Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 19:15
Static task
static1
Behavioral task
behavioral1
Sample
1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe
Resource
win7-20220812-en
General
-
Target
1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe
-
Size
564KB
-
MD5
0f2892e40e25a8fa6b0a6ae6b5392720
-
SHA1
054835c97ae6552aa55967423f1dd5ed52f7e5da
-
SHA256
1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f
-
SHA512
bb2b323804618f2be319f7227b8cf7b540682998d61f9b224e7f73ad00cb4da727568387072cdd6836aeb68ce522a62016548e03c9a5971865254cec78961f88
-
SSDEEP
12288:xSK7AjmRWIB5DpO0lXwtpBSPPmdMwAS8J+cyOcBu0PAlO+ZiqfynGRs/bX1+f5r2:xSbjmpJpOYwtp40Mw8yO0Al6qfyGRsjZ
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe -
Executes dropped EXE 1 IoCs
pid Process 2028 update.exe -
resource yara_rule behavioral1/memory/1912-55-0x00000000024A0000-0x000000000352E000-memory.dmp upx behavioral1/memory/1912-59-0x00000000024A0000-0x000000000352E000-memory.dmp upx behavioral1/memory/1912-73-0x00000000024A0000-0x000000000352E000-memory.dmp upx -
Loads dropped DLL 7 IoCs
pid Process 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe 2028 update.exe 2028 update.exe 2028 update.exe 2028 update.exe 2028 update.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe File opened (read-only) \??\F: 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe File opened for modification C:\Windows\setupapi.log update.exe File opened for modification \??\c:\windows\KB982316.log update.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
description pid Process Token: SeDebugPrivilege 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Token: SeDebugPrivilege 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Token: SeDebugPrivilege 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Token: SeDebugPrivilege 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Token: SeDebugPrivilege 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Token: SeDebugPrivilege 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Token: SeDebugPrivilege 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Token: SeDebugPrivilege 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Token: SeDebugPrivilege 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Token: SeDebugPrivilege 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Token: SeDebugPrivilege 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Token: SeDebugPrivilege 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Token: SeDebugPrivilege 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Token: SeDebugPrivilege 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Token: SeDebugPrivilege 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Token: SeDebugPrivilege 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Token: SeDebugPrivilege 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Token: SeDebugPrivilege 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Token: SeDebugPrivilege 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Token: SeDebugPrivilege 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Token: SeDebugPrivilege 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe Token: SeRestorePrivilege 2028 update.exe Token: SeRestorePrivilege 2028 update.exe Token: SeRestorePrivilege 2028 update.exe Token: SeRestorePrivilege 2028 update.exe Token: SeRestorePrivilege 2028 update.exe Token: SeRestorePrivilege 2028 update.exe Token: SeRestorePrivilege 2028 update.exe Token: SeBackupPrivilege 2028 update.exe Token: SeRestorePrivilege 2028 update.exe Token: SeShutdownPrivilege 2028 update.exe Token: SeSecurityPrivilege 2028 update.exe Token: SeTakeOwnershipPrivilege 2028 update.