Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/02/2024, 19:56
Static task
static1
Behavioral task
behavioral1
Sample
201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe
Resource
win7-20240221-en
General
-
Target
201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe
-
Size
2.5MB
-
MD5
5ebb44afe6be5a33527651a6a2f4b0cb
-
SHA1
26b5c8e47febbda0b8125936a02ac9969ac97d17
-
SHA256
201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb
-
SHA512
3d2ed40857c5bbb97a53c1ed9b2ca68bbe6e2149af34af479f02c74702f967f4e86e744f2db6d06e96d73eb9c7906a3c96b1088441a3c6a56693e7d72ebd8009
-
SSDEEP
49152:DkOcXn1B22gcQSYTTDELCdxF7LlAoM7VIipJGUMXQTPJGwPO2VDI:AOcXe2dCdxF7L+F7qij1MXc1W
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe -
resource yara_rule behavioral1/memory/1704-1-0x0000000001FB0000-0x000000000306A000-memory.dmp upx behavioral1/memory/1704-10-0x0000000001FB0000-0x000000000306A000-memory.dmp upx behavioral1/memory/1704-32-0x0000000001FB0000-0x000000000306A000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\f768bfa 201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe File opened for modification C:\Windows\SYSTEM.INI 201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wssf 201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\2345InputSkinUtil 201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\2345InputSkinUtil\Shell 201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\2345InputSkinUtil\Shell\Open 201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\2345InputSkinUtil\Shell\Open\Command 201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wssf\ = "2345InputSkinUtil" 201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\2345InputSkinUtil\DefaultIcon 201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\2345InputSkinUtil\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe" 201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\2345InputSkinUtil\Shell\Open\ = "安装2345王牌输入法皮肤" 201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\2345InputSkinUtil\Shell\Open\Command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe \"%1\"" 201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1704 201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe"C:\Users\Admin\AppData\Local\Temp\201c7cd646f4cb7b8d0a630e9dc4b0658eaece7e9809b78f2e6228b3ef77e1bb.exe"1⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:1704
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1