Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/01/2024, 23:37

General

  • Target

    576ce942efa95cc4e4883d0b6d627fd36518264fc0fa6075ed3cdb81730dbc2d.exe

  • Size

    2.0MB

  • MD5

    5db56687e8a5f8c6427ce66553e4e114

  • SHA1

    3a12d269e92069003f9df495781014a7c2c792ab

  • SHA256

    576ce942efa95cc4e4883d0b6d627fd36518264fc0fa6075ed3cdb81730dbc2d

  • SHA512

    2a4bafc2784776a17bb079cbf6e7a0b29f3e611e07eba10bcad8cb18b0f268a027caf848ab2ab2ee240826c7f3686944addb9ebd428cc07ae5cdf121347f61bb

  • SSDEEP

    49152:XHQgiu6miKiBRWWlMO2CRvNEhJUZE+e6128bacag:XLiu6miZB5l+qvuUZhm8bacag

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Signatures

  • Modifies firewall policy service 2 TTPs 3 IoCs
  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 6 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 7 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 34 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 63 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\dwm.exe
    "dwm.exe"
    1⤵
      PID:60
    • C:\Users\Admin\AppData\Local\Temp\576ce942efa95cc4e4883d0b6d627fd36518264fc0fa6075ed3cdb81730dbc2d.exe
      "C:\Users\Admin\AppData\Local\Temp\576ce942efa95cc4e4883d0b6d627fd36518264fc0fa6075ed3cdb81730dbc2d.exe"
      1⤵
      • Modifies firewall policy service
      • UAC bypass
      • Windows security bypass
      • Windows security modification
      • Checks whether UAC is enabled
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2628
      • C:\Program Files (x86)\f284c7fdc9deb65b00c2d2594d40b0e9\loader.exe
        "C:\Users\Admin\AppData\Local\Temp\576ce942efa95cc4e4883d0b6d627fd36518264fc0fa6075ed3cdb81730dbc2d.exe"
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4840
        • C:\Program Files (x86)\f284c7fdc9deb65b00c2d2594d40b0e9\LUpdater.exe
          "C:\Program Files (x86)\f284c7fdc9deb65b00c2d2594d40b0e9\LUpdater.exe" -url=https://update.yxb321.com/files/webuhaozu/Update.xml -e="C:\Program Files (x86)\f284c7fdc9deb65b00c2d2594d40b0e9\webclient.exe" -p="c_uhaozu.zhanghaodaren.com:0" -st=2 -pid=4840
          3⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious use of SetWindowsHookEx
          PID:3156
    • C:\Windows\System32\RuntimeBroker.exe
      C:\Windows\System32\RuntimeBroker.exe -Embedding
      1⤵
        PID:3628
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
          PID:4060
        • C:\Windows\System32\RuntimeBroker.exe
          C:\Windows\System32\RuntimeBroker.exe -Embedding
          1⤵
            PID:3976
          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
            1⤵
              PID:3908
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
              1⤵
                PID:3816
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                1⤵
                  PID:3608
                • C:\Windows\Explorer.EXE
                  C:\Windows\Explorer.EXE
                  1⤵
                    PID:3476
                  • C:\Windows\system32\taskhostw.exe
                    taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                    1⤵
                      PID:2680
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                      1⤵
                        PID:2536
                      • C:\Windows\system32\sihost.exe
                        sihost.exe
                        1⤵
                          PID:2520
                        • C:\Windows\system32\fontdrvhost.exe
                          "fontdrvhost.exe"
                          1⤵
                            PID:764
                          • C:\Windows\system32\fontdrvhost.exe
                            "fontdrvhost.exe"
                            1⤵
                              PID:760

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Program Files (x86)\f284c7fdc9deb65b00c2d2594d40b0e9\.temp\webuhaozu.xml

                              Filesize

                              9KB

                              MD5

                              6129b497ff66d24c2ed132afb84a1fa2

                              SHA1

                              946233b90552aa512932138419c106ff166651e9

                              SHA256

                              05f8c5e26bc01f9cc90f25a06baef907225e9dc84d4168d96a287e1c51ce4aa8

                              SHA512

                              cda0d21b1ffe0b818a70b832a7d0df748eed23e09986c0e610abc00c694fe8f685430c81fe7d8a4dd90910be50b29d2870d39a0f097dcae14b28a29ba4e576cb

                            • C:\Program Files (x86)\f284c7fdc9deb65b00c2d2594d40b0e9\LUPDATER\2024-01-13.log

