Analysis
-
max time kernel
120s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/03/2024, 18:38
Static task
static1
Behavioral task
behavioral1
Sample
2c1cbc2299e9eba9fc52bbec2e1f315751c348d50d6af75b374b37960d0a9949.dll
Resource
win7-20240221-en
General
-
Target
2c1cbc2299e9eba9fc52bbec2e1f315751c348d50d6af75b374b37960d0a9949.dll
-
Size
120KB
-
MD5
60f2625393e1a4a7329843c1f1204043
-
SHA1
5a2ae65052953fbb9e455434fdb5b743d8a887b1
-
SHA256
2c1cbc2299e9eba9fc52bbec2e1f315751c348d50d6af75b374b37960d0a9949
-
SHA512
df498d6608416e932d5d1b1b40e7a42b92b8769240b168847bd99ba46ef62de57e480fb41e331620ce28fd73cacbb2714a4cb5eeb9d172197fbf493db2ee1427
-
SSDEEP
3072:A0nzNx81yRFC9b5TuBAj4iLeMDVWI7Jpo5Kei:A0nznXRobwBAj9qMvnoIp
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76cce0.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76cce0.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76cce0.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76cce0.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76cce0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76cce0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76cce0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76cce0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76cce0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76cce0.exe -
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 18 IoCs
resource yara_rule behavioral1/memory/2636-14-0x0000000000640000-0x00000000016FA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2636-16-0x0000000000640000-0x00000000016FA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2636-17-0x0000000000640000-0x00000000016FA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2636-19-0x0000000000640000-0x00000000016FA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2636-21-0x0000000000640000-0x00000000016FA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2636-26-0x0000000000640000-0x00000000016FA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2636-30-0x0000000000640000-0x00000000016FA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2636-33-0x0000000000640000-0x00000000016FA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2636-35-0x0000000000640000-0x00000000016FA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2636-36-0x0000000000640000-0x00000000016FA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2636-41-0x0000000000640000-0x00000000016FA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2636-42-0x0000000000640000-0x00000000016FA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2636-43-0x0000000000640000-0x00000000016FA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2636-48-0x0000000000640000-0x00000000016FA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2636-49-0x0000000000640000-0x00000000016FA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2636-51-0x0000000000640000-0x00000000016FA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2636-52-0x0000000000640000-0x00000000016FA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2636-54-0x0000000000640000-0x00000000016FA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine -
UPX dump on OEP (original entry point) 19 IoCs
resource yara_rule behavioral1/memory/2636-14-0x0000000000640000-0x00000000016FA000-memory.dmp UPX behavioral1/memory/2636-16-0x0000000000640000-0x00000000016FA000-memory.dmp UPX behavioral1/memory/2636-17-0x0000000000640000-0x00000000016FA000-memory.dmp UPX behavioral1/memory/2636-19-0x0000000000640000-0x00000000016FA000-memory.dmp UPX behavioral1/memory/2636-21-0x0000000000640000-0x00000000016FA000-memory.dmp UPX behavioral1/memory/2636-26-0x0000000000640000-0x00000000016FA000-memory.dmp UPX behavioral1/memory/2636-30-0x0000000000640000-0x00000000016FA000-memory.dmp UPX behavioral1/memory/2636-33-0x0000000000640000-0x00000000016FA000-memory.dmp UPX behavioral1/memory/2636-35-0x0000000000640000-0x00000000016FA000-memory.dmp UPX behavioral1/memory/2636-36-0x0000000000640000-0x00000000016FA000-memory.dmp UPX behavioral1/memory/2636-41-0x0000000000640000-0x00000000016FA000-memory.dmp UPX behavioral1/memory/2636-42-0x0000000000640000-0x00000000016FA000-memory.dmp UPX behavioral1/memory/2636-43-0x0000000000640000-0x00000000016FA000-memory.dmp UPX behavioral1/memory/2636-48-0x0000000000640000-0x00000000016FA000-memory.dmp UPX behavioral1/memory/2636-49-0x0000000000640000-0x00000000016FA000-memory.dmp UPX behavioral1/memory/2636-51-0x0000000000640000-0x00000000016FA000-memory.dmp UPX behavioral1/memory/2636-52-0x0000000000640000-0x00000000016FA000-memory.dmp UPX behavioral1/memory/2636-54-0x0000000000640000-0x00000000016FA000-memory.dmp UPX behavioral1/memory/2636-71-0x0000000000400000-0x0000000000412000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 2636 f76cce0.exe -
Loads dropped DLL 2 IoCs
