Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 00:49
Static task
static1
Behavioral task
behavioral1
Sample
09178e1b098eb3dc921313e062773383.exe
Resource
win7-20231215-en
General
-
Target
09178e1b098eb3dc921313e062773383.exe
-
Size
483KB
-
MD5
09178e1b098eb3dc921313e062773383
-
SHA1
25483440587187ed5ab53218b303ec1be0884c98
-
SHA256
41acc6c4738a04d2e9a1fb4cb3972dab5266ae1c4952caf8c719e9405674dc3e
-
SHA512
ddffd2be7e0f841dbfd98a2ffc7106b7a309d4b121b7da87d88b412699447e6e4448179167729720633b255ef650003c148f6f0844036176cb0f169a8d81eff8
-
SSDEEP
12288:OueiQkTrvj4eDCqgrIFXpWHSRptxsW7lZhFWUkTp5k10:OIQkTf4eDYcF5ESzt1IUk
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 09178e1b098eb3dc921313e062773383.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 09178e1b098eb3dc921313e062773383.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 09178e1b098eb3dc921313e062773383.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 09178e1b098eb3dc921313e062773383.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 09178e1b098eb3dc921313e062773383.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 09178e1b098eb3dc921313e062773383.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 09178e1b098eb3dc921313e062773383.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 09178e1b098eb3dc921313e062773383.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 09178e1b098eb3dc921313e062773383.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 09178e1b098eb3dc921313e062773383.exe -
Executes dropped EXE 1 IoCs
pid Process 2356 09178e1b098eb3dc921313e062773383.exe -
resource yara_rule behavioral2/memory/5068-1-0x0000000000810000-0x000000000189E000-memory.dmp upx behavioral2/memory/5068-6-0x0000000000810000-0x000000000189E000-memory.dmp upx behavioral2/memory/5068-30-0x0000000000810000-0x000000000189E000-memory.dmp upx behavioral2/memory/5068-82-0x0000000000810000-0x000000000189E000-memory.dmp upx behavioral2/memory/5068-105-0x0000000000810000-0x000000000189E000-memory.dmp upx behavioral2/memory/5068-38-0x0000000000810000-0x000000000189E000-memory.dmp upx behavioral2/memory/5068-34-0x0000000000810000-0x000000000189E000-memory.dmp upx behavioral2/memory/5068-27-0x0000000000810000-0x000000000189E000-memory.dmp upx behavioral2/memory/5068-24-0x0000000000810000-0x000000000189E000-memory.dmp upx behavioral2/memory/5068-20-0x0000000000810000-0x000000000189E000-memory.dmp upx behavioral2/memory/5068-9-0x0000000000810000-0x000000000189E000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 09178e1b098eb3dc921313e062773383.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 09178e1b098eb3dc921313e062773383.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc 09178e1b098eb3dc921313e062773383.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 09178e1b098eb3dc921313e062773383.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 09178e1b098eb3dc921313e062773383.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 09178e1b098eb3dc921313e062773383.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 09178e1b098eb3dc921313e062773383.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 09178e1b098eb3dc921313e062773383.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5068 set thread context of 2356 5068 09178e1b098eb3dc921313e062773383.exe 88 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI 09178e1b098eb3dc921313e062773383.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5068 09178e1b098eb3dc921313e062773383.exe 5068 09178e1b098eb3dc921313e062773383.exe 2356 09178e1b098eb3dc921313e062773383.exe 2356 09178e1b098eb3dc921313e062773383.exe 2356 09178e1b098eb3dc921313e062773383.exe 2356 09178e1b098eb3dc921313e062773383.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe Token: SeDebugPrivilege 5068 09178e1b098eb3dc921313e062773383.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 5068 wrote to memory of 772 5068 09178e1b098eb3dc921313e062773383.exe 61 PID 5068 wrote to memory of 780 5068 09178e1b098eb3dc921313e062773383.exe 60 PID 5068 wrote to memory of 376 5068 09178e1b098eb3dc921313e062773383.exe 8 PID 5068 wrote to memory of 2592 5068 09178e1b098eb3dc921313e062773383.exe 34 PID 5068 wrote to memory of 2604 5068 09178e1b098eb3dc921313e062773383.exe 33 PID 5068 wrote to memory of 3056 5068 09178e1b098eb3dc921313e062773383.exe 27 PID 5068 wrote to memory of 3512 5068 09178e1b098eb3dc921313e062773383.exe 24 PID 5068 wrote to memory of 3672 5068 09178e1b098eb3dc921313e062773383.exe 23 PID 5068 wrote to memory of 3856 5068 09178e1b098eb3dc921313e062773383.exe 22 PID 5068 wrote to memory of 3952 5068 09178e1b098eb3dc921313e062773383.exe 21 PID 5068 wrote to memory of 4016 5068 09178e1b098eb3dc921313e062773383.exe 20 PID 5068 wrote to memory of 4092 5068 09178e1b098eb3dc921313e062773383.exe 86 PID 5068 wrote to memory of 4224 5068 09178e1b098eb3dc921313e062773383.exe 85 PID 5068 wrote to memory of 4496 5068 09178e1b098eb3dc921313e062773383.exe 73 PID 5068 wrote to memory of 864 5068 09178e1b098eb3dc921313e062773383.exe 72 PID 5068 wrote to memory of 4072 5068 09178e1b098eb3dc921313e062773383.exe 65 PID 5068 wrote to memory of 4568 5068 09178e1b098eb3dc921313e062773383.exe 64 PID 5068 wrote to memory of 4508 5068 09178e1b098eb3dc921313e062773383.exe 63 PID 5068 wrote to memory of 2356 5068 09178e1b098eb3dc921313e062773383.exe 88 PID 5068 wrote to memory of 2356 5068 09178e1b098eb3dc921313e062773383.exe 88 PID 5068 wrote to memory of 2356 5068 09178e1b098eb3dc921313e062773383.exe 88 PID 5068 wrote to memory of 2356 5068 09178e1b098eb3dc921313e062773383.exe 88 PID 5068 wrote to memory of 2356 5068 09178e1b098eb3dc921313e062773383.exe 88 PID 5068 wrote to memory of 2356 5068 09178e1b098eb3dc921313e062773383.exe 88 PID 2356 wrote to memory of 3512 2356 09178e1b098eb3dc921313e062773383.exe 24 PID 2356 wrote to memory of 3512 2356 09178e1b098eb3dc921313e062773383.exe 24 PID 2356 wrote to memory of 3512 2356 09178e1b098eb3dc921313e062773383.exe 24 PID 2356 wrote to memory of 3512 2356 09178e1b098eb3dc921313e062773383.exe 24 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 09178e1b098eb3dc921313e062773383.exe
Processes
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:376
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4016
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3952
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3856
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3672
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\09178e1b098eb3dc921313e062773383.exe"C:\Users\Admin\AppData\Local\Temp\09178e1b098eb3dc921313e062773383.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\09178e1b098eb3dc921313e062773383.exeC:\Users\Admin\AppData\Local\Temp\09178e1b098eb3dc921313e062773383.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2356
-
-
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:3056
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2604
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2592
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:780
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:772
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:4508
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:4568
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX53ypgrj20bgndg05hj3tc7z654myszwp.mca1⤵PID:4072
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:864
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:4496
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4224
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4092
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1