Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 08:24
Static task
static1
Behavioral task
behavioral1
Sample
ceca562d4db575246f0f4097fe68154cd7f38a067ef62f6f0784cb4d244ded51.dll
Resource
win7-20220901-en
General
-
Target
ceca562d4db575246f0f4097fe68154cd7f38a067ef62f6f0784cb4d244ded51.dll
-
Size
120KB
-
MD5
d893b02240899760ecbb7a675e6b0ea9
-
SHA1
b36f2f0c0c5a832d0f42a9a86886be64583eb88a
-
SHA256
ceca562d4db575246f0f4097fe68154cd7f38a067ef62f6f0784cb4d244ded51
-
SHA512
de27a648e52e6662747193f3b3d6632fb8071314765eda495bb7061229951e343db29a53ee54e82fe38683716ba7e51fcff2fccdaa71dcb116311ea9ee6ad177
-
SSDEEP
3072:E5dZT8hdHggO0Gp48EvmGFiPdBdmkVXrf5Nu5K8dQx7d:kT8hdBOnpOUPdBdmkVXLE7Qx
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 6c0732.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 6c0732.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 6c0732.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6c0732.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 6c0732.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 6c0732.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 6c0732.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 6c0732.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 6c0732.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 6c0732.exe -
Executes dropped EXE 3 IoCs
pid Process 820 6c0732.exe 632 6c0b86.exe 996 6c29cf.exe -
resource yara_rule behavioral1/memory/820-61-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/820-70-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/820-84-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/820-86-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/632-88-0x0000000000900000-0x00000000019BA000-memory.dmp upx -
Loads dropped DLL 6 IoCs
pid Process 1456 rundll32.exe 1456 rundll32.exe 1456 rundll32.exe 1456 rundll32.exe 1456 rundll32.exe 1456 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 6c0732.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 6c0732.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 6c0732.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 6c0732.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 6c0732.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 6c0732.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 6c0732.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6c0732.exe -
Enumerates connected drives 3 TTPs 8 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: 6c0732.exe File opened (read-only) \??\E: 6c0732.exe File opened (read-only) \??\F: 6c0732.exe File opened (read-only) \??\G: 6c0732.exe File opened (read-only) \??\H: 6c0732.exe File opened (read-only) \??\I: 6c0732.exe File opened (read-only) \??\J: 6c0732.exe File opened (read-only) \??\K: 6c0732.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\6c086a 6c0732.exe File opened for modification C:\Windows\SYSTEM.INI 6c0732.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 820 6c0732.exe 820 6c0732.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeDebugPrivilege 820 6c0732.exe Token: SeDebugPrivilege 820 6c0732.exe Token: SeDebugPrivilege 820 6c0732.exe Token: SeDebugPrivilege 820 6c0732.exe Token: SeDebugPrivilege 820 6c0732.exe Token: SeDebugPrivilege 820 6c0732.exe Token: SeDebugPrivilege 820 6c0732.exe Token: SeDebugPrivilege 820 6c0732.exe Token: SeDebugPrivilege 820 6c0732.exe Token: SeDebugPrivilege 820 6c0732.exe Token: SeDebugPrivilege 820 6c0732.exe Token: SeDebugPrivilege 820 6c0732.exe Token: SeDebugPrivilege 820 6c0732.exe Token: SeDebugPrivilege 820 6c0732.exe Token: SeDebugPrivilege 820 6c0732.exe Token: SeDebugPrivilege 820 6c0732.exe Token: SeDebugPrivilege 820 6c0732.exe Token: SeDebugPrivilege 820 6c0732.exe Token: SeDebugPrivilege 820 6c0732.exe Token: SeDebugPrivilege 820 6c0732.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1408 wrote to memory of 1456 1408 rundll32.exe 27 PID 1408 wrote to memory of 1456 1408 rundll32.exe 27 PID 1408 wrote to memory of 1456 1408 rundll32.exe 27 PID 1408 wrote to memory of 1456 1408 rundll32.exe 27 PID 1408 wrote to memory of 1456 1408 rundll32.exe 27 PID 1408 wrote to memory of 1456 1408 rundll32.exe 27 PID 1408 wrote to memory of 1456 1408 rundll32.exe 27 PID 1456 wrote to memory of 820 1456 rundll32.exe 28 PID 1456 wrote to memory of 820 1456 rundll32.exe 28 PID 1456 wrote to memory of 820 1456 rundll32.exe 28 PID 1456 wrote to memory of 820 1456 rundll32.exe 28 PID 820 wrote to memory of 1200 820 6c0732.exe 20 PID 820 wrote to memory of 1308 820 6c0732.exe 13 PID 820 wrote to memory of 1348 820 6c0732.exe 19 PID 