Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17/04/2024, 19:42

General

  • Target

    270d676a6889b21ad00f1c9e6dc3868ef2213f8e2ef4ce50305f13f48629dc0a.dll

  • Size

    120KB

  • MD5

    c06b60d5553df1ff4e3a890c76d056bd

  • SHA1

    f19f3d3689e7d341ae98605c2d06b727a554dde8

  • SHA256

    270d676a6889b21ad00f1c9e6dc3868ef2213f8e2ef4ce50305f13f48629dc0a

  • SHA512

    0fbe4a8b30401933435c98835c505646148be113ff3d144fe7b91a15657d226fa486c72c5a49803c406cd6762b2b7b4e4fc94a883f3ee5736be1073f7d745dba

  • SSDEEP

    1536:ly03CAKhCcYLBarlNfZjVoHqwDrk7mQYBUkgNU+Egco265:ll9JornfrAgelBgcHs

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Signatures

  • Modifies firewall policy service 2 TTPs 3 IoCs
  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 6 IoCs
  • Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 29 IoCs
  • UPX dump on OEP (original entry point) 32 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • UPX packed file 29 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 7 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 11 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1108
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1160
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1256
          • C:\Windows\system32\rundll32.exe
            rundll32.exe C:\Users\Admin\AppData\Local\Temp\270d676a6889b21ad00f1c9e6dc3868ef2213f8e2ef4ce50305f13f48629dc0a.dll,#1
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2316
            • C:\Windows\SysWOW64\rundll32.exe
              rundll32.exe C:\Users\Admin\AppData\Local\Temp\270d676a6889b21ad00f1c9e6dc3868ef2213f8e2ef4ce50305f13f48629dc0a.dll,#1
              3⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:2208
              • C:\Users\Admin\AppData\Local\Temp\f7621f2.exe
                C:\Users\Admin\AppData\Local\Temp\f7621f2.exe
                4⤵
                • Modifies firewall policy service
                • UAC bypass
                • Windows security bypass
                • Executes dropped EXE
                • Windows security modification
                • Checks whether UAC is enabled
                • Enumerates connected drives
                • Drops file in Windows directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                • System policy modification
                PID:2864
              • C:\Users\Admin\AppData\Local\Temp\f7627bc.exe
                C:\Users\Admin\AppData\Local\Temp\f7627bc.exe
                4⤵
                • Executes dropped EXE
                PID:2404
              • C:\Users\Admin\AppData\Local\Temp\f763d9c.exe
                C:\Users\Admin\AppData\Local\Temp\f763d9c.exe
                4⤵
                • Executes dropped EXE
                PID:2468
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1600

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\f7621f2.exe

            Filesize

            97KB

            MD5

            cfb063f3e093f0f36a41c7237f7039b6

            SHA1

            bd45cc5f60754afe7f1e883687f86cd6bd129999

            SHA256

            fb6cbbf9a70fb10cf8667c98f3467a540cd20348a9153701d63b7a8d350cd258

            SHA512

            437656893ed0c9939089b8cb2a80ca95834d90bf76331f2933381239ce99741bb8caf350df978ca9d4b3ff3849b558b57b41d1bcb876980ffa8ef78bd559fb81

