Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    30-05-2024 02:22

General

  • Target

    bf70cd422fb3771839abe10d861f022f311c28ad9f52aa9d1219462164531a81.exe

  • Size

    1.8MB

  • MD5

    b38b7365267b8fbea7781384bc638013

  • SHA1

    3c035caa90b2118a6ed1acbb557e9745e10e3981

  • SHA256

    bf70cd422fb3771839abe10d861f022f311c28ad9f52aa9d1219462164531a81

  • SHA512

    c027e8cd2ab6400b4cacbf138bf4d589206028e728b625abacdce605c7284207c021c4ebee0ff7b49763a71911fd605ad85c13a6e99e72e29b20fe6f33495132

  • SSDEEP

    49152:KbTCfQxKCnFnQXBbrtgb/iQvu0UHOW96f:K6oxvWbrtUTrUHON

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Signatures

  • Modifies firewall policy service 2 TTPs 6 IoCs
  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • UAC bypass 3 TTPs 2 IoCs
  • Windows security bypass 2 TTPs 12 IoCs
  • Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 25 IoCs
  • UPX dump on OEP (original entry point) 28 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • UPX packed file 25 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 14 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1104
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1156
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1188
          • C:\Users\Admin\AppData\Local\Temp\bf70cd422fb3771839abe10d861f022f311c28ad9f52aa9d1219462164531a81.exe
            "C:\Users\Admin\AppData\Local\Temp\bf70cd422fb3771839abe10d861f022f311c28ad9f52aa9d1219462164531a81.exe"
            2⤵
            • Modifies firewall policy service
            • UAC bypass
            • Windows security bypass
            • Loads dropped DLL
            • Windows security modification
            • Checks whether UAC is enabled
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:2580
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat" "
              3⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1852
              • C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe"
                4⤵
                • Modifies firewall policy service
                • UAC bypass
                • Windows security bypass
                • Executes dropped EXE
                • Loads dropped DLL
                • Windows security modification
                • Checks whether UAC is enabled
                • Drops file in Windows directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                • System policy modification
                PID:1416
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat" "
                  5⤵
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:2584
                  • C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe
                    "C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe" /i 1416
                    6⤵
                    • Executes dropped EXE
                    • Adds Run key to start application
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of WriteProcessMemory
                    PID:2156
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin2.bat" "
                      7⤵
                      • Loads dropped DLL
                      • Suspicious use of WriteProcessMemory
                      PID:1608
                      • C:\Users\Admin\AppData\Local\Temp\wtmps.exe
                        "C:\Users\Admin\AppData\Local\Temp\wtmps.exe"
                        8⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Suspicious use of WriteProcessMemory
                        PID:2124
                        • C:\Windows\SysWOW64\mscaps.exe
                          "C:\Windows\system32\mscaps.exe" /C:\Users\Admin\AppData\Local\Temp\wtmps.exe
                          9⤵
                          • Executes dropped EXE
                          PID:1520
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat" "
              3⤵
              • Deletes itself
              PID:3004
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:2036
          • C:\Windows\system32\conhost.exe
            \??\C:\Windows\system32\conhost.exe "-153936832621193301-1719058546-1229732239106210292-1892165686-1230743719-1805460691"
            1⤵
              PID:652

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\0F761890_Rar\bf70cd422fb3771839abe10d861f022f311c28ad9f52aa9d1219462164531a81.exe

              Filesize

              1.8MB

              MD5

              01ea2932a9695962450e9bca14c6be0d

              SHA1

              9e4a175939e06fa5ae8d2e139a5d41560b096ca5

              SHA256

              7db7ec3f9ec9b4b78f2127e4fec63675efd153c3c084f143feb4357a3748035b

              SHA512

              1c6ae9444097140d0987a2035ca8e95455ea93bd7ad31033ef7d024aa8a40e8936f9c820ece50ceb5af588695db67c39d81520dea05ab4d4d77a6d44c092374c

            • C:\Users\Admin\AppData\Local\Temp\0F7618BE_Rar\bf70cd422fb3771839abe10d861f022f311c28ad9f52aa9d1219462164531a81.exe

