Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
30-03-2024 21:40
Static task
static1
Behavioral task
behavioral1
Sample
9ac782c1c0a23ad6a1092bdaaa78c17561335625446f438d7d934b49aa523930.exe
Resource
win7-20240221-en
General
-
Target
9ac782c1c0a23ad6a1092bdaaa78c17561335625446f438d7d934b49aa523930.exe
-
Size
132KB
-
MD5
8bd5d568d369a2879c839bdab44f29b9
-
SHA1
214e2e43c691751bc058e2b2db8eb02066c86505
-
SHA256
9ac782c1c0a23ad6a1092bdaaa78c17561335625446f438d7d934b49aa523930
-
SHA512
e486f6758391034ec3461efd6d3b1e35425dfa4facd0a5633cbc706899afc7926754d127b86135c3bf2887e1b45c8fbc6e90344958609ad9eb64d35c02fc5daa
-
SSDEEP
3072:fftffhJCuEmUBCSjGoLpmSTLd4W1CV9uymmH2Ri/:HVfhgujiXxfdA9Pm
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4900-8-0x00000000007D0000-0x000000000185E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine -
UPX dump on OEP (original entry point) 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4900-9-0x0000000000400000-0x0000000000447000-memory.dmp UPX behavioral2/memory/4900-8-0x00000000007D0000-0x000000000185E000-memory.dmp UPX -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\International\Geo\Nation cmd.exe -
Processes:
resource yara_rule behavioral2/memory/4900-8-0x00000000007D0000-0x000000000185E000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
Processes:
9ac782c1c0a23ad6a1092bdaaa78c17561335625446f438d7d934b49aa523930.exedescription ioc process File created C:\Windows\rundl132.exe 9ac782c1c0a23ad6a1092bdaaa78c17561335625446f438d7d934b49aa523930.exe File created C:\Windows\Logo1_.exe 9ac782c1c0a23ad6a1092bdaaa78c17561335625446f438d7d934b49aa523930.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
cmd.exepid process 4084 cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
9ac782c1c0a23ad6a1092bdaaa78c17561335625446f438d7d934b49aa523930.exedescription pid process target process PID 4900 wrote to memory of 4084 4900 9ac782c1c0a23ad6a1092bdaaa78c17561335625446f438d7d934b49aa523930.exe cmd.exe PID 4900 wrote to memory of 4084 4900 9ac782c1c0a23ad6a1092bdaaa78c17561335625446f438d7d934b49aa523930.exe cmd.exe PID 4900 wrote to memory of 4084 4900 9ac782c1c0a23ad6a1092bdaaa78c17561335625446f438d7d934b49aa523930.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ac782c1c0a23ad6a1092bdaaa78c17561335625446f438d7d934b49aa523930.exe"C:\Users\Admin\AppData\Local\Temp\9ac782c1c0a23ad6a1092bdaaa78c17561335625446f438d7d934b49aa523930.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a5D43.bat2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:4084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722B
MD5541115b184f6d1e090847428e60fe916
SHA10f49d6fc72c18d0ae5bd7036bd01fa81598cedce
SHA2564d27906e0bf42e750ca254988f90623b8f8e3b3c64b6777aeef4d745f08b9cd1
SHA512a6b78bcec3be6d5ce3c68412e3f3b8bd1d147d7c525be84f3721028bbd4dd1bde7fb2e794b68be23c6354a5654b4c491c46abfbc77dd7cf505225357dd58dd34
-
C:\Users\Admin\AppData\Local\Temp\9ac782c1c0a23ad6a1092bdaaa78c17561335625446f438d7d934b49aa523930.exe.exe
Filesize105KB
MD5a5e228e5d234a4f52917056191c3f20e
SHA1e7c3d31c4fc8d61491e78e918ad837262a6a2ce7
SHA25603bffa2faa622e0f285400d8adccf7480052cb2a4f334b88de895dec5b1eb08a
SHA512b35a1f87f056c71ba783e7196161e265fca9970833b02d90fc2bda2436ca78a20dde05e6dba6c4fa8c26fd25229bf4be311f333cf05b42df6ed5c8fd5346f13f