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1912 wrote to memory of 1132 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe 18 PID 1912 wrote to memory of 1200 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe 17 PID 1912 wrote to memory of 1256 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe 16 PID 1912 wrote to memory of 2028 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe 28 PID 1912 wrote to memory of 2028 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe 28 PID 1912 wrote to memory of 2028 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe 28 PID 1912 wrote to memory of 2028 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe 28 PID 1912 wrote to memory of 2028 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe 28 PID 1912 wrote to memory of 2028 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe 28 PID 1912 wrote to memory of 2028 1912 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe 28 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe"C:\Users\Admin\AppData\Local\Temp\1d04f9e7bc174c0c3ca1cedef81c04ed93bcb30beb6585be4dbc274aaa90c36f.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1912 -
\??\c:\d48f6a7185a82811d1f5296940\update\update.exec:\d48f6a7185a82811d1f5296940\update\update.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1200
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1132
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
712KB
MD59570121468658dcc6972f1dfa624a223
SHA161716952df7a03fc01ac919f44f07e9588840b8c
SHA256bc2cde5db3027a726c81df78bdef10b5ec9a7b4a5ba297911c7b999638f76b33
SHA5127c2168a6db5bf7dd7c09682983e9059524621834d0d9ae250382c74d714b0e99b625f5ee9a648e18de9fa25b580bac5ab770ad63c406a9f88c87ade1a372429c
-
Filesize
19KB
MD5e80662db3456df2a8b7e2828fec7fd73
SHA1a659d9ff700c6fdf9c753f06a8e1beed716acfc6
SHA256325af12150856b3b267a46934df0bb2baea04ed6a033f8ddfbe92b649915bbf6
SHA51236f2cc5fc09e300c15208d0bca03d9ddf8d351701cab00b894131f7edf674f0d6da5b7d7f2a53cefc12a8a2ca3a6b33670a2cdd4180f7a5a74a321f33111cd72
-
Filesize
25KB
MD5ee207e35aea4d5df41d90221e1b66efa
SHA1757469cf9ad2f21f267bbe730560114fdf8a89a5
SHA256cf64c95e9a2d02967efc22b00efb3736156b913a95231eb63c1df45d43475e64
SHA51243e9f75725daa4f3428b2d9cee2c2cc8b2f2e991b8e58d72d2f429fbdfb614c86d172f03d3f9da98756bd4e245643d9a57c6efa422d6c60ad364a2322245542d
-
Filesize
19KB
MD5e80662db3456df2a8b7e2828fec7fd73
SHA1a659d9ff700c6fdf9c753f06a8e1beed716acfc6
SHA256325af12150856b3b267a46934df0bb2baea04ed6a033f8ddfbe92b649915bbf6
SHA51236f2cc5fc09e300c15208d0bca03d9ddf8d351701cab00b894131f7edf674f0d6da5b7d7f2a53cefc12a8a2ca3a6b33670a2cdd4180f7a5a74a321f33111cd72
-
Filesize
712KB
MD59570121468658dcc6972f1dfa624a223
SHA161716952df7a03fc01ac919f44f07e9588840b8c
SHA256bc2cde5db3027a726c81df78bdef10b5ec9a7b4a5ba297911c7b999638f76b33
SHA5127c2168a6db5bf7dd7c09682983e9059524621834d0d9ae250382c74d714b0e99b625f5ee9a648e18de9fa25b580bac5ab770ad63c406a9f88c87ade1a372429c
-
Filesize
712KB
MD59570121468658dcc6972f1dfa624a223
SHA161716952df7a03fc01ac919f44f07e9588840b8c
SHA256bc2cde5db3027a726c81df78bdef10b5ec9a7b4a5ba297911c7b999638f76b33
SHA5127c2168a6db5bf7dd7c09682983e9059524621834d0d9ae250382c74d714b0e99b625f5ee9a648e18de9fa25b580bac5ab770ad63c406a9f88c87ade1a372429c
-
Filesize
712KB
MD59570121468658dcc6972f1dfa624a223
SHA161716952df7a03fc01ac919f44f07e9588840b8c
SHA256bc2cde5db3027a726c81df78bdef10b5ec9a7b4a5ba297911c7b999638f76b33
SHA5127c2168a6db5bf7dd7c09682983e9059524621834d0d9ae250382c74d714b0e99b625f5ee9a648e18de9fa25b580bac5ab770ad63c406a9f88c87ade1a372429c
-
Filesize
712KB
MD59570121468658dcc6972f1dfa624a223
SHA161716952df7a03fc01ac919f44f07e9588840b8c
SHA256bc2cde5db3027a726c81df78bdef10b5ec9a7b4a5ba297911c7b999638f76b33
SHA5127c2168a6db5bf7dd7c09682983e9059524621834d0d9ae250382c74d714b0e99b625f5ee9a648e18de9fa25b580bac5ab770ad63c406a9f88c87ade1a372429c
-
Filesize
331KB
MD5eb5c64286d987337f702813e73fcf615
SHA177c393b4cf5b61c29afa408ec1ebd93b22271e3f
SHA25644062d8525a1de307491a46376d1831e23c27c18edb3de8f142d83eb7a21fc52
SHA5120c71779a7b5a3507b5d0ccc0f9ff785032e1d8c32e76a0c0acadfd531d9ca87b61fd9742d69c610823a4315e181ad41f561811badbc262052d0f3ba86b9237a6