              Filesize

              1.8MB

              MD5

              4365afc8f893440f64682bde6c392226

              SHA1

              89774e2fde3eb006b1e175b56a68c512c7e446c7

              SHA256

              469e1984af115fc4444fd32fbb278b95c7ed7dbe25c336a655eae492e64ec5de

              SHA512

              f3382ec124cc2f4547aefd6defec6db948d9f7e3877296a1d837a5cfc0897e45c817ad8b084193e5dfe26c3b5604de81d2b2226dfc9df2c15d0efc030f432c0e

            • C:\Users\Admin\AppData\Local\Temp\3CE1.tmp

              Filesize

              406B

              MD5

              37512bcc96b2c0c0cf0ad1ed8cfae5cd

              SHA1

              edf7f17ce28e1c4c82207cab8ca77f2056ea545c

              SHA256

              27e678bf5dc82219d6edd744f0b82567a26e40f8a9dcd6487205e13058e3ed1f

              SHA512

              6d4252ab5aa441a76ce2127224fefcb221259ab4d39f06437b269bd6bfdaae009c8f34e9603ec734159553bc9f1359bdd70316cd426d73b171a9f17c41077641

            • C:\Users\Admin\AppData\Local\Temp\Se2223.tmp

              Filesize

              896B

              MD5

              be49ee9d1b6da594241ce3b7432c5d64

              SHA1

              d81e68b9bf84258af2e6b5595c4f5c8d53b9c901

              SHA256

              db66d62796ae12bf459e514f27bb1a0d416d804365f44e8ec53dd760e3f7b8b8

              SHA512

              0c15d8d86e0dfccbcecd50b3dd5906f8f5b7c52511128d01be82b394ccb08ed85a486a101bbb5d992a688d1e62f21fda712daef1bf3a5ecba9aad152e47562f5

            • C:\Users\Admin\AppData\Local\Temp\wtmps.exe

              Filesize

              276KB

              MD5

              75c1467042b38332d1ea0298f29fb592

              SHA1

              f92ea770c2ddb04cf0d20914578e4c482328f0f8

              SHA256

              3b20c853d4ca23240cd338b8cab16f1027c540ddfe9c4ffdca1624d2f923b373

              SHA512

              5c47c59ad222e2597ccdf2c100853c48f022e933f44c279154346eacf9e7e6f54214ada541d43a10424035f160b56131aab206c11512a9fd6ea614fbd3160aa0

            • C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe

              Filesize

              172KB

              MD5

              daac1781c9d22f5743ade0cb41feaebf

              SHA1

              e2549eeeea42a6892b89d354498fcaa8ffd9cac4

              SHA256

              6a7093440420306cf7de53421a67af8a1094771e0aab9535acbd748d08ed766c

              SHA512

              190a7d5291e20002f996edf1e04456bfdff8b7b2f4ef113178bd42a9e5fd89fe6d410ae2c505de0358c4f53f9654ac1caaa8634665afa6d9691640dd4ee86160

            • C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe

              Filesize

              1.8MB

              MD5

              bfb82e58a93ef92572457f0967df5f80

              SHA1

              57e434d9486f37140a6def2311b9bd852cd1a614

              SHA256

              9a429283c270991272bb5795c7405e306aa6564f03d4c2142a75f3b466d1aff6

              SHA512

              2d9b4bf12b2a6e5c48904c1b5454e00c60368964cc53eb432b7a48fe1cba40142e143668c241c2a9ad2702bed1d11171ac8ea2b2e9e611e92e1e83944c883f01

            • C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat

              Filesize

              129B

              MD5

              d1073c9b34d1bbd570928734aacff6a5

              SHA1

              78714e24e88d50e0da8da9d303bec65b2ee6d903

              SHA256

              b3c704b1a728004fc5e25899d72930a7466d7628dd6ddd795b3000897dfa4020

              SHA512

              4f2b9330e30fcc55245dc5d12311e105b2b2b9d607fbfc4a203c69a740006f0af58d6a01e2da284575a897528da71a2e61a7321034755b78feb646c8dd12347f

            • C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat

              Filesize

              126B

              MD5

              48efdc94f536d690082c0e1fb0493c29

              SHA1

              7a50f77391fe516a66e5abf68a155cc64db86231

              SHA256

              bd5bc736b9560fbfd910b9313bdee0c5c863acc4102c2b6b3d762294f06cde75

              SHA512

              b379e560360281b1930ddd9bd1cb1ee3071e91d7190d3b65bd3f8b5e0aebb309f90742e30d3b89b1fdd027e7d97c1821b561577af9f70d015b27cdc370c448ef

