Overview
overview
10Static
static
8announce.exe
windows7-x64
10announce.exe
windows10-2004-x64
1plugins/regex.so
ubuntu-18.04-amd64
1plugins/sscanf.dll
windows7-x64
3plugins/sscanf.dll
windows10-2004-x64
3plugins/sscanf.so
ubuntu-18.04-amd64
1plugins/streamer.dll
windows7-x64
3plugins/streamer.dll
windows10-2004-x64
3plugins/streamer.so
ubuntu-18.04-amd64
1samp-npc.exe
windows7-x64
10samp-npc.exe
windows10-2004-x64
10samp-server.exe
windows7-x64
10samp-server.exe
windows10-2004-x64
10scriptfile...ts.vbs
windows7-x64
1scriptfile...ts.vbs
windows10-2004-x64
1�...ts.vbs
windows7-x64
1�...ts.vbs
windows10-2004-x64
1�...ck.vbs
windows7-x64
1�...ck.vbs
windows10-2004-x64
1�...nc.dll
windows7-x64
1�...nc.dll
windows10-2004-x64
1�...cc.exe
windows7-x64
1�...cc.exe
windows10-2004-x64
1�...no.exe
windows7-x64
8�...no.exe
windows10-2004-x64
8Analysis
-
max time kernel
58s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 18:35
Behavioral task
behavioral1
Sample
announce.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
announce.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
plugins/regex.so
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral4
Sample
plugins/sscanf.dll
Resource
win7-20221111-en
Behavioral task
behavioral5
Sample
plugins/sscanf.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral6
Sample
plugins/sscanf.so
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral7
Sample
plugins/streamer.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
plugins/streamer.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
plugins/streamer.so
Resource
ubuntu1804-amd64-20221111-en
Behavioral task
behavioral10
Sample
samp-npc.exe
Resource
win7-20220812-en
Behavioral task
behavioral11
Sample
samp-npc.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral12
Sample
samp-server.exe
Resource
win7-20221111-en
Behavioral task
behavioral13
Sample
samp-server.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral14
Sample
scriptfiles/ladmin/logs/Objects.vbs
Resource
win7-20220812-en
Behavioral task
behavioral15
Sample
scriptfiles/ladmin/logs/Objects.vbs
Resource
win10v2004-20221111-en
Behavioral task
behavioral16
Sample
/pawno/include/a_objects.vbs
Resource
win7-20220812-en
Behavioral task
behavioral17
Sample
/pawno/include/a_objects.vbs
Resource
win10v2004-20221111-en
Behavioral task
behavioral18
Sample
/pawno/include/antiattack.vbs
Resource
win7-20220812-en
Behavioral task
behavioral19
Sample
/pawno/include/antiattack.vbs
Resource
win10v2004-20220812-en
Behavioral task
behavioral20
Sample
/pawno/libpawnc.dll
Resource
win7-20220812-en
Behavioral task
behavioral21
Sample
/pawno/libpawnc.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral22
Sample
/pawno/pawncc.exe
Resource
win7-20221111-en
Behavioral task
behavioral23
Sample
/pawno/pawncc.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral24
Sample
/pawno/pawno.exe
Resource
win7-20221111-en
Behavioral task
behavioral25
Sample
/pawno/pawno.exe
Resource
win10v2004-20220901-en
General
-
Target
announce.exe
-
Size
116KB
-
MD5
511e3d166caf4df562a82b58f564bead
-
SHA1
5c6be8a2e31193d6fe743c13c6585037782f413f
-
SHA256
57d6ff0340f289696e455ca0310a3051a92f45605e2fadf2b752f7fec9dfcc29
-
SHA512
970bcd311ffae687df778608d1c7109eb37de64b4e296595a11e6583d0a87a45a7e93b7aea4ad9a440d442975ffd03f1343896a2f94567b75a9247db899bf1c6
-
SSDEEP
3072:Oa1jqZp+DtSXLB2bJcB+x2cd0OC0Lj+ylG8:OM+ZtXkCBO40Lj9
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
announce.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" announce.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" announce.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" announce.exe -
Processes:
announce.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" announce.exe -
Processes:
announce.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" announce.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" announce.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" announce.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" announce.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" announce.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" announce.exe -
Processes:
resource yara_rule behavioral1/memory/1884-55-0x0000000000980000-0x0000000001A0E000-memory.dmp upx behavioral1/memory/1884-58-0x0000000000980000-0x0000000001A0E000-memory.dmp upx -
Processes:
announce.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" announce.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" announce.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" announce.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" announce.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" announce.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" announce.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc announce.exe -
Processes:
announce.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" announce.exe -
Drops file in Windows directory 1 IoCs
Processes:
announce.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI announce.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
announce.exepid process 1884 announce.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
Processes:
announce.exedescription pid process Token: SeDebugPrivilege 1884 announce.exe Token: SeDebugPrivilege 1884 announce.exe Token: SeDebugPrivilege 1884 announce.exe Token: SeDebugPrivilege 1884 announce.exe Token: SeDebugPrivilege 1884 announce.exe Token: SeDebugPrivilege 1884 announce.exe Token: SeDebugPrivilege 1884 announce.exe Token: SeDebugPrivilege 1884 announce.exe Token: SeDebugPrivilege 1884 announce.exe Token: SeDebugPrivilege 1884 announce.exe Token: SeDebugPrivilege 1884 announce.exe Token: SeDebugPrivilege 1884 announce.exe Token: SeDebugPrivilege 1884 announce.exe Token: SeDebugPrivilege 1884 announce.exe Token: SeDebugPrivilege 1884 announce.exe Token: SeDebugPrivilege 1884 announce.exe Token: SeDebugPrivilege 1884 announce.exe Token: SeDebugPrivilege 1884 announce.exe Token: SeDebugPrivilege 1884 announce.exe Token: SeDebugPrivilege 1884 announce.exe Token: SeDebugPrivilege 1884 announce.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
announce.exedescription pid process target process PID 1884 wrote to memory of 1132 1884 announce.exe taskhost.exe PID 1884 wrote to memory of 1216 1884 announce.exe Dwm.exe PID 1884 wrote to memory of 1264 1884 announce.exe Explorer.EXE -
System policy modification 1 TTPs 1 IoCs
Processes:
announce.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" announce.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\announce.exe"C:\Users\Admin\AppData\Local\Temp\announce.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1884
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1216
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1132