Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 20:14
Static task
static1
Behavioral task
behavioral1
Sample
eaffcb7caefb77fd919ab1be9dc5f1e5bcb77d561e62a4e0f334229d86a66a14.dll
Resource
win7-20240221-en
General
-
Target
eaffcb7caefb77fd919ab1be9dc5f1e5bcb77d561e62a4e0f334229d86a66a14.dll
-
Size
120KB
-
MD5
27042f56e7b30ffabd3dc5251f673930
-
SHA1
473077f2a7a985d6853c01f091e5884cb7cdfd4e
-
SHA256
eaffcb7caefb77fd919ab1be9dc5f1e5bcb77d561e62a4e0f334229d86a66a14
-
SHA512
a74f0a315e497f09d753a05a2f4a52bdacdd7c93cb7e696715ea75b5f060d2957d26cb4f805ddc146fd98f330786184a7ad313fd98345f1c6e47d8c149e1a66c
-
SSDEEP
3072:v1TEbizIKxzr6tiDeccQdBrTIAvw3wCsczANu/:pzB+WeT0rC3zK
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
f768131.exef7684d9.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f768131.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f768131.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f768131.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f7684d9.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f7684d9.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f7684d9.exe -
Processes:
f768131.exef7684d9.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f768131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7684d9.exe -
Processes:
f768131.exef7684d9.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f768131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f7684d9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f7684d9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f768131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f7684d9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f7684d9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f7684d9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f768131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f768131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f768131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f768131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f7684d9.exe -
Executes dropped EXE 3 IoCs
Processes:
f768131.exef7684d9.exef769bb3.exepid process 2276 f768131.exe 2492 f7684d9.exe 2848 f769bb3.exe -
Loads dropped DLL 6 IoCs
Processes:
rundll32.exepid process 1500 rundll32.exe 1500 rundll32.exe 1500 rundll32.exe 1500 rundll32.exe 1500 rundll32.exe 1500 rundll32.exe -
Processes:
resource yara_rule behavioral1/memory/2276-12-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2276-17-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2276-21-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2276-19-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2276-18-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2276-22-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2276-14-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2276-16-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2276-15-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2276-63-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2276-20-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2276-62-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2276-64-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2276-65-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2276-66-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2276-68-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2276-69-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2276-83-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2276-84-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2276-88-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2276-87-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2276-151-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2492-163-0x0000000000910000-0x00000000019CA000-memory.dmp upx behavioral1/memory/2492-185-0x0000000000910000-0x00000000019CA000-memory.dmp upx -
Processes:
f7684d9.exef768131.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f7684d9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f7684d9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f768131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f768131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f7684d9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f7684d9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f7684d9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f7684d9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f768131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f768131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f768131.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f768131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f7684d9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f768131.exe -
Processes:
f768131.exef7684d9.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f768131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7684d9.exe -
Enumerates connected drives 3 TTPs 14 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
f768131.exedescription ioc process File opened (read-only) \??\J: f768131.exe File opened (read-only) \??\K: f768131.exe File opened (read-only) \??\L: f768131.exe File opened (read-only) \??\E: f768131.exe File opened (read-only) \??\P: f768131.exe File opened (read-only) \??\Q: f768131.exe File opened (read-only) \??\H: f768131.exe File opened (read-only) \??\G: f768131.exe File opened (read-only) \??\M: f768131.exe File opened (read-only) \??\N: f768131.exe File opened (read-only) \??\O: f768131.exe File opened (read-only) \??\R: f768131.exe File opened (read-only) \??\S: f768131.exe File opened (read-only) \??\I: f768131.exe -
Drops file in Windows directory 3 IoCs
Processes:
f768131.exef7684d9.exedescription ioc process File created C:\Windows\f76821b f768131.exe File opened for modification C:\Windows\SYSTEM.INI f768131.exe File created C:\Windows\f76d3d3 f7684d9.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