            • C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat

              Filesize

              302B

              MD5

              0abb8063efcf49582c2b6c4844a65a66

              SHA1

              791e56cbe333ffda54764163f704eaa526dae42b

              SHA256

              bcf28def71e964b8fe8254b0eb12e74d62f1bfccb28c184a3a09082a0ba1b169

              SHA512

              fda7d8c553bd8ffd7400e2441d702e3c8cf6d35a24670d8333d3caa6c3651329a0cb206ce68a4809787a406c599c0f7073462d8c1159057f7dc369509edd6169

            • C:\Users\Admin\AppData\Roaming\Temp\Admin2.bat

              Filesize

              102B

              MD5

              3ca08f080a7a28416774d80552d4aa08

              SHA1

              0b5f0ba641204b27adac4140fd45dce4390dbf24

              SHA256

              4e7d460b8dc9f2c01b4c5a16fb956aced10127bc940e8039a80c6455901ea1f0

              SHA512

              0c64aa462ff70473ef763ec392296fe0ea59b5340c26978531a416732bc3845adf9ca7b673cb7b4ba40cc45674351206096995c43600fccbbbe64e51b6019f01

            • C:\Users\Admin\AppData\Roaming\Temp\mydll.dll

              Filesize

              202KB

              MD5

              684c111c78f8bf6fcb5575d400e7669c

              SHA1

              d587894c0beffdff00ae6d358a5463ef18bcb485

              SHA256

              080fb4cd0b92884c89efab9161685f3ba0666cd9dab8de6c752bfe35e4e45716

              SHA512

              bcf748d21be502d7346f56ffc9ef13f3394d46c679d7cf17289d007e91b4ead2ec4035b3ccd5626eb378958cbb6ac371edfde8319433db9b709694595ae53e4f

            • C:\Windows\SYSTEM.INI

              Filesize

              257B

              MD5

              d9806bd05c079c67cfb9cbff833fc7dd

              SHA1

              37c37f887ed68ed59cc9ac876447f69b3ce1e08d

              SHA256

              0151c2a0a2d9af4410ff2a68794310715ad06c8097e9ff150049e873823a909b

              SHA512

              58033ca3ca0be28dc3ccafc5beb4c5a17c6b61ee7b68d35dec5e607511c080532927d01c513be0ececc6d9955621a8c1741465056c5d17c909fe02de5ba184b3

            • C:\Windows\SysWOW64\mscaps.exe

              Filesize

              200KB

              MD5

              78d3c8705f8baf7d34e6a6737d1cfa18

              SHA1

              9f09e248a29311dbeefae9d85937b13da042a010

              SHA256

              2c4c9ec8e9291ba5c73f641af2e0c3e1bbd257ac40d9fb9d3faab7cebc978905

              SHA512

              9a3c3175276da58f1bc8d1138e63238c8d8ccfbfa1a8a1338e88525eca47f8d745158bb34396b7c3f25e4296be5f45a71781da33ad0bbdf7ad88a9c305b85609

            • \Users\Admin\AppData\Roaming\Temp\mydll.dll

              Filesize

              202KB

              MD5

              7ff15a4f092cd4a96055ba69f903e3e9

              SHA1

              a3d338a38c2b92f95129814973f59446668402a8

              SHA256

              1b594e6d057c632abb3a8cf838157369024bd6b9f515ca8e774b22fe71a11627

              SHA512

              4b015d011c14c7e10568c09bf81894681535efb7d76c3ef9071fffb3837f62b36e695187b2d32581a30f07e79971054e231a2ca4e8ad7f0f83d5876f8c086dae

