Analysis
-
max time kernel
185s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02-02-2023 13:38
Static task
static1
Behavioral task
behavioral1
Sample
ea39a694769de620936e8ee9d4af40a65f356928.exe
Resource
win7-20221111-en
General
-
Target
ea39a694769de620936e8ee9d4af40a65f356928.exe
-
Size
100KB
-
MD5
adaac25444ac37cd4fe1da9f8e05c4e0
-
SHA1
ea39a694769de620936e8ee9d4af40a65f356928
-
SHA256
eea056ee1bdb488b2e78f97c8fd97f4a8b6fc5702fe8979441c031e8a2b7c905
-
SHA512
3315fa9d3bc8fede1e1b401d64ef853074f6ce6aa58db363c4130f566188fcaa70604d335b49400ca2dd8b3f64c291a8ccaa8c976c9295e12376275487bdfeda
-
SSDEEP
3072:HoLA8rHxhUqA9X2kL2j/bT5iOZMomoc/VokHILiX:ILRRhZkyT5XZMyc/GkHIA
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" ea39a694769de620936e8ee9d4af40a65f356928.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" ea39a694769de620936e8ee9d4af40a65f356928.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" ea39a694769de620936e8ee9d4af40a65f356928.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ea39a694769de620936e8ee9d4af40a65f356928.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ea39a694769de620936e8ee9d4af40a65f356928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" ea39a694769de620936e8ee9d4af40a65f356928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ea39a694769de620936e8ee9d4af40a65f356928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ea39a694769de620936e8ee9d4af40a65f356928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ea39a694769de620936e8ee9d4af40a65f356928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ea39a694769de620936e8ee9d4af40a65f356928.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" ea39a694769de620936e8ee9d4af40a65f356928.exe -
Disables Task Manager via registry modification
-
resource yara_rule behavioral1/memory/1844-55-0x0000000001D60000-0x0000000002DEE000-memory.dmp upx behavioral1/memory/1844-59-0x0000000001D60000-0x0000000002DEE000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ea39a694769de620936e8ee9d4af40a65f356928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" ea39a694769de620936e8ee9d4af40a65f356928.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc ea39a694769de620936e8ee9d4af40a65f356928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ea39a694769de620936e8ee9d4af40a65f356928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ea39a694769de620936e8ee9d4af40a65f356928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ea39a694769de620936e8ee9d4af40a65f356928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ea39a694769de620936e8ee9d4af40a65f356928.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ea39a694769de620936e8ee9d4af40a65f356928.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\K: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\P: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\R: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\W: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\X: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\E: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\M: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\U: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\L: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\I: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\N: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\T: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\V: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\Y: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\G: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\H: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\O: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\Q: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\S: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\Z: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\F: ea39a694769de620936e8ee9d4af40a65f356928.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf ea39a694769de620936e8ee9d4af40a65f356928.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe ea39a694769de620936e8ee9d4af40a65f356928.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe ea39a694769de620936e8ee9d4af40a65f356928.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI ea39a694769de620936e8ee9d4af40a65f356928.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1844 wrote to memory of 1120 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 18 PID 1844 wrote to memory of 1192 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 22 PID 1844 wrote to memory of 1220 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 19 PID 1844 wrote to memory of 1120 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 18 PID 1844 wrote to memory of 1192 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 22 PID 1844 wrote to memory of 1220 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 19 PID 1844 wrote to memory of 1120 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 18 PID 1844 wrote to memory of 1192 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 22 PID 1844 wrote to memory of 1220 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 19 PID 1844 wrote to memory of 1120 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 18 PID 1844 wrote to memory of 1192 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 22 PID 1844 wrote to memory of 1220 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 19 PID 1844 wrote to memory of 1120 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 18 PID 1844 wrote to memory of 1192 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 22 PID 1844 wrote to memory of 1220 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 19 PID 1844 wrote to memory of 1120 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 18 PID 1844 wrote to memory of 1192 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 22 PID 1844 wrote to memory of 1220 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 19 PID 1844 wrote to memory of 1120 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 18 PID 1844 wrote to memory of 1192 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 22 PID 1844 wrote to memory of 1220 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 19 PID 1844 wrote to memory of 1120 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 18 PID 1844 wrote to memory of 1192 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 22 PID 1844 wrote to memory of 1220 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 19 PID 1844 wrote to memory of 1120 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 18 PID 1844 wrote to memory of 1192 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 22 PID 1844 wrote to memory of 1220 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 19 PID 1844 wrote to memory of 1120 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 18 PID 1844 wrote to memory of 1192 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 22 PID 1844 wrote to memory of 1220 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 19 PID 1844 wrote to memory of 1120 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 18 PID 1844 wrote to memory of 1192 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 22 PID 1844 wrote to memory of 1220 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 19 PID 1844 wrote to memory of 1120 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 18 PID 1844 wrote to memory of 1192 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 22 PID 1844 wrote to memory of 1220 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 19 PID 1844 wrote to memory of 1120 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 18 PID 1844 wrote to memory of 1192 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 22 PID 1844 wrote to memory of 1220 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 19 PID 1844 wrote to memory of 1120 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 18 PID 1844 wrote to memory of 1192 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 22 PID 1844 wrote to memory of 1220 1844 ea39a694769de620936e8ee9d4af40a65f356928.exe 19 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ea39a694769de620936e8ee9d4af40a65f356928.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\ea39a694769de620936e8ee9d4af40a65f356928.exe"C:\Users\Admin\AppData\Local\Temp\ea39a694769de620936e8ee9d4af40a65f356928.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1844
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1192