e972169948e8bc5f0f1

            SHA512

            aa27909b3ad8f9848ae1171b888c1add28b8fadcfa6f9b7412443ef1e1d5767ac11dcf71631fd352864732131e0ff2acb5e37928e9361e20d317887f4652d319

          • \Windows\Resources\Themes\icsys.icn.exe

            Filesize

            215KB

            MD5

            01e080311f8c53a9a480cce15a6cc081

            SHA1

            b05f9d24a1c50081065293b5db724b11bccecaea

            SHA256

            ab4fb9e9411af1ec95ba64eeb1436dbc6d86b77b99566e972169948e8bc5f0f1

            SHA512

            aa27909b3ad8f9848ae1171b888c1add28b8fadcfa6f9b7412443ef1e1d5767ac11dcf71631fd352864732131e0ff2acb5e37928e9361e20d317887f4652d319

          • \Windows\Resources\spoolsv.exe

            Filesize

            215KB

            MD5

            654b26ead67f849c894672edadef533c

            SHA1

            ed168f18858f0c5601f5c4708e9bfa420e6e91a6

            SHA256

            45e8572a9f94c2fadac3b6fe00eba9ac0ef7a14675ccd646d2b9ec9d91e615a1

            SHA512

            6bc605fd765beea735788e306b90c0208db0ba5d7bc314cf4a7822cca869f7486d66414966d3f4ccc109c6c9dc8761e84e15c3abf995b5538c8ce325567f2c91

          • \Windows\Resources\spoolsv.exe

            Filesize

            215KB

            MD5

            654b26ead67f849c894672edadef533c

            SHA1

            ed168f18858f0c5601f5c4708e9bfa420e6e91a6

            SHA256

            45e8572a9f94c2fadac3b6fe00eba9ac0ef7a14675ccd646d2b9ec9d91e615a1

            SHA512

            6bc605fd765beea735788e306b90c0208db0ba5d7bc314cf4a7822cca869f7486d66414966d3f4ccc109c6c9dc8761e84e15c3abf995b5538c8ce325567f2c91

          • \Windows\Resources\spoolsv.exe

            Filesize

            215KB

            MD5

            654b26ead67f849c894672edadef533c

            SHA1

            ed168f18858f0c5601f5c4708e9bfa420e6e91a6

            SHA256

            45e8572a9f94c2fadac3b6fe00eba9ac0ef7a14675ccd646d2b9ec9d91e615a1

            SHA512

            6bc605fd765beea735788e306b90c0208db0ba5d7bc314cf4a7822cca869f7486d66414966d3f4ccc109c6c9dc8761e84e15c3abf995b5538c8ce325567f2c91

          • \Windows\Resources\spoolsv.exe

            Filesize

            215KB

            MD5

            654b26ead67f849c894672edadef533c

            SHA1

            ed168f18858f0c5601f5c4708e9bfa420e6e91a6

            SHA256

            45e8572a9f94c2fadac3b6fe00eba9ac0ef7a14675ccd646d2b9ec9d91e615a1

            SHA512

            6bc605fd765beea735788e306b90c0208db0ba5d7bc314cf4a7822cca869f7486d66414966d3f4ccc109c6c9dc8761e84e15c3abf995b5538c8ce325567f2c91

          • \Windows\Resources\svchost.exe

            Filesize

            215KB

            MD5

            3d0109b83e9af1a1656adf5c4e801134

            SHA1

            fa3873c4b949ac7aa24e15db6eea09574090049f

            SHA256

            3a03f66cfb5920e10727668b3b1f945d22e22d461a9ffcd6ab92bdb1bd95eb9e

            SHA512

            f01d1bf539ff93f0f0a3b9ddc7260c37a27cf8842ff11a3a7fe3ecf0513f32b2249f4e003ba7b7968c57f2cd0adbe0d4683448442f41962670ef845544e57dd3

          • \Windows\Resources\svchost.exe

            Filesize

            215KB

            MD5

            3d0109b83e9af1a1656adf5c4e801134

            SHA1

            fa3873c4b949ac7aa24e15db6eea09574090049f

            SHA256

            3a03f66cfb5920e10727668b3b1f945d22e22d461a9ffcd6ab92bdb1bd95eb9e

            SHA512

            f01d1bf539ff93f0f0a3b9ddc7260c37a27cf8842ff11a3a7fe3ecf0513f32b2249f4e003ba7b7968c57f2cd0adbe0d4683448442f41962670ef845544e57dd3

          • memory/524-122-0x0000000000400000-0x0000000000431000-memory.dmp

            Filesize

            196KB

          • memory/524-100-0x0000000000400000-0x0000000000431000-memory.dmp

            Filesize

            196KB

          • memory/524-102-0x00000000006C0000-0x00000000006F1000-memory.dmp

            Filesize

            196KB

          • memory/1168-68-0x0000000002570000-0x00000000035FE000-memory.dmp

            Filesize

            16.6MB

          • memory/1168-65-0x0000000001000000-0x000000000116D000-memory.dmp

            Filesize

            1.4MB

          • memory/1168-61-0x0000000075A71000-0x0000000075A73000-memory.dmp

            Filesize

            8KB

          • memory/1168-62-0x0000000002570000-0x00000000035FE000-memory.dmp

            Filesize

            16.6MB

          • memory/1168-69-0x0000000001000000-0x000000000116D000-memory.dmp

            Filesize

            1.4MB

          • memory/1488-120-0x0000000000400000-0x0000000000431000-memory.dmp

            Filesize

            196KB

          • memory/1488-107-0x0000000000400000-0x0000000000431000-memory.dmp

            Filesize

            196KB

          • memory/1488-108-0x0000000000280000-0x00000000002B1000-memory.dmp

            Filesize

            196KB

          • memory/1520-106-0x00000000002E0000-0x0000000000311000-memory.dmp

            Filesize

            196KB

          • memory/1520-130-0x00000000002E0000-0x0000000000311000-memory.dmp

            Filesize

            196KB

          • memory/1520-104-0x0000000000400000-0x0000000000431000-memory.dmp

            Filesize

            196KB

          • memory/1520-129-0x0000000000400000-0x0000000000431000-memory.dmp

            Filesize

            196KB

          • memory/1568-126-0x0000000000320000-0x0000000000351000-memory.dmp

            Filesize

            196KB

          • memory/1568-125-0x0000000000400000-0x0000000000431000-memory.dmp

            Filesize

            196KB

          • memory/1944-118-0x0000000000400000-0x0000000000431000-memory.dmp

            Filesize

            196KB

          • memory/2000-81-0x000007FEFC2F1000-0x000007FEFC2F3000-memory.dmp

            Filesize

            8KB

          • memory/2016-124-0x0000000000400000-0x0000000000431000-memory.dmp

            Filesize

            196KB

          • memory/2016-64-0x00000000027F0000-0x000000000295D000-memory.dmp

            Filesize

            1.4MB

          • memory/2016-98-0x0000000000310000-0x0000000000312000-memory.dmp

            Filesize

            8KB

          • memory/2016-99-0x0000000001E80000-0x0000000001EB1000-memory.dmp

            Filesize

            196KB

          • memory/2016-63-0x0000000000400000-0x0000000000431000-memory.dmp

            Filesize

            196KB