Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 04:12

General

  • Target

    27acf4e6cca08d728656c8827dc836d5.dll

  • Size

    120KB

  • MD5

    27acf4e6cca08d728656c8827dc836d5

  • SHA1

    100087eb818353cd2a5bd9cee1f963be6fe0deb5

  • SHA256

    090aa7e7292da49033f4a6276fc4797cfdf907d34f604c2af946a34759359829

  • SHA512

    702d58170e28e25a576cbccc7a4c9d25fc03e06750f9ca39162e7270e2d26850e289c5dc89902a33784b1bd72fa36cdd796d0f7837a190a0b6f77ae9dcd36dd3

  • SSDEEP

    3072:DA81470GjvqAOm9gM8oNqi26hitWzB7151/vlw:DAY4wGDqTm9g8qpWzD513i

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Signatures

  • Modifies firewall policy service 2 TTPs 6 IoCs
  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • UAC bypass 3 TTPs 2 IoCs
  • Windows security bypass 2 TTPs 12 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 14 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 11 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 41 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1120
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1260
        • C:\Windows\system32\rundll32.exe
          rundll32.exe C:\Users\Admin\AppData\Local\Temp\27acf4e6cca08d728656c8827dc836d5.dll,#1
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1964
          • C:\Windows\SysWOW64\rundll32.exe
            rundll32.exe C:\Users\Admin\AppData\Local\Temp\27acf4e6cca08d728656c8827dc836d5.dll,#1
            3⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2088
            • C:\Users\Admin\AppData\Local\Temp\f7649fb.exe
              C:\Users\Admin\AppData\Local\Temp\f7649fb.exe
              4⤵
              • Modifies firewall policy service
              • UAC bypass
              • Windows security bypass
              • Executes dropped EXE
              • Windows security modification
              • Checks whether UAC is enabled
              • Enumerates connected drives
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:2400
            • C:\Users\Admin\AppData\Local\Temp\f7650de.exe
              C:\Users\Admin\AppData\Local\Temp\f7650de.exe
              4⤵
              • Executes dropped EXE
              PID:2596
            • C:\Users\Admin\AppData\Local\Temp\f7666ed.exe
              C:\Users\Admin\AppData\Local\Temp\f7666ed.exe
              4⤵
              • Modifies firewall policy service
              • UAC bypass
              • Windows security bypass
              • Executes dropped EXE
              • Windows security modification
              • Checks whether UAC is enabled
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:1668
      • C:\Windows\system32\Dwm.exe
        "C:\Windows\system32\Dwm.exe"
        1⤵
          PID:1216
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1412

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SYSTEM.INI

            Filesize

            257B

            MD5

            1597ad7459f68b8a9f7f8ac8334ee282

            SHA1

            9a8d3d6ed598b0a4ed834567c155a5f7b319e88f

            SHA256

            791b5081015f738a8b10dd0b51da1b072225b16704432f10f8a237f5a95d7a17

            SHA512

            66678a6f656a460d62e9b2f15ba3c347c7c5b5c061141c4fe2ce798f5462fd098110c8158a195aecfe84f6547db95f8a2d57d06a2e276fadb8d036cf87ba1455

          • \Users\Admin\AppData\Local\Temp\f7649fb.exe

            Filesize

            97KB

            MD5

            856a7f2fabd3751bb30162757d1045be

            SHA1

            10e3b2077c0373a630053dbadbd5adb92af0635a

            SHA256

            08c5a2a819a0afdc7d8800cdfebe393653ad3d207dca648f33928ea0a5424434

            SHA512

            63171d1394e0bef5304427bc2940e7325e5f98de2550e8575f26d2c2bcf1e0ebfa212740c291bf38cab54e1ea045681d616f94dc943a8e3c99343fa0cf6d65fd

          • \Users\Admin\AppData\Local\Temp\f7650de.exe

            Filesize

            63KB

            MD5

            053047de4baad4b394225a29222f809e

            SHA1

            b691de09be7291ec6a52bc4465382da441e06f4e

            SHA256

            371aad37331cb5b4d18973d4aa6cb00fd6ee0ca001e367557a3941bfc5a59323

            SHA512

            94be98e9a6fc58acaea884eb2bb344cea12cb6a42d4e458fa7e6c8e28a5b2f8c70d68e6642c740e743cbc9c1428e2358c7fd888a072b2a62c2d183cec272af95

