Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 04:12
Static task
static1
Behavioral task
behavioral1
Sample
27acf4e6cca08d728656c8827dc836d5.dll
Resource
win7-20231215-en
General
-
Target
27acf4e6cca08d728656c8827dc836d5.dll
-
Size
120KB
-
MD5
27acf4e6cca08d728656c8827dc836d5
-
SHA1
100087eb818353cd2a5bd9cee1f963be6fe0deb5
-
SHA256
090aa7e7292da49033f4a6276fc4797cfdf907d34f604c2af946a34759359829
-
SHA512
702d58170e28e25a576cbccc7a4c9d25fc03e06750f9ca39162e7270e2d26850e289c5dc89902a33784b1bd72fa36cdd796d0f7837a190a0b6f77ae9dcd36dd3
-
SSDEEP
3072:DA81470GjvqAOm9gM8oNqi26hitWzB7151/vlw:DAY4wGDqTm9g8qpWzD513i
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f7666ed.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f7666ed.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f7666ed.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f7649fb.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f7649fb.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f7649fb.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7666ed.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7649fb.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f7649fb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f7666ed.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f7666ed.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f7666ed.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f7666ed.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f7666ed.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f7649fb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f7649fb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f7649fb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f7666ed.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f7649fb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f7649fb.exe -
Executes dropped EXE 3 IoCs
pid Process 2400 f7649fb.exe 2596 f7650de.exe 1668 f7666ed.exe -
Loads dropped DLL 6 IoCs
pid Process 2088 rundll32.exe 2088 rundll32.exe 2088 rundll32.exe 2088 rundll32.exe 2088 rundll32.exe 2088 rundll32.exe -
resource yara_rule behavioral1/memory/2400-11-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2400-13-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2400-14-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2400-17-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2400-21-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2400-24-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2400-44-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2400-56-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2400-58-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2400-29-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2400-59-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2400-60-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2400-61-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2400-62-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2400-63-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2400-79-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2400-80-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2400-81-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2400-83-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2400-85-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2400-105-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2400-144-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/1668-148-0x00000000009B0000-0x0000000001A6A000-memory.dmp upx behavioral1/memory/1668-185-0x00000000009B0000-0x0000000001A6A000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f7649fb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f7649fb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f7666ed.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f7666ed.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f7666ed.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f7649fb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f7649fb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f7666ed.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f7666ed.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f7666ed.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f7649fb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f7649fb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f7649fb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f7666ed.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7649fb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7666ed.exe -
Enumerates connected drives 3 TTPs 11 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: f7649fb.exe File opened (read-only) \??\I: f7649fb.exe File opened (read-only) \??\O: f7649fb.exe File opened (read-only) \??\P: f7649fb.exe File opened (read-only) \??\L: f7649fb.exe File opened (read-only) \??\M: f7649fb.exe File opened (read-only) \??\N: f7649fb.exe File opened (read-only) \??\G: f7649fb.exe File opened (read-only) \??\H: f7649fb.exe File opened (read-only) \??\J: f7649fb.exe File opened (read-only) \??\K: f7649fb.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI f7649fb.exe File created C:\Windows\f76a40c f7666ed.exe File created C:\Windows\f764b04 f7649fb.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2400 f7649fb.exe 2400 f7649fb.exe 1668 f7666ed.