820 wrote to memory of 1408 820 6c0732.exe 23 PID 820 wrote to memory of 1456 820 6c0732.exe 27 PID 820 wrote to memory of 1456 820 6c0732.exe 27 PID 1456 wrote to memory of 632 1456 rundll32.exe 29 PID 1456 wrote to memory of 632 1456 rundll32.exe 29 PID 1456 wrote to memory of 632 1456 rundll32.exe 29 PID 1456 wrote to memory of 632 1456 rundll32.exe 29 PID 1456 wrote to memory of 996 1456 rundll32.exe 30 PID 1456 wrote to memory of 996 1456 rundll32.exe 30 PID 1456 wrote to memory of 996 1456 rundll32.exe 30 PID 1456 wrote to memory of 996 1456 rundll32.exe 30 PID 820 wrote to memory of 1200 820 6c0732.exe 20 PID 820 wrote to memory of 1308 820 6c0732.exe 13 PID 820 wrote to memory of 1348 820 6c0732.exe 19 PID 820 wrote to memory of 632 820 6c0732.exe 29 PID 820 wrote to memory of 632 820 6c0732.exe 29 PID 820 wrote to memory of 996 820 6c0732.exe 30 PID 820 wrote to memory of 996 820 6c0732.exe 30 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6c0732.exe
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1308
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1348
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ceca562d4db575246f0f4097fe68154cd7f38a067ef62f6f0784cb4d244ded51.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ceca562d4db575246f0f4097fe68154cd7f38a067ef62f6f0784cb4d244ded51.dll,#13⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\6c0732.exeC:\Users\Admin\AppData\Local\Temp\6c0732.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:820
-
-
C:\Users\Admin\AppData\Local\Temp\6c0b86.exeC:\Users\Admin\AppData\Local\Temp\6c0b86.exe4⤵
- Executes dropped EXE
PID:632
-
-
C:\Users\Admin\AppData\Local\Temp\6c29cf.exeC:\Users\Admin\AppData\Local\Temp\6c29cf.exe4⤵
- Executes dropped EXE
PID:996
-
-
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1200
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD5c610da323d57ee380c34d78553749407
SHA15dfc9042684060137d88a41b8018fb9de3e22297
SHA256efbe0df87a2aae415745c60efe17d8f095ec2e015dd30e564791238002159f48
SHA512b5eb651d4d497d6a4ffe9fcfd55e03278b3bc8e6b51797a74417d33470c70c0c9e64d158bb47bcde045ab2f6741124fda772c2722ea61567995d8f9bf94ea5ae
-
Filesize
97KB
MD5c610da323d57ee380c34d78553749407
SHA15dfc9042684060137d88a41b8018fb9de3e22297
SHA256efbe0df87a2aae415745c60efe17d8f095ec2e015dd30e564791238002159f48
SHA512b5eb651d4d497d6a4ffe9fcfd55e03278b3bc8e6b51797a74417d33470c70c0c9e64d158bb47bcde045ab2f6741124fda772c2722ea61567995d8f9bf94ea5ae
-
Filesize
97KB
MD5c610da323d57ee380c34d78553749407
SHA15dfc9042684060137d88a41b8018fb9de3e22297
SHA256efbe0df87a2aae415745c60efe17d8f095ec2e015dd30e564791238002159f48
SHA512b5eb651d4d497d6a4ffe9fcfd55e03278b3bc8e6b51797a74417d33470c70c0c9e64d158bb47bcde045ab2f6741124fda772c2722ea61567995d8f9bf94ea5ae
-
Filesize
97KB
MD5c610da323d57ee380c34d78553749407
SHA15dfc9042684060137d88a41b8018fb9de3e22297
SHA256efbe0df87a2aae415745c60efe17d8f095ec2e015dd30e564791238002159f48
SHA512b5eb651d4d497d6a4ffe9fcfd55e03278b3bc8e6b51797a74417d33470c70c0c9e64d158bb47bcde045ab2f6741124fda772c2722ea61567995d8f9bf94ea5ae
-
Filesize
97KB
MD5c610da323d57ee380c34d78553749407
SHA15dfc9042684060137d88a41b8018fb9de3e22297
SHA256efbe0df87a2aae415745c60efe17d8f095ec2e015dd30e564791238002159f48
SHA512b5eb651d4d497d6a4ffe9fcfd55e03278b3bc8e6b51797a74417d33470c70c0c9e64d158bb47bcde045ab2f6741124fda772c2722ea61567995d8f9bf94ea5ae
-
Filesize
97KB
MD5c610da323d57ee380c34d78553749407
SHA15dfc9042684060137d88a41b8018fb9de3e22297
SHA256efbe0df87a2aae415745c60efe17d8f095ec2e015dd30e564791238002159f48
SHA512b5eb651d4d497d6a4ffe9fcfd55e03278b3bc8e6b51797a74417d33470c70c0c9e64d158bb47bcde045ab2f6741124fda772c2722ea61567995d8f9bf94ea5ae
-
Filesize
97KB
MD5c610da323d57ee380c34d78553749407
SHA15dfc9042684060137d88a41b8018fb9de3e22297
SHA256efbe0df87a2aae415745c60efe17d8f095ec2e015dd30e564791238002159f48
SHA512b5eb651d4d497d6a4ffe9fcfd55e03278b3bc8e6b51797a74417d33470c70c0c9e64d158bb47bcde045ab2f6741124fda772c2722ea61567995d8f9bf94ea5ae
-
Filesize
97KB
MD5c610da323d57ee380c34d78553749407
SHA15dfc9042684060137d88a41b8018fb9de3e22297
SHA256efbe0df87a2aae415745c60efe17d8f095ec2e015dd30e564791238002159f48
SHA512b5eb651d4d497d6a4ffe9fcfd55e03278b3bc8e6b51797a74417d33470c70c0c9e64d158bb47bcde045ab2f6741124fda772c2722ea61567995d8f9bf94ea5ae
-
Filesize
97KB
MD5c610da323d57ee380c34d78553749407
SHA15dfc9042684060137d88a41b8018fb9de3e22297
SHA256efbe0df87a2aae415745c60efe17d8f095ec2e015dd30e564791238002159f48
SHA512b5eb651d4d497d6a4ffe9fcfd55e03278b3bc8e6b51797a74417d33470c70c0c9e64d158bb47bcde045ab2f6741124fda772c2722ea61567995d8f9bf94ea5ae