Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 08:28
Static task
static1
Behavioral task
behavioral1
Sample
CorelDRW X4插件包.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
CorelDRW X4插件包.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/waterctrl.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/waterctrl.dll
Resource
win10v2004-20240508-en
General
-
Target
CorelDRW X4插件包.exe
-
Size
1.4MB
-
MD5
8ddd801e6046e647056fd15f71b5143b
-
SHA1
12919797eb45d5ea3e6e3dbaacb6def325466c2b
-
SHA256
2c5c566c56b87a9abc63beb6dd6b767f00ac5e863ad312a0298a1ca8253a434a
-
SHA512
7e02e7d47bb35d7a38761ee5f07fd45833a6f6cbb7f9e29425700e39d77e7084885a96c2d6423a70f608b3a8529fd4a0d2623ca0a24a49b2ed2647230e54da95
-
SSDEEP
24576:RNTWVgVOr3UKfzo4FUkkg7jWiEGuZPxoMoBTcBTQGfh/xLZ+D7Gxb9LMjy:RdtMhwkkg7jWhGAPrkG1tIGxb9LMW
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
CorelDRW X4插件包.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" CorelDRW X4插件包.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" CorelDRW X4插件包.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" CorelDRW X4插件包.exe -
Processes:
CorelDRW X4插件包.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" CorelDRW X4插件包.exe -
Processes:
CorelDRW X4插件包.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" CorelDRW X4插件包.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" CorelDRW X4插件包.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" CorelDRW X4插件包.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" CorelDRW X4插件包.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" CorelDRW X4插件包.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" CorelDRW X4插件包.exe -
Processes:
resource yara_rule behavioral1/memory/1960-5-0x0000000001D20000-0x0000000002DAE000-memory.dmp upx behavioral1/memory/1960-7-0x0000000001D20000-0x0000000002DAE000-memory.dmp upx behavioral1/memory/1960-6-0x0000000001D20000-0x0000000002DAE000-memory.dmp upx behavioral1/memory/1960-4-0x0000000001D20000-0x0000000002DAE000-memory.dmp upx behavioral1/memory/1960-1-0x0000000001D20000-0x0000000002DAE000-memory.dmp upx behavioral1/memory/1960-10-0x0000000001D20000-0x0000000002DAE000-memory.dmp upx behavioral1/memory/1960-13-0x0000000001D20000-0x0000000002DAE000-memory.dmp upx behavioral1/memory/1960-12-0x0000000001D20000-0x0000000002DAE000-memory.dmp upx behavioral1/memory/1960-11-0x0000000001D20000-0x0000000002DAE000-memory.dmp upx behavioral1/memory/1960-9-0x0000000001D20000-0x0000000002DAE000-memory.dmp upx behavioral1/memory/1960-8-0x0000000001D20000-0x0000000002DAE000-memory.dmp upx behavioral1/memory/1960-28-0x0000000001D20000-0x0000000002DAE000-memory.dmp upx behavioral1/memory/1960-31-0x0000000001D20000-0x0000000002DAE000-memory.dmp upx behavioral1/memory/1960-30-0x0000000001D20000-0x0000000002DAE000-memory.dmp upx behavioral1/memory/1960-33-0x0000000001D20000-0x0000000002DAE000-memory.dmp upx behavioral1/memory/1960-34-0x0000000001D20000-0x0000000002DAE000-memory.dmp upx behavioral1/memory/1960-35-0x0000000001D20000-0x0000000002DAE000-memory.dmp upx behavioral1/memory/1960-37-0x0000000001D20000-0x0000000002DAE000-memory.dmp upx behavioral1/memory/1960-38-0x0000000001D20000-0x0000000002DAE000-memory.dmp upx -
Processes:
CorelDRW X4插件包.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" CorelDRW X4插件包.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc CorelDRW X4插件包.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" CorelDRW X4插件包.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" CorelDRW X4插件包.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" CorelDRW X4插件包.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" CorelDRW X4插件包.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" CorelDRW X4插件包.exe -
Processes:
CorelDRW X4插件包.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" CorelDRW X4插件包.exe -
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
CorelDRW X4插件包.exedescription ioc process File opened (read-only) \??\E: CorelDRW X4插件包.exe File opened (read-only) \??\G: CorelDRW X4插件包.exe File opened (read-only) \??\H: CorelDRW X4插件包.exe File opened (read-only) \??\I: CorelDRW X4插件包.exe -
Drops file in Windows directory 1 IoCs
Processes:
CorelDRW X4插件包.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI CorelDRW X4插件包.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
CorelDRW X4插件包.exepid process 1960 CorelDRW X4插件包.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
Processes:
CorelDRW X4插件包.exedescription pid process Token: SeDebugPrivilege 1960 CorelDRW X4插件包.exe Token: SeDebugPrivilege 1960 CorelDRW X4插件包.exe Token: SeDebugPrivilege 1960 CorelDRW X4插件包.exe Token: SeDebugPrivilege 1960 CorelDRW X4插件包.exe Token: SeDebugPrivilege 1960 CorelDRW X4插件包.exe Token: SeDebugPrivilege 1960 CorelDRW X4插件包.exe Token: SeDebugPrivilege 1960 CorelDRW X4插件包.exe Token: SeDebugPrivilege 1960 CorelDRW X4插件包.exe Token: SeDebugPrivilege 1960 CorelDRW X4插件包.exe Token: SeDebugPrivilege 1960 CorelDRW X4插件包.exe Token: SeDebugPrivilege 1960 CorelDRW X4插件包.exe Token: SeDebugPrivilege 1960 CorelDRW X4插件包.exe Token: SeDebugPrivilege 1960 CorelDRW X4插件包.exe Token: SeDebugPrivilege 1960 CorelDRW X4插件包.exe Token: SeDebugPrivilege 1960 CorelDRW X4插件包.exe Token: SeDebugPrivilege 1960 CorelDRW X4插件包.exe Token: SeDebugPrivilege 1960 CorelDRW X4插件包.exe Token: SeDebugPrivilege 1960 CorelDRW X4插件包.exe Token: SeDebugPrivilege 1960 CorelDRW X4插件包.exe Token: SeDebugPrivilege 1960 CorelDRW X4插件包.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
CorelDRW X4插件包.exedescription pid process target process PID 1960 wrote to memory of 1068 1960 CorelDRW X4插件包.exe taskhost.exe PID 1960 wrote to memory of 1108 1960 CorelDRW X4插件包.exe Dwm.exe PID 1960 wrote to memory of 1148 1960 CorelDRW X4插件包.exe Explorer.EXE PID 1960 wrote to memory of 2416 1960 CorelDRW X4插件包.exe DllHost.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
CorelDRW X4插件包.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" CorelDRW X4插件包.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1068
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1108
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\CorelDRW X4插件包.exe"C:\Users\Admin\AppData\Local\Temp\CorelDRW X4插件包.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1960
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2416
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5