Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
16-10-2023 18:16
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2f8f1a7d2d83e031e1b653a62a202e40.dll
Resource
win7-20230831-en
General
-
Target
NEAS.2f8f1a7d2d83e031e1b653a62a202e40.dll
-
Size
120KB
-
MD5
2f8f1a7d2d83e031e1b653a62a202e40
-
SHA1
8855940cb1da20081eb0b27c16e29d90eda88e22
-
SHA256
6bfba7218643035346ae2a325fb285991834ad23fae33848dcdf0155b50b855c
-
SHA512
cdaa186964ba1d10854526bd908d7ada91cb2826951c7551bffd8ccc660371e423386142712dcfd120dca5ec757b61ea7f15e9960bd47b48ee66e52ee97cc751
-
SSDEEP
3072:qCtZJqnslK4xUT6/zTONON3Rvo4MB7SDVI+qlcG1d:7au/zT7Nhvo4MtSDVI+GH
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f769a5c.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f769a5c.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f769a5c.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f769a5c.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f769a5c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f769a5c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f769a5c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f769a5c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f769a5c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f769a5c.exe -
Executes dropped EXE 3 IoCs
pid Process 2036 f769a5c.exe 2888 f76a17d.exe 2532 f76b3a6.exe -
Loads dropped DLL 6 IoCs
pid Process 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe -
resource yara_rule behavioral1/memory/2036-13-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2036-15-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2036-16-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2036-19-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2036-24-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2036-28-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2036-34-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2036-47-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2036-54-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2036-61-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2036-62-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2036-63-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2036-64-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2036-78-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2036-80-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2036-82-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2036-83-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2036-84-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2036-87-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2036-109-0x0000000000520000-0x00000000015DA000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f769a5c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f769a5c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f769a5c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f769a5c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f769a5c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f769a5c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f769a5c.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f769a5c.exe -