            • memory/1104-93-0x0000000000140000-0x0000000000142000-memory.dmp

              Filesize

              8KB

            • memory/1416-813-0x0000000001FE0000-0x000000000309A000-memory.dmp

              Filesize

              16.7MB

            • memory/1416-822-0x0000000001FE0000-0x000000000309A000-memory.dmp

              Filesize

              16.7MB

            • memory/1416-1908-0x0000000001FE0000-0x000000000309A000-memory.dmp

              Filesize

              16.7MB

            • memory/1416-1906-0x0000000000400000-0x000000000044B000-memory.dmp

              Filesize

              300KB

            • memory/1416-730-0x0000000000400000-0x000000000044B000-memory.dmp

              Filesize

              300KB

            • memory/1416-767-0x0000000001FE0000-0x000000000309A000-memory.dmp

              Filesize

              16.7MB

            • memory/1416-748-0x0000000001FE0000-0x000000000309A000-memory.dmp

              Filesize

              16.7MB

            • memory/1416-810-0x0000000001FE0000-0x000000000309A000-memory.dmp

              Filesize

              16.7MB

            • memory/1416-812-0x0000000001FE0000-0x000000000309A000-memory.dmp

              Filesize

              16.7MB

            • memory/1416-814-0x0000000001FE0000-0x000000000309A000-memory.dmp

              Filesize

              16.7MB

            • memory/1416-731-0x0000000001FE0000-0x000000000309A000-memory.dmp

              Filesize

              16.7MB

            • memory/1416-811-0x0000000001FE0000-0x000000000309A000-memory.dmp

              Filesize

              16.7MB

            • memory/1416-780-0x0000000001FE0000-0x000000000309A000-memory.dmp

              Filesize

              16.7MB

            • memory/1852-727-0x0000000000400000-0x000000000044B000-memory.dmp

              Filesize

              300KB

            • memory/1852-728-0x0000000000400000-0x000000000044B000-memory.dmp

              Filesize

              300KB

            • memory/2580-110-0x0000000000330000-0x0000000000332000-memory.dmp

              Filesize

              8KB

            • memory/2580-662-0x0000000001E20000-0x0000000002EDA000-memory.dmp

              Filesize

              16.7MB

            • memory/2580-718-0x0000000000330000-0x0000000000332000-memory.dmp

              Filesize

              8KB

            • memory/2580-720-0x0000000000400000-0x000000000044B000-memory.dmp

              Filesize

              300KB

            • memory/2580-721-0x0000000001E20000-0x0000000002EDA000-memory.dmp

              Filesize

              16.7MB

            • memory/2580-109-0x0000000000330000-0x0000000000332000-memory.dmp

              Filesize

              8KB

            • memory/2580-102-0x0000000000350000-0x0000000000351000-memory.dmp

              Filesize

              4KB

            • memory/2580-84-0x0000000001E20000-0x0000000002EDA000-memory.dmp

              Filesize

              16.7MB

            • memory/2580-0-0x0000000000400000-0x000000000044B000-memory.dmp

              Filesize

              300KB

            • memory/2580-83-0x0000000001E20000-0x0000000002EDA000-memory.dmp

              Filesize

              16.7MB

            • memory/2580-671-0x0000000001E20000-0x0000000002EDA000-memory.dmp

              Filesize

              16.7MB

            • memory/2580-85-0x0000000001E20000-0x0000000002EDA000-memory.dmp

              Filesize

              16.7MB

            • memory/2580-78-0x0000000001E20000-0x0000000002EDA000-memory.dmp

              Filesize

              16.7MB

            • memory/2580-81-0x0000000001E20000-0x0000000002EDA000-memory.dmp

              Filesize

              16.7MB

            • memory/2580-79-0x0000000001E20000-0x0000000002EDA000-memory.dmp

              Filesize

              16.7MB

            • memory/2580-1-0x0000000001E20000-0x0000000002EDA000-memory.dmp

              Filesize

              16.7MB

            • memory/2580-82-0x0000000001E20000-0x0000000002EDA000-memory.dmp

              Filesize

              16.7MB

            • memory/2580-105-0x0000000000350000-0x0000000000351000-memory.dmp

              Filesize

              4KB

            • memory/2580-101-0x0000000000330000-0x0000000000332000-memory.dmp

              Filesize

              8KB

            • memory/2580-80-0x0000000001E20000-0x0000000002EDA000-memory.dmp

              Filesize

              16.7MB

            • memory/2580-76-0x0000000001E20000-0x0000000002EDA000-memory.dmp

              Filesize

              16.7MB

            • memory/2580-77-0x0000000001E20000-0x0000000002EDA000-memory.dmp

              Filesize

              16.7MB

            • memory/2580-2-0x0000000010000000-0x0000000010015000-memory.dmp

              Filesize

              84KB