          • memory/1120-15-0x0000000000490000-0x0000000000492000-memory.dmp

            Filesize

            8KB

          • memory/1668-78-0x0000000000400000-0x0000000000412000-memory.dmp

            Filesize

            72KB

          • memory/1668-104-0x00000000002B0000-0x00000000002B1000-memory.dmp

            Filesize

            4KB

          • memory/1668-103-0x0000000000260000-0x0000000000262000-memory.dmp

            Filesize

            8KB

          • memory/1668-185-0x00000000009B0000-0x0000000001A6A000-memory.dmp

            Filesize

            16.7MB

          • memory/1668-186-0x0000000000400000-0x0000000000412000-memory.dmp

            Filesize

            72KB

          • memory/1668-148-0x00000000009B0000-0x0000000001A6A000-memory.dmp

            Filesize

            16.7MB

          • memory/2088-27-0x00000000001B0000-0x00000000001B1000-memory.dmp

            Filesize

            4KB

          • memory/2088-31-0x00000000001A0000-0x00000000001A2000-memory.dmp

            Filesize

            8KB

          • memory/2088-33-0x00000000001B0000-0x00000000001B1000-memory.dmp

            Filesize

            4KB

          • memory/2088-26-0x00000000001A0000-0x00000000001A2000-memory.dmp

            Filesize

            8KB

          • memory/2088-43-0x0000000000280000-0x0000000000292000-memory.dmp

            Filesize

            72KB

          • memory/2088-45-0x0000000000280000-0x0000000000292000-memory.dmp

            Filesize

            72KB

          • memory/2088-8-0x0000000000400000-0x0000000000412000-memory.dmp

            Filesize

            72KB

          • memory/2088-72-0x00000000001A0000-0x00000000001A2000-memory.dmp

            Filesize

            8KB

          • memory/2088-74-0x0000000000280000-0x0000000000292000-memory.dmp

            Filesize

            72KB

          • memory/2088-1-0x0000000010000000-0x0000000010020000-memory.dmp

            Filesize

            128KB

          • memory/2088-77-0x0000000000280000-0x0000000000292000-memory.dmp

            Filesize

            72KB

          • memory/2400-60-0x0000000000670000-0x000000000172A000-memory.dmp

            Filesize

            16.7MB

          • memory/2400-81-0x0000000000670000-0x000000000172A000-memory.dmp

            Filesize

            16.7MB

          • memory/2400-10-0x0000000000400000-0x0000000000412000-memory.dmp

            Filesize

            72KB

          • memory/2400-29-0x0000000000670000-0x000000000172A000-memory.dmp

            Filesize

            16.7MB

          • memory/2400-59-0x0000000000670000-0x000000000172A000-memory.dmp

            Filesize

            16.7MB

          • memory/2400-57-0x00000000002F0000-0x00000000002F1000-memory.dmp

            Filesize

            4KB

          • memory/2400-61-0x0000000000670000-0x000000000172A000-memory.dmp

            Filesize

            16.7MB

          • memory/2400-62-0x0000000000670000-0x000000000172A000-memory.dmp

            Filesize

            16.7MB

          • memory/2400-63-0x0000000000670000-0x000000000172A000-memory.dmp

            Filesize

            16.7MB

          • memory/2400-56-0x0000000000670000-0x000000000172A000-memory.dmp

            Filesize

            16.7MB

          • memory/2400-54-0x00000000002E0000-0x00000000002E2000-memory.dmp

            Filesize

            8KB

          • memory/2400-44-0x0000000000670000-0x000000000172A000-memory.dmp

            Filesize

            16.7MB

          • memory/2400-24-0x0000000000670000-0x000000000172A000-memory.dmp

            Filesize

            16.7MB

          • memory/2400-79-0x0000000000670000-0x000000000172A000-memory.dmp

            Filesize

            16.7MB

          • memory/2400-80-0x0000000000670000-0x000000000172A000-memory.dmp

            Filesize

            16.7MB

          • memory/2400-58-0x0000000000670000-0x000000000172A000-memory.dmp

            Filesize

            16.7MB

          • memory/2400-83-0x0000000000670000-0x000000000172A000-memory.dmp

            Filesize

            16.7MB

          • memory/2400-85-0x0000000000670000-0x000000000172A000-memory.dmp

            Filesize

            16.7MB

          • memory/2400-11-0x0000000000670000-0x000000000172A000-memory.dmp

            Filesize

            16.7MB

          • memory/2400-13-0x0000000000670000-0x000000000172A000-memory.dmp

            Filesize

            16.7MB

          • memory/2400-21-0x0000000000670000-0x000000000172A000-memory.dmp

            Filesize

            16.7MB

          • memory/2400-17-0x0000000000670000-0x000000000172A000-memory.dmp

            Filesize

            16.7MB

          • memory/2400-14-0x0000000000670000-0x000000000172A000-memory.dmp

            Filesize

            16.7MB

          • memory/2400-105-0x0000000000670000-0x000000000172A000-memory.dmp

            Filesize

            16.7MB

          • memory/2400-116-0x00000000002E0000-0x00000000002E2000-memory.dmp

            Filesize

            8KB

          • memory/2400-143-0x0000000000400000-0x0000000000412000-memory.dmp

            Filesize

            72KB

          • memory/2400-144-0x0000000000670000-0x000000000172A000-memory.dmp

            Filesize

            16.7MB

          • memory/2596-97-0x00000000002B0000-0x00000000002B1000-memory.dmp

            Filesize

            4KB

          • memory/2596-96-0x0000000000260000-0x0000000000262000-memory.dmp

            Filesize

            8KB

          • memory/2596-95-0x0000000000260000-0x0000000000262000-memory.dmp

            Filesize

            8KB

          • memory/2596-47-0x0000000000400000-0x0000000000412000-memory.dmp

            Filesize

            72KB