Enumerates connected drives 3 TTPs 9 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: f769a5c.exe File opened (read-only) \??\L: f769a5c.exe File opened (read-only) \??\M: f769a5c.exe File opened (read-only) \??\N: f769a5c.exe File opened (read-only) \??\E: f769a5c.exe File opened (read-only) \??\H: f769a5c.exe File opened (read-only) \??\I: f769a5c.exe File opened (read-only) \??\J: f769a5c.exe File opened (read-only) \??\K: f769a5c.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\f769c01 f769a5c.exe File opened for modification C:\Windows\SYSTEM.INI f769a5c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2036 f769a5c.exe 2036 f769a5c.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 2036 f769a5c.exe Token: SeDebugPrivilege 2036 f769a5c.exe Token: SeDebugPrivilege 2036 f769a5c.exe Token: SeDebugPrivilege 2036 f769a5c.exe Token: SeDebugPrivilege 2036 f769a5c.exe Token: SeDebugPrivilege 2036 f769a5c.exe Token: SeDebugPrivilege 2036 f769a5c.exe Token: SeDebugPrivilege 2036 f769a5c.exe Token: SeDebugPrivilege 2036 f769a5c.exe Token: SeDebugPrivilege 2036 f769a5c.exe Token: SeDebugPrivilege 2036 f769a5c.exe Token: SeDebugPrivilege 2036 f769a5c.exe Token: SeDebugPrivilege 2036 f769a5c.exe Token: SeDebugPrivilege 2036 f769a5c.exe Token: SeDebugPrivilege 2036 f769a5c.exe Token: SeDebugPrivilege 2036 f769a5c.exe Token: SeDebugPrivilege 2036 f769a5c.exe Token: SeDebugPrivilege 2036 f769a5c.exe Token: SeDebugPrivilege 2036 f769a5c.exe Token: SeDebugPrivilege 2036 f769a5c.exe Token: SeDebugPrivilege 2036 f769a5c.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2456 wrote to memory of 2268 2456 rundll32.exe 28 PID 2456 wrote to memory of 2268 2456 rundll32.exe 28 PID 2456 wrote to memory of 2268 2456 rundll32.exe 28 PID 2456 wrote to memory of 2268 2456 rundll32.exe 28 PID 2456 wrote to memory of 2268 2456 rundll32.exe 28 PID 2456 wrote to memory of 2268 2456 rundll32.exe 28 PID 2456 wrote to memory of 2268 2456 rundll32.exe 28 PID 2268 wrote to memory of 2036 2268 rundll32.exe 29 PID 2268 wrote to memory of 2036 2268 rundll32.exe 29 PID 2268 wrote to memory of 2036 2268 rundll32.exe 29 PID 2268 wrote to memory of 2036 2268 rundll32.exe 29 PID 2036 wrote to memory of 1120 2036 f769a5c.exe 16 PID 2036 wrote to memory of 1172 2036 f769a5c.exe 14 PID 2036 wrote to memory of 1200 2036 f769a5c.exe 15 PID 2036 wrote to memory of 1832 2036 f769a5c.exe 22 PID 2036 wrote to memory of 2456 2036 f769a5c.exe 27 PID 2036 wrote to memory of 2268 2036 f769a5c.exe 28 PID 2036 wrote to memory of 2268 2036 f769a5c.exe 28 PID 2268 wrote to memory of 2888 2268 rundll32.exe 30 PID 2268 wrote to memory of 2888 2268 rundll32.exe 30 PID 2268 wrote to memory of 2888 2268 rundll32.exe 30 PID 2268 wrote to memory of 2888 2268 rundll32.exe 30 PID 2268 wrote to memory of 2532 2268 rundll32.exe 31 PID 2268 wrote to memory of 2532 2268 rundll32.exe 31 PID 2268 wrote to memory of 2532 2268 rundll32.exe 31 PID 2268 wrote to memory of 2532 2268 rundll32.exe 31 PID 2036 wrote to memory of 1120 2036 f769a5c.exe 16 PID 2036 wrote to memory of 1172 2036 f769a5c.exe 14 PID 2036 wrote to memory of 1200 2036 f769a5c.exe 15 PID 2036 wrote to memory of 2888 2036 f769a5c.exe 30 PID 2036 wrote to memory of 2888 2036 f769a5c.exe 30 PID 2036 wrote to memory of 2532 2036 f769a5c.exe 31 PID 2036 wrote to memory of 2532 2036 f769a5c.exe 31 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f769a5c.exe
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.2f8f1a7d2d83e031e1b653a62a202e40.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.2f8f1a7d2d83e031e1b653a62a202e40.dll,#13⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\f769a5c.exeC:\Users\Admin\AppData\Local\Temp\f769a5c.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\f76a17d.exeC:\Users\Admin\AppData\Local\Temp\f76a17d.exe4⤵