          • memory/1108-16-0x00000000001D0000-0x00000000001D2000-memory.dmp

            Filesize

            8KB

          • memory/2208-77-0x0000000000100000-0x0000000000102000-memory.dmp

            Filesize

            8KB

          • memory/2208-8-0x0000000000100000-0x0000000000112000-memory.dmp

            Filesize

            72KB

          • memory/2208-2-0x0000000010000000-0x0000000010020000-memory.dmp

            Filesize

            128KB

          • memory/2208-33-0x00000000001B0000-0x00000000001B2000-memory.dmp

            Filesize

            8KB

          • memory/2208-10-0x0000000000100000-0x0000000000112000-memory.dmp

            Filesize

            72KB

          • memory/2208-72-0x00000000001B0000-0x00000000001B2000-memory.dmp

            Filesize

            8KB

          • memory/2208-35-0x00000000001D0000-0x00000000001D1000-memory.dmp

            Filesize

            4KB

          • memory/2208-48-0x0000000000200000-0x0000000000212000-memory.dmp

            Filesize

            72KB

          • memory/2208-28-0x00000000001B0000-0x00000000001B2000-memory.dmp

            Filesize

            8KB

          • memory/2208-46-0x0000000000200000-0x0000000000212000-memory.dmp

            Filesize

            72KB

          • memory/2208-29-0x00000000001D0000-0x00000000001D1000-memory.dmp

            Filesize

            4KB

          • memory/2404-51-0x0000000000400000-0x0000000000412000-memory.dmp

            Filesize

            72KB

          • memory/2468-76-0x0000000000400000-0x0000000000412000-memory.dmp

            Filesize

            72KB

          • memory/2864-24-0x00000000005B0000-0x000000000166A000-memory.dmp

            Filesize

            16.7MB

          • memory/2864-14-0x00000000005B0000-0x000000000166A000-memory.dmp

            Filesize

            16.7MB

          • memory/2864-11-0x0000000000400000-0x0000000000412000-memory.dmp

            Filesize

            72KB

          • memory/2864-49-0x00000000005B0000-0x000000000166A000-memory.dmp

            Filesize

            16.7MB

          • memory/2864-58-0x0000000003F60000-0x0000000003F62000-memory.dmp

            Filesize

            8KB

          • memory/2864-21-0x00000000005B0000-0x000000000166A000-memory.dmp

            Filesize

            16.7MB

          • memory/2864-37-0x00000000005B0000-0x000000000166A000-memory.dmp

            Filesize

            16.7MB

          • memory/2864-18-0x00000000005B0000-0x000000000166A000-memory.dmp

            Filesize

            16.7MB

          • memory/2864-31-0x00000000005B0000-0x000000000166A000-memory.dmp

            Filesize

            16.7MB

          • memory/2864-59-0x00000000005B0000-0x000000000166A000-memory.dmp

            Filesize

            16.7MB

          • memory/2864-60-0x00000000005B0000-0x000000000166A000-memory.dmp

            Filesize

            16.7MB

          • memory/2864-61-0x00000000005B0000-0x000000000166A000-memory.dmp

            Filesize

            16.7MB

          • memory/2864-62-0x00000000005B0000-0x000000000166A000-memory.dmp

            Filesize

            16.7MB

          • memory/2864-63-0x00000000005B0000-0x000000000166A000-memory.dmp

            Filesize

            16.7MB

          • memory/2864-15-0x00000000005B0000-0x000000000166A000-memory.dmp

            Filesize

            16.7MB

          • memory/2864-27-0x00000000005B0000-0x000000000166A000-memory.dmp

            Filesize

            16.7MB

          • memory/2864-12-0x00000000005B0000-0x000000000166A000-memory.dmp

            Filesize

            16.7MB

          • memory/2864-78-0x00000000005B0000-0x000000000166A000-memory.dmp

            Filesize

            16.7MB

          • memory/2864-79-0x00000000005B0000-0x000000000166A000-memory.dmp

            Filesize

            16.7MB

          • memory/2864-80-0x00000000005B0000-0x000000000166A000-memory.dmp

            Filesize

            16.7MB

          • memory/2864-82-0x00000000005B0000-0x000000000166A000-memory.dmp

            Filesize

            16.7MB

          • memory/2864-84-0x00000000005B0000-0x000000000166A000-memory.dmp

            Filesize

            16.7MB

          • memory/2864-86-0x00000000005B0000-0x000000000166A000-memory.dmp

            Filesize

            16.7MB

          • memory/2864-88-0x00000000005B0000-0x000000000166A000-memory.dmp

            Filesize

            16.7MB

          • memory/2864-90-0x00000000005B0000-0x000000000166A000-memory.dmp

            Filesize

            16.7MB

          • memory/2864-93-0x00000000005B0000-0x000000000166A000-memory.dmp

            Filesize

            16.7MB

          • memory/2864-94-0x00000000005B0000-0x000000000166A000-memory.dmp

            Filesize

            16.7MB

          • memory/2864-97-0x00000000005B0000-0x000000000166A000-memory.dmp

            Filesize

            16.7MB

          • memory/2864-98-0x00000000005B0000-0x000000000166A000-memory.dmp

            Filesize

            16.7MB

          • memory/2864-100-0x00000000005B0000-0x000000000166A000-memory.dmp

            Filesize

            16.7MB

          • memory/2864-108-0x0000000003F60000-0x0000000003F62000-memory.dmp

            Filesize

            8KB

          • memory/2864-109-0x00000000005B0000-0x000000000166A000-memory.dmp

            Filesize

            16.7MB