f768131.exef7684d9.exepid process 2276 f768131.exe 2276 f768131.exe 2492 f7684d9.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
Processes:
f768131.exef7684d9.exedescription pid process Token: SeDebugPrivilege 2276 f768131.exe Token: SeDebugPrivilege 2276 f768131.exe Token: SeDebugPrivilege 2276 f768131.exe Token: SeDebugPrivilege 2276 f768131.exe Token: SeDebugPrivilege 2276 f768131.exe Token: SeDebugPrivilege 2276 f768131.exe Token: SeDebugPrivilege 2276 f768131.exe Token: SeDebugPrivilege 2276 f768131.exe Token: SeDebugPrivilege 2276 f768131.exe Token: SeDebugPrivilege 2276 f768131.exe Token: SeDebugPrivilege 2276 f768131.exe Token: SeDebugPrivilege 2276 f768131.exe Token: SeDebugPrivilege 2276 f768131.exe Token: SeDebugPrivilege 2276 f768131.exe Token: SeDebugPrivilege 2276 f768131.exe Token: SeDebugPrivilege 2276 f768131.exe Token: SeDebugPrivilege 2276 f768131.exe Token: SeDebugPrivilege 2276 f768131.exe Token: SeDebugPrivilege 2276 f768131.exe Token: SeDebugPrivilege 2276 f768131.exe Token: SeDebugPrivilege 2276 f768131.exe Token: SeDebugPrivilege 2492 f7684d9.exe Token: SeDebugPrivilege 2492 f7684d9.exe Token: SeDebugPrivilege 2492 f7684d9.exe Token: SeDebugPrivilege 2492 f7684d9.exe Token: SeDebugPrivilege 2492 f7684d9.exe Token: SeDebugPrivilege 2492 f7684d9.exe Token: SeDebugPrivilege 2492 f7684d9.exe Token: SeDebugPrivilege 2492 f7684d9.exe Token: SeDebugPrivilege 2492 f7684d9.exe Token: SeDebugPrivilege 2492 f7684d9.exe Token: SeDebugPrivilege 2492 f7684d9.exe Token: SeDebugPrivilege 2492 f7684d9.exe Token: SeDebugPrivilege 2492 f7684d9.exe Token: SeDebugPrivilege 2492 f7684d9.exe Token: SeDebugPrivilege 2492 f7684d9.exe Token: SeDebugPrivilege 2492 f7684d9.exe Token: SeDebugPrivilege 2492 f7684d9.exe Token: SeDebugPrivilege 2492 f7684d9.exe Token: SeDebugPrivilege 2492 f7684d9.exe Token: SeDebugPrivilege 2492 f7684d9.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
rundll32.exerundll32.exef768131.exef7684d9.exedescription pid process target process PID 2292 wrote to memory of 1500 2292 rundll32.exe rundll32.exe PID 2292 wrote to memory of 1500 2292 rundll32.exe rundll32.exe PID 2292 wrote to memory of 1500 2292 rundll32.exe rundll32.exe PID 2292 wrote to memory of 1500 2292 rundll32.exe rundll32.exe PID 2292 wrote to memory of 1500 2292 rundll32.exe rundll32.exe PID 2292 wrote to memory of 1500 2292 rundll32.exe rundll32.exe PID 2292 wrote to memory of 1500 2292 rundll32.exe rundll32.exe PID 1500 wrote to memory of 2276 1500 rundll32.exe f768131.exe PID 1500 wrote to memory of 2276 1500 rundll32.exe f768131.exe PID 1500 wrote to memory of 2276 1500 rundll32.exe f768131.exe PID 1500 wrote to memory of 2276 1500 rundll32.exe f768131.exe PID 2276 wrote to memory of 1220 2276 f768131.exe taskhost.exe PID 2276 wrote to memory of 1352 2276 f768131.exe Dwm.exe PID 2276 wrote to memory of 1412 2276 f768131.exe Explorer.EXE PID 2276 wrote to memory of 872 2276 f768131.exe DllHost.exe PID 2276 wrote to memory of 2292 2276 f768131.exe rundll32.exe PID 2276 wrote to memory of 1500 2276 f768131.exe rundll32.exe PID 2276 wrote to memory of 1500 2276 f768131.exe rundll32.exe PID 1500 wrote to memory of 2492 1500 rundll32.exe f7684d9.exe PID 1500 wrote to memory of 2492 1500 rundll32.exe f7684d9.exe PID 1500 wrote to memory of 2492 1500 rundll32.exe f7684d9.exe PID 1500 wrote to memory of 2492 1500 rundll32.exe f7684d9.exe PID 1500 wrote to memory of 2848 1500 rundll32.exe f769bb3.exe PID 1500 wrote to memory of 2848 1500 rundll32.exe f769bb3.exe PID 1500 wrote to memory of 2848 1500 rundll32.exe f769bb3.exe PID 1500 wrote to memory of 2848 1500 rundll32.exe f769bb3.exe PID 2276 wrote to memory of 1220 2276 f768131.exe taskhost.exe PID 2276 wrote to memory of 1352 2276 f768131.exe Dwm.exe PID 2276 wrote to memory of 1412 2276 f768131.exe Explorer.EXE PID 2276 wrote to memory of 2492 2276 f768131.exe f7684d9.exe PID 2276 wrote to memory of 2492 2276 f768131.exe f7684d9.exe PID 2276 wrote to memory of 2848 2276 f768131.exe f769bb3.exe PID 2276 wrote to memory of 2848 2276 f768131.exe f769bb3.exe PID 2492 wrote to memory of 1220 2492 f7684d9.exe taskhost.exe PID 2492 wrote to memory of 1352 2492 f7684d9.exe Dwm.exe PID 2492 wrote to memory of 1412 2492 f7684d9.exe Explorer.EXE -
System policy modification 1 TTPs 2 IoCs
Processes:
f768131.exef7684d9.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f768131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7684d9.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1220
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1352
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1412
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eaffcb7caefb77fd919ab1be9dc5f1e5bcb77d561e62a4e0f334229d86a66a14.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eaffcb7caefb77fd919ab1be9dc5f1e5bcb77d561e62a4e0f334229d86a66a14.dll,#13⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\f768131.exeC:\Users\Admin\AppData\Local\Temp\f768131.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\f7684d9.exeC:\Users\Admin\AppData\Local\Temp\f7684d9.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\f769bb3.exeC:\Users\Admin\AppData\Local\Temp\f769bb3.exe4⤵
- Executes dropped EXE
PID:2848
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:872
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256B
MD5bcf28b809dfc0e96aa0b1c1a80bf5e5e
SHA1306b85b8ce93fe26bdd6aef578b685b16ad9bc3f
SHA2569b818678b7acccc54f2c2cb00014bca9b8aad4c67f52cd8ea10c269a0c9b86e0
SHA512fe419f20d75616e99b735e2292b6568d29cc853d062d2502dbff63e9af479d21c31d79f00a1047cc2f0175c7b99794a2a4c85589c7994682938e2bb26e294880
-
Filesize
97KB
MD57ce4fafacb138d70c7103a92272aff53
SHA1e3ceebce6283be7f4c0b2db998b4f82aebf4fff5
SHA256b7ce269805b7f3fb1bfc61cafd6357c01ab7a37c9fa2d74837404cbfd09cea84
SHA512c3327e15e68eb41db82590e97d46f92f58903b615fa97e5a2dd345eaa0a4627aadb08f71a8692dbcecef93097e3ff148a25b453d2df9de30d79f8e110bd70aaa