- Executes dropped EXE
PID:2888
-
-
C:\Users\Admin\AppData\Local\Temp\f76b3a6.exeC:\Users\Admin\AppData\Local\Temp\f76b3a6.exe4⤵
- Executes dropped EXE
PID:2532
-
-
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1832
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD5ce9b93548dd566470f82b741c87d2220
SHA1e21792535f4a9cd9e87677352649f53b6f88790e
SHA2563e542d9c025dd9e325fb88ddcda6b90bf96bf18d1b6f48af069558159e32c1be
SHA51253bfe96e16c029bd54859f8935e9788cabf103220cb71ee5c1ca22245bf481fca2dc62cab93bc7368e6c43d228799a613d5627c5b9ffb173a31923ae7f0d9ebf
-
Filesize
97KB
MD5ce9b93548dd566470f82b741c87d2220
SHA1e21792535f4a9cd9e87677352649f53b6f88790e
SHA2563e542d9c025dd9e325fb88ddcda6b90bf96bf18d1b6f48af069558159e32c1be
SHA51253bfe96e16c029bd54859f8935e9788cabf103220cb71ee5c1ca22245bf481fca2dc62cab93bc7368e6c43d228799a613d5627c5b9ffb173a31923ae7f0d9ebf
-
Filesize
97KB
MD5ce9b93548dd566470f82b741c87d2220
SHA1e21792535f4a9cd9e87677352649f53b6f88790e
SHA2563e542d9c025dd9e325fb88ddcda6b90bf96bf18d1b6f48af069558159e32c1be
SHA51253bfe96e16c029bd54859f8935e9788cabf103220cb71ee5c1ca22245bf481fca2dc62cab93bc7368e6c43d228799a613d5627c5b9ffb173a31923ae7f0d9ebf
-
Filesize
97KB
MD5ce9b93548dd566470f82b741c87d2220
SHA1e21792535f4a9cd9e87677352649f53b6f88790e
SHA2563e542d9c025dd9e325fb88ddcda6b90bf96bf18d1b6f48af069558159e32c1be
SHA51253bfe96e16c029bd54859f8935e9788cabf103220cb71ee5c1ca22245bf481fca2dc62cab93bc7368e6c43d228799a613d5627c5b9ffb173a31923ae7f0d9ebf
-
Filesize
97KB
MD5ce9b93548dd566470f82b741c87d2220
SHA1e21792535f4a9cd9e87677352649f53b6f88790e
SHA2563e542d9c025dd9e325fb88ddcda6b90bf96bf18d1b6f48af069558159e32c1be
SHA51253bfe96e16c029bd54859f8935e9788cabf103220cb71ee5c1ca22245bf481fca2dc62cab93bc7368e6c43d228799a613d5627c5b9ffb173a31923ae7f0d9ebf
-
Filesize
97KB
MD5ce9b93548dd566470f82b741c87d2220
SHA1e21792535f4a9cd9e87677352649f53b6f88790e
SHA2563e542d9c025dd9e325fb88ddcda6b90bf96bf18d1b6f48af069558159e32c1be
SHA51253bfe96e16c029bd54859f8935e9788cabf103220cb71ee5c1ca22245bf481fca2dc62cab93bc7368e6c43d228799a613d5627c5b9ffb173a31923ae7f0d9ebf
-
Filesize
97KB
MD5ce9b93548dd566470f82b741c87d2220
SHA1e21792535f4a9cd9e87677352649f53b6f88790e
SHA2563e542d9c025dd9e325fb88ddcda6b90bf96bf18d1b6f48af069558159e32c1be
SHA51253bfe96e16c029bd54859f8935e9788cabf103220cb71ee5c1ca22245bf481fca2dc62cab93bc7368e6c43d228799a613d5627c5b9ffb173a31923ae7f0d9ebf
-
Filesize
97KB
MD5ce9b93548dd566470f82b741c87d2220
SHA1e21792535f4a9cd9e87677352649f53b6f88790e
SHA2563e542d9c025dd9e325fb88ddcda6b90bf96bf18d1b6f48af069558159e32c1be
SHA51253bfe96e16c029bd54859f8935e9788cabf103220cb71ee5c1ca22245bf481fca2dc62cab93bc7368e6c43d228799a613d5627c5b9ffb173a31923ae7f0d9ebf
-
Filesize
97KB
MD5ce9b93548dd566470f82b741c87d2220
SHA1e21792535f4a9cd9e87677352649f53b6f88790e
SHA2563e542d9c025dd9e325fb88ddcda6b90bf96bf18d1b6f48af069558159e32c1be
SHA51253bfe96e16c029bd54859f8935e9788cabf103220cb71ee5c1ca22245bf481fca2dc62cab93bc7368e6c43d228799a613d5627c5b9ffb173a31923ae7f0d9ebf
-
Filesize
97KB
MD5ce9b93548dd566470f82b741c87d2220
SHA1e21792535f4a9cd9e87677352649f53b6f88790e
SHA2563e542d9c025dd9e325fb88ddcda6b90bf96bf18d1b6f48af069558159e32c1be
SHA51253bfe96e16c029bd54859f8935e9788cabf103220cb71ee5c1ca22245bf481fca2dc62cab93bc7368e6c43d228799a613d5627c5b9ffb173a31923ae7f0d9ebf