Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 15:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
العنود.exe
Resource
win7-20240221-en
2 signatures
150 seconds
General
-
Target
العنود.exe
-
Size
358KB
-
MD5
c78570e28d30ffef470f20d2d66362d5
-
SHA1
22bda1764316906402c8acccee2c6fd329b7689e
-
SHA256
1234966c7b51df3c087f85985d5c56b164a42b85afc8b1f99aa582d7589ef7b4
-
SHA512
1acc68aef7abf443a92e562b6e09fa9f504f93f35f3caa07e25a42dd91d4698a6a6e533ca12254173addc1604b49b5ab8a933751a19054150a376b23789d7000
-
SSDEEP
6144:Lj5KPoqWbAl8/f9XgnVW5GJZ2tNYLj8MfsxHi8msih0OSYkMRGL:3+xlqXwVzYKj86sxHtmsiSOSY5RGL
Malware Config
Extracted
Family
sality
C2
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" العنود.exe -
resource yara_rule behavioral2/memory/4472-1-0x0000000002460000-0x0000000003490000-memory.dmp upx behavioral2/memory/4472-4-0x0000000002460000-0x0000000003490000-memory.dmp upx behavioral2/memory/4472-9-0x0000000002460000-0x0000000003490000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" العنود.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process PID 4472 set thread context of 0 4472 العنود.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI العنود.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key العنود.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ العنود.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" العنود.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4472 العنود.exe 4472 العنود.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe Token: SeDebugPrivilege 4472 العنود.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4472 العنود.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4472 wrote to memory of 0 4472 العنود.exe PID 4472 wrote to memory of 0 4472 العنود.exe PID 4472 wrote to memory of 0 4472 العنود.exe PID 4472 wrote to memory of 0 4472 العنود.exe PID 4472 wrote to memory of 784 4472 العنود.exe 8 PID 4472 wrote to memory of 792 4472 العنود.exe 9 PID 4472 wrote to memory of 380 4472 العنود.exe 13 PID 4472 wrote to memory of 2660 4472 العنود.exe 44 PID 4472 wrote to memory of 2684 4472 العنود.exe 45 PID 4472 wrote to memory of 2768 4472 العنود.exe 47 PID 4472 wrote to memory of 3496 4472 العنود.exe 56 PID 4472 wrote to memory of 3608 4472 العنود.exe 57 PID 4472 wrote to memory of 3812 4472 العنود.exe 58 PID 4472 wrote to memory of 3904 4472 العنود.exe 59 PID 4472 wrote to memory of 3968 4472 العنود.exe 60 PID 4472 wrote to memory of 4068 4472 العنود.exe 61 PID 4472 wrote to memory of 2828 4472 العنود.exe 62 PID 4472 wrote to memory of 636 4472 العنود.exe 74 PID 4472 wrote to memory of 3432 4472 العنود.exe 75 PID 4472 wrote to memory of 2436 4472 العنود.exe 83 PID 4472 wrote to memory of 2524 4472 العنود.exe 84 PID 4472 wrote to memory of 1964 4472 العنود.exe 85 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" العنود.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:784
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:792
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:380
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2660
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2684
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2768
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\العنود.exe"C:\Users\Admin\AppData\Local\Temp\العنود.exe"2⤵
- UAC bypass
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4472
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3608
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3812
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3904
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3968
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4068
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2828
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:636
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3432
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX53ypgrj20bgndg05hj3tc7z654myszwp.mca1⤵PID:2436
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:2524
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:1964