Analysis
-
max time kernel
1s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 21:18
Static task
static1
Behavioral task
behavioral1
Sample
1cbe74a3e65295b0275a71185255b044.exe
Resource
win7-20231215-en
General
-
Target
1cbe74a3e65295b0275a71185255b044.exe
-
Size
125KB
-
MD5
1cbe74a3e65295b0275a71185255b044
-
SHA1
84add6eed96d457fda9b312da7544907cfb7cd6a
-
SHA256
325c00179fd77b03313feb95eff0edb5368ded2dee5166b6f4c8491ec9ddb5b7
-
SHA512
b588100a52c3e73186feca416532564b400c46ad31e8818ba38ba59fe94fbcf1857d6bb653ec7a101fbf3b8e9d919b4f75eb1c906eb20ff002cf37f74c23f2f1
-
SSDEEP
1536:989sh+HK3HeB3SQLJ3cZZlUBPnMPJ6OcWxnQHWmlDsmqB0zyyOUSJdTAjsJf3/5P:S9A3GGZlS/MU5WZQHxamCUSo4Jf3ck
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
http://klkjwre77638dfqwieuoi888.info/
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 1cbe74a3e65295b0275a71185255b044.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 1cbe74a3e65295b0275a71185255b044.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 1cbe74a3e65295b0275a71185255b044.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 1cbe74a3e65295b0275a71185255b044.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 1cbe74a3e65295b0275a71185255b044.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 1cbe74a3e65295b0275a71185255b044.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 1cbe74a3e65295b0275a71185255b044.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 1cbe74a3e65295b0275a71185255b044.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 1cbe74a3e65295b0275a71185255b044.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 1cbe74a3e65295b0275a71185255b044.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" 1cbe74a3e65295b0275a71185255b044.exe -
Disables Task Manager via registry modification
-
resource yara_rule behavioral1/memory/2144-1-0x0000000001E40000-0x0000000002ECE000-memory.dmp upx behavioral1/memory/2144-3-0x0000000001E40000-0x0000000002ECE000-memory.dmp upx behavioral1/memory/2144-4-0x0000000001E40000-0x0000000002ECE000-memory.dmp upx behavioral1/memory/2144-6-0x0000000001E40000-0x0000000002ECE000-memory.dmp upx behavioral1/memory/2144-9-0x0000000001E40000-0x0000000002ECE000-memory.dmp upx behavioral1/memory/2144-12-0x0000000001E40000-0x0000000002ECE000-memory.dmp upx behavioral1/memory/2144-20-0x0000000001E40000-0x0000000002ECE000-memory.dmp upx behavioral1/memory/2144-23-0x0000000001E40000-0x0000000002ECE000-memory.dmp upx behavioral1/memory/2144-26-0x0000000001E40000-0x0000000002ECE000-memory.dmp upx behavioral1/memory/2144-37-0x0000000001E40000-0x0000000002ECE000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 1cbe74a3e65295b0275a71185255b044.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 1cbe74a3e65295b0275a71185255b044.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 1cbe74a3e65295b0275a71185255b044.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 1cbe74a3e65295b0275a71185255b044.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 1cbe74a3e65295b0275a71185255b044.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 1cbe74a3e65295b0275a71185255b044.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 1cbe74a3e65295b0275a71185255b044.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 1cbe74a3e65295b0275a71185255b044.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI 1cbe74a3e65295b0275a71185255b044.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2512 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2144 1cbe74a3e65295b0275a71185255b044.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeDebugPrivilege 2144 1cbe74a3e65295b0275a71185255b044.exe Token: SeDebugPrivilege 2144 1cbe74a3e65295b0275a71185255b044.exe Token: SeDebugPrivilege 2144 1cbe74a3e65295b0275a71185255b044.exe Token: SeDebugPrivilege 2144 1cbe74a3e65295b0275a71185255b044.exe Token: SeDebugPrivilege 2144 1cbe74a3e65295b0275a71185255b044.exe Token: SeDebugPrivilege 2144 1cbe74a3e65295b0275a71185255b044.exe Token: SeDebugPrivilege 2144 1cbe74a3e65295b0275a71185255b044.exe Token: SeDebugPrivilege 2144 1cbe74a3e65295b0275a71185255b044.exe Token: SeDebugPrivilege 2144 1cbe74a3e65295b0275a71185255b044.exe Token: SeDebugPrivilege 2144 1cbe74a3e65295b0275a71185255b044.exe Token: SeDebugPrivilege 2144 1cbe74a3e65295b0275a71185255b044.exe Token: SeDebugPrivilege 2144 1cbe74a3e65295b0275a71185255b044.exe Token: SeDebugPrivilege 2144 1cbe74a3e65295b0275a71185255b044.exe Token: SeDebugPrivilege 2144 1cbe74a3e65295b0275a71185255b044.exe Token: SeDebugPrivilege 2144 1cbe74a3e65295b0275a71185255b044.exe Token: SeDebugPrivilege 2144 1cbe74a3e65295b0275a71185255b044.exe Token: SeDebugPrivilege 2144 1cbe74a3e65295b0275a71185255b044.exe Token: SeDebugPrivilege 2144 1cbe74a3e65295b0275a71185255b044.exe Token: SeDebugPrivilege 2144 1cbe74a3e65295b0275a71185255b044.exe Token: SeDebugPrivilege 2144 1cbe74a3e65295b0275a71185255b044.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2144 wrote to memory of 2512 2144 1cbe74a3e65295b0275a71185255b044.exe 16 PID 2144 wrote to memory of 2512 2144 1cbe74a3e65295b0275a71185255b044.exe 16 PID 2144 wrote to memory of 2512 2144 1cbe74a3e65295b0275a71185255b044.exe 16 PID 2144 wrote to memory of 2512 2144 1cbe74a3e65295b0275a71185255b044.exe 16 PID 2144 wrote to memory of 1052 2144 1cbe74a3e65295b0275a71185255b044.exe 10 PID 2144 wrote to memory of 1096 2144 1cbe74a3e65295b0275a71185255b044.exe 9 PID 2144 wrote to memory of 1104 2144 1cbe74a3e65295b0275a71185255b044.exe 8 PID 2144 wrote to memory of 380 2144 1cbe74a3e65295b0275a71185255b044.exe 4 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 1cbe74a3e65295b0275a71185255b044.exe
Processes
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:380
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1104
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\1cbe74a3e65295b0275a71185255b044.exe"C:\Users\Admin\AppData\Local\Temp\1cbe74a3e65295b0275a71185255b044.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2144 -
C:\Windows\SysWOW64\schtasks.exeC:\Windows\system32\schtasks.exe /create /tn "JavaUpdateAdmin" /tr C:\Users\Admin\AppData\Local\Temp\jusched.exe /sc daily3⤵
- Creates scheduled task(s)
PID:2512
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\system32\schtasks.exe /run /tn "JavaUpdateAdmin"3⤵PID:2832
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1052
-
C:\Windows\system32\taskeng.exetaskeng.exe {327C3F1A-82E9-4AD4-86D4-B40A6EE4836C} S-1-5-21-3601492379-692465709-652514833-1000:CALKHSYM\Admin:Interactive:[1]1⤵PID:2400
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1