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeDebugPrivilege 2400 f7649fb.exe Token: SeDebugPrivilege 2400 f7649fb.exe Token: SeDebugPrivilege 2400 f7649fb.exe Token: SeDebugPrivilege 2400 f7649fb.exe Token: SeDebugPrivilege 2400 f7649fb.exe Token: SeDebugPrivilege 2400 f7649fb.exe Token: SeDebugPrivilege 2400 f7649fb.exe Token: SeDebugPrivilege 2400 f7649fb.exe Token: SeDebugPrivilege 2400 f7649fb.exe Token: SeDebugPrivilege 2400 f7649fb.exe Token: SeDebugPrivilege 2400 f7649fb.exe Token: SeDebugPrivilege 2400 f7649fb.exe Token: SeDebugPrivilege 2400 f7649fb.exe Token: SeDebugPrivilege 2400 f7649fb.exe Token: SeDebugPrivilege 2400 f7649fb.exe Token: SeDebugPrivilege 2400 f7649fb.exe Token: SeDebugPrivilege 2400 f7649fb.exe Token: SeDebugPrivilege 2400 f7649fb.exe Token: SeDebugPrivilege 2400 f7649fb.exe Token: SeDebugPrivilege 2400 f7649fb.exe Token: SeDebugPrivilege 2400 f7649fb.exe Token: SeDebugPrivilege 1668 f7666ed.exe Token: SeDebugPrivilege 1668 f7666ed.exe Token: SeDebugPrivilege 1668 f7666ed.exe Token: SeDebugPrivilege 1668 f7666ed.exe Token: SeDebugPrivilege 1668 f7666ed.exe Token: SeDebugPrivilege 1668 f7666ed.exe Token: SeDebugPrivilege 1668 f7666ed.exe Token: SeDebugPrivilege 1668 f7666ed.exe Token: SeDebugPrivilege 1668 f7666ed.exe Token: SeDebugPrivilege 1668 f7666ed.exe Token: SeDebugPrivilege 1668 f7666ed.exe Token: SeDebugPrivilege 1668 f7666ed.exe Token: SeDebugPrivilege 1668 f7666ed.exe Token: SeDebugPrivilege 1668 f7666ed.exe Token: SeDebugPrivilege 1668 f7666ed.exe Token: SeDebugPrivilege 1668 f7666ed.exe Token: SeDebugPrivilege 1668 f7666ed.exe Token: SeDebugPrivilege 1668 f7666ed.exe Token: SeDebugPrivilege 1668 f7666ed.exe Token: SeDebugPrivilege 1668 f7666ed.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2088 1964 rundll32.exe 28 PID 1964 wrote to memory of 2088 1964 rundll32.exe 28 PID 1964 wrote to memory of 2088 1964 rundll32.exe 28 PID 1964 wrote to memory of 2088 1964 rundll32.exe 28 PID 1964 wrote to memory of 2088 1964 rundll32.exe 28 PID 1964 wrote to memory of 2088 1964 rundll32.exe 28 PID 1964 wrote to memory of 2088 1964 rundll32.exe 28 PID 2088 wrote to memory of 2400 2088 rundll32.exe 29 PID 2088 wrote to memory of 2400 2088 rundll32.exe 29 PID 2088 wrote to memory of 2400 2088 rundll32.exe 29 PID 2088 wrote to memory of 2400 2088 rundll32.exe 29 PID 2400 wrote to memory of 1120 2400 f7649fb.exe 14 PID 2400 wrote to memory of 1216 2400 f7649fb.exe 19 PID 2400 wrote to memory of 1260 2400 f7649fb.exe 18 PID 2400 wrote to memory of 1412 2400 f7649fb.exe 23 PID 2400 wrote to memory of 1964 2400 f7649fb.exe 27 PID 2400 wrote to memory of 2088 2400 f7649fb.exe 28 PID 2400 wrote to memory of 2088 2400 f7649fb.exe 28 PID 2088 wrote to memory of 2596 2088 rundll32.exe 30 PID 2088 wrote to memory of 2596 2088 rundll32.exe 30 PID 2088 wrote to memory of 2596 2088 rundll32.exe 30 PID 2088 wrote to memory of 2596 2088 rundll32.exe 30 PID 2088 wrote to memory of 1668 2088 rundll32.exe 31 PID 2088 wrote to memory of 1668 2088 rundll32.exe 31 PID 2088 wrote to memory of 1668 2088 rundll32.exe 31 PID 2088 wrote to memory of 1668 2088 rundll32.exe 31 PID 2400 wrote to memory of 1120 2400 f7649fb.exe 14 PID 2400 wrote to memory of 1216 2400 f7649fb.exe 19 PID 2400 wrote to memory of 1260 2400 f7649fb.exe 18 PID 2400 wrote to memory of 2596 2400 f7649fb.exe 30 PID 2400 wrote to memory of 2596 2400 f7649fb.exe 30 PID 2400 wrote to memory of 1668 2400 f7649fb.exe 31 PID 2400 wrote to memory of 1668 2400 f7649fb.exe 31 PID 1668 wrote to memory of 1120 1668 f7666ed.exe 14 PID 1668 wrote to memory of 1216 1668 f7666ed.exe 19 PID 1668 wrote to memory of 1260 1668 f7666ed.exe 18 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7649fb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7666ed.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1260
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\27acf4e6cca08d728656c8827dc836d5.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\27acf4e6cca08d728656c8827dc836d5.dll,#13⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\f7649fb.exeC:\Users\Admin\AppData\Local\Temp\f7649fb.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2400
-
-
C:\Users\Admin\AppData\Local\Temp\f7650de.exeC:\Users\Admin\AppData\Local\Temp\f7650de.exe4⤵
- Executes dropped EXE
PID:2596
-
-
C:\Users\Admin\AppData\Local\Temp\f7666ed.exeC:\Users\Admin\AppData\Local\Temp\f7666ed.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1668
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1216
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1412
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD51597ad7459f68b8a9f7f8ac8334ee282
SHA19a8d3d6ed598b0a4ed834567c155a5f7b319e88f
SHA256791b5081015f738a8b10dd0b51da1b072225b16704432f10f8a237f5a95d7a17
SHA51266678a6f656a460d62e9b2f15ba3c347c7c5b5c061141c4fe2ce798f5462fd098110c8158a195aecfe84f6547db95f8a2d57d06a2e276fadb8d036cf87ba1455
-
Filesize
97KB
MD5856a7f2fabd3751bb30162757d1045be
SHA110e3b2077c0373a630053dbadbd5adb92af0635a
SHA25608c5a2a819a0afdc7d8800cdfebe393653ad3d207dca648f33928ea0a5424434
SHA51263171d1394e0bef5304427bc2940e7325e5f98de2550e8575f26d2c2bcf1e0ebfa212740c291bf38cab54e1ea045681d616f94dc943a8e3c99343fa0cf6d65fd
-
Filesize
63KB
MD5053047de4baad4b394225a29222f809e
SHA1b691de09be7291ec6a52bc4465382da441e06f4e
SHA256371aad37331cb5b4d18973d4aa6cb00fd6ee0ca001e367557a3941bfc5a59323
SHA51294be98e9a6fc58acaea884eb2bb344cea12cb6a42d4e458fa7e6c8e28a5b2f8c70d68e6642c740e743cbc9c1428e2358c7fd888a072b2a62c2d183cec272af95