Analysis
-
max time kernel
161s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
21/11/2022, 14:50
Static task
static1
Behavioral task
behavioral1
Sample
e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe
Resource
win7-20221111-en
General
-
Target
e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe
-
Size
97KB
-
MD5
3b0a30249c545ca5bf8b02f961154f70
-
SHA1
f9b8d42c1973792b9d674a8f49497ad6f3184ef0
-
SHA256
e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2
-
SHA512
6d06373a8be87cb51ce53efc71a80b9eee5dd77db2bea0d6a4b6cd8d3eefff2cbf548983ed3079ba35fbb13152a2ad54a8fc46df377739b075fc0e3cc8095b64
-
SSDEEP
1536:Q7xzUs8W64i8s1+Y3HRLFRV3U1V/KFVroks4KopNwLNLCvQwBgTRa:cpUA9rWPHdFL6VSDrlsDorcNLqB2a
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe -
resource yara_rule behavioral1/memory/940-55-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/940-58-0x0000000000590000-0x000000000164A000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\6c4339 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe File opened for modification C:\Windows\SYSTEM.INI e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe Token: SeDebugPrivilege 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe Token: SeDebugPrivilege 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe Token: SeDebugPrivilege 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe Token: SeDebugPrivilege 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe Token: SeDebugPrivilege 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe Token: SeDebugPrivilege 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe Token: SeDebugPrivilege 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe Token: SeDebugPrivilege 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe Token: SeDebugPrivilege 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe Token: SeDebugPrivilege 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe Token: SeDebugPrivilege 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe Token: SeDebugPrivilege 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe Token: SeDebugPrivilege 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe Token: SeDebugPrivilege 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe Token: SeDebugPrivilege 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe Token: SeDebugPrivilege 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe Token: SeDebugPrivilege 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe Token: SeDebugPrivilege 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe Token: SeDebugPrivilege 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe Token: SeDebugPrivilege 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 940 wrote to memory of 1216 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 17 PID 940 wrote to memory of 1304 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 16 PID 940 wrote to memory of 1376 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 15 PID 940 wrote to memory of 1216 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 17 PID 940 wrote to memory of 1304 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 16 PID 940 wrote to memory of 1376 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 15 PID 940 wrote to memory of 1216 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 17 PID 940 wrote to memory of 1304 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 16 PID 940 wrote to memory of 1376 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 15 PID 940 wrote to memory of 1216 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 17 PID 940 wrote to memory of 1304 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 16 PID 940 wrote to memory of 1376 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 15 PID 940 wrote to memory of 1216 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 17 PID 940 wrote to memory of 1304 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 16 PID 940 wrote to memory of 1376 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 15 PID 940 wrote to memory of 1216 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 17 PID 940 wrote to memory of 1304 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 16 PID 940 wrote to memory of 1376 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 15 PID 940 wrote to memory of 1216 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 17 PID 940 wrote to memory of 1304 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 16 PID 940 wrote to memory of 1376 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 15 PID 940 wrote to memory of 1216 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 17 PID 940 wrote to memory of 1304 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 16 PID 940 wrote to memory of 1376 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 15 PID 940 wrote to memory of 1216 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 17 PID 940 wrote to memory of 1304 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 16 PID 940 wrote to memory of 1376 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 15 PID 940 wrote to memory of 1216 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 17 PID 940 wrote to memory of 1304 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 16 PID 940 wrote to memory of 1376 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 15 PID 940 wrote to memory of 1216 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 17 PID 940 wrote to memory of 1304 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 16 PID 940 wrote to memory of 1376 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 15 PID 940 wrote to memory of 1216 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 17 PID 940 wrote to memory of 1304 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 16 PID 940 wrote to memory of 1376 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 15 PID 940 wrote to memory of 1216 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 17 PID 940 wrote to memory of 1304 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 16 PID 940 wrote to memory of 1376 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 15 PID 940 wrote to memory of 1216 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 17 PID 940 wrote to memory of 1304 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 16 PID 940 wrote to memory of 1376 940 e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe 15 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe"C:\Users\Admin\AppData\Local\Temp\e2b7dd270a44d7401f2f782827e66ce4f96e853d99fa8a1e00c0c49af33dcae2.exe"1⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:940
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1376
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1304
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1216