pid Process 3012 rundll32.exe 3012 rundll32.exe -
resource yara_rule behavioral1/memory/2636-14-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/2636-16-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/2636-17-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/2636-19-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/2636-21-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/2636-26-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/2636-30-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/2636-33-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/2636-35-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/2636-36-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/2636-41-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/2636-42-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/2636-43-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/2636-48-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/2636-49-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/2636-51-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/2636-52-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/2636-54-0x0000000000640000-0x00000000016FA000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76cce0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76cce0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76cce0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76cce0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76cce0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76cce0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76cce0.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76cce0.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: f76cce0.exe File opened (read-only) \??\G: f76cce0.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\f76ce66 f76cce0.exe File opened for modification C:\Windows\SYSTEM.INI f76cce0.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2636 f76cce0.exe 2636 f76cce0.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 2636 f76cce0.exe Token: SeDebugPrivilege 2636 f76cce0.exe Token: SeDebugPrivilege 2636 f76cce0.exe Token: SeDebugPrivilege 2636 f76cce0.exe Token: SeDebugPrivilege 2636 f76cce0.exe Token: SeDebugPrivilege 2636 f76cce0.exe Token: SeDebugPrivilege 2636 f76cce0.exe Token: SeDebugPrivilege 2636 f76cce0.exe Token: SeDebugPrivilege 2636 f76cce0.exe Token: SeDebugPrivilege 2636 f76cce0.exe Token: SeDebugPrivilege 2636 f76cce0.exe Token: SeDebugPrivilege 2636 f76cce0.exe Token: SeDebugPrivilege 2636 f76cce0.exe Token: SeDebugPrivilege 2636 f76cce0.exe Token: SeDebugPrivilege 2636 f76cce0.exe Token: SeDebugPrivilege 2636 f76cce0.exe Token: SeDebugPrivilege 2636 f76cce0.exe Token: SeDebugPrivilege 2636 f76cce0.exe Token: SeDebugPrivilege 2636 f76cce0.exe Token: SeDebugPrivilege 2636 f76cce0.exe Token: SeDebugPrivilege 2636 f76cce0.exe Token: SeDebugPrivilege 2636 f76cce0.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2552 wrote to memory of 3012 2552 rundll32.exe 27 PID 2552 wrote to memory of 3012 2552 rundll32.exe 27 PID 2552 wrote to memory of 3012 2552 rundll32.exe 27 PID 2552 wrote to memory of 3012 2552 rundll32.exe 27 PID 2552 wrote to memory of 3012 2552 rundll32.exe 27 PID 2552 wrote to memory of 3012 2552 rundll32.exe 27 PID 2552 wrote to memory of 3012 2552 rundll32.exe 27 PID 3012 wrote to memory of 2636 3012 rundll32.exe 28 PID 3012 wrote to memory of 2636 3012 rundll32.exe 28 PID 3012 wrote to memory of 2636 3012 rundll32.exe 28 PID 3012 wrote to memory of 2636 3012 rundll32.exe 28 PID 2636 wrote to memory of 1128 2636 f76cce0.exe 19 PID 2636 wrote to memory of 1192 2636 f76cce0.exe 20 PID 2636 wrote to memory of 1288 2636 f76cce0.exe 21 PID 2636 wrote to memory of 1128 2636 f76cce0.exe 19 PID 2636 wrote to memory of 1192 2636 f76cce0.exe 20 PID 2636 wrote to memory of 1288 2636 f76cce0.exe 21 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76cce0.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1128
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1192
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1288
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2c1cbc2299e9eba9fc52bbec2e1f315751c348d50d6af75b374b37960d0a9949.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2c1cbc2299e9eba9fc52bbec2e1f315751c348d50d6af75b374b37960d0a9949.dll,#13⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\f76cce0.exeC:\Users\Admin\AppData\Local\Temp\f76cce0.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2636
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD57fc7c903f6bc99dd3cfae2d4f1aadfaa
SHA17e618042b3f3cc6feba8a4dac52e1d64e344421e
SHA25616899bc2b3fdbc34a099b766236d6330c5818331c16d00f0501658503fe5ce6d
SHA512e4fb36538cd0a2ee1798975320fa907cee538991a25dc73ad61e841731d8b950628995b97a8ce05b77eb815f80045de1429cebfcd63f4b30ccc421822a429fc9