                              Filesize

                              979B

                              MD5

                              1cfab9f4aeb50b6783056b85b862b182

                              SHA1

                              68bce2e3ac26c418e6dfe219c8a12de403d3550a

                              SHA256

                              051ce55b17a15c1c54908a93faed091adf0e5d71b54b9d15e63221d09fa80d70

                              SHA512

                              c0d7da2e0fe970fd81bde0d26b6e3365ad6e99bc710ff735dcc2f98c9c8265ec2f457289e8fea73b50fa9c48899ce5d27244ffcb25d0c8dca5ed29d4c69dd5cf

                            • C:\Program Files (x86)\f284c7fdc9deb65b00c2d2594d40b0e9\LUpdater.exe

                              Filesize

                              848KB

                              MD5

                              554dff876b438ec403a13e637aa500b1

                              SHA1

                              658789fce7b2833a6cf5a89ed952d4e1dfd4314d

                              SHA256

                              89dbaed7ce62f2e8c0e27ae8a492e6271dd87284a9f9b30e045bee4631c34602

                              SHA512

                              a58ab5f5751ccad283326ade45c28e8298696ad554d06aedb9528d05c042addb8ff3344c9f5aa83da3baa624ae22e9f7aedb9bdf231129ccb0bddac92db0fd53

                            • C:\Program Files (x86)\f284c7fdc9deb65b00c2d2594d40b0e9\config.dat

                              Filesize

                              127B

                              MD5

                              da48fc366362ed07d6e9b402c9d4ea23

                              SHA1

                              da712d05087a19d23a0f3f76732bd7955ecd6941

                              SHA256

                              547bf9ef87398006e8556a230745bdecaa177012ca87f18c62b72118a972a296

                              SHA512

                              d8b6f6889bbeb20e543e80dd1731bda3307d3f5850886aa2db01c76285139b0924ef16b742b622dc3991d7afec3948161f4d2bc6bc152e0e068b2a756f556121

                            • C:\Program Files (x86)\f284c7fdc9deb65b00c2d2594d40b0e9\config.ini

                              Filesize

                              95B

                              MD5

                              164c478e59f54db3dfadaa362391950d

                              SHA1

                              0dbb4024eb85b518d3e22fc5efdb09ed2230f531

                              SHA256

                              8d2c2087157f5c583ccd66e5c8e3e9dd00e85befc68c3bba41733b9b5f7777b5

                              SHA512

                              bfe6353b32b1d87491648e65a28fb43c10477fbcebd52bcec54bff0feb5fb2fedcdab108113d11b646f1e28803b3a93db32b4408010444c16d4e23d883e0c004

                            • C:\Program Files (x86)\f284c7fdc9deb65b00c2d2594d40b0e9\loader.exe

                              Filesize

                              198KB

                              MD5

                              0abd0b63b00ff588ffbcdd233684276a

                              SHA1

                              668d438bca0a4c56774b86ee3ce767d7b5f7dcfe

                              SHA256

                              79fc68190c263e69148200d7b21c9e04c36b1d2bbbc206a74e91d4e4388568f3

                              SHA512

                              8427f95bcb7797ca087983e810fa72eed1e65c0ac69ef56419ea45f1c5be2171d874c28f80cd21feddb2b066beb8c8187763758491f40183f4901b2f29959a76

                            • C:\Program Files (x86)\f284c7fdc9deb65b00c2d2594d40b0e9\loader.exe

                              Filesize

                              395KB

                              MD5

                              5d2c205f0ec24add16702a1e6af6d9f4

                              SHA1

                              c4c45b3a77fa03f3daaed3185e69a3f84c0a4c56

                              SHA256

                              8f9755cb68126bf496221573e3061dc6806580f312b164e37d6a725853b0a39d

                              SHA512

                              1a8241e92e89d9ad62b9b8913e5bb037a07f9ab709c348e3740c44a1c4cde1a3f33687fc86bb9a534e6e3cb37bda0cc39b77f73e4beb8a425d482f75ebe5da5c

                            • memory/2628-0-0x0000000000400000-0x00000000004C4000-memory.dmp

                              Filesize

                              784KB

                            • memory/2628-1-0x0000000002400000-0x00000000034BA000-memory.dmp

                              Filesize

                              16.7MB

                            • memory/2628-3-0x0000000002400000-0x00000000034BA000-memory.dmp

                              Filesize

                              16.7MB

                            • memory/2628-17-0x0000000002400000-0x00000000034BA000-memory.dmp

                              Filesize

                              16.7MB

                            • memory/2628-24-0x0000000000400000-0x00000000004C4000-memory.dmp

                              Filesize

                              784KB