Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-06-2024 19:08
Static task
static1
Behavioral task
behavioral1
Sample
ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe
Resource
win7-20240221-en
General
-
Target
ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe
-
Size
176KB
-
MD5
de79a6122c9aa91ab060205f80b8e4d0
-
SHA1
17e4987cbe9d96a44b7a3e771d9e30b64675dcc6
-
SHA256
ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a
-
SHA512
ac87e1618c80f0b4c1dcaf27163d22f0bba6b0d4b55da01e2b5b7d59e0d4ec4288d7985514e999852c148679ec9ecb56b6ab78b97feedefd887a37bad3b36e05
-
SSDEEP
3072:VE7RKgUuGN9ylMST2Y+r0Q6/x4kLG9SJmiJ3kp/u684OHqQtnX:VE7mN9woVoxHiUUiNOu684OHqQ
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe -
Processes:
ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe -
Processes:
ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe -
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 16 IoCs
Processes:
resource yara_rule behavioral1/memory/3028-4-0x0000000001CC0000-0x0000000002D7A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3028-7-0x0000000001CC0000-0x0000000002D7A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3028-5-0x0000000001CC0000-0x0000000002D7A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3028-9-0x0000000001CC0000-0x0000000002D7A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3028-11-0x0000000001CC0000-0x0000000002D7A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3028-8-0x0000000001CC0000-0x0000000002D7A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3028-6-0x0000000001CC0000-0x0000000002D7A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3028-3-0x0000000001CC0000-0x0000000002D7A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3028-12-0x0000000001CC0000-0x0000000002D7A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3028-10-0x0000000001CC0000-0x0000000002D7A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3028-32-0x0000000001CC0000-0x0000000002D7A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3028-33-0x0000000001CC0000-0x0000000002D7A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3028-34-0x0000000001CC0000-0x0000000002D7A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3028-35-0x0000000001CC0000-0x0000000002D7A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3028-36-0x0000000001CC0000-0x0000000002D7A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3028-55-0x0000000001CC0000-0x0000000002D7A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine -
UPX dump on OEP (original entry point) 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3028-4-0x0000000001CC0000-0x0000000002D7A000-memory.dmp UPX behavioral1/memory/3028-7-0x0000000001CC0000-0x0000000002D7A000-memory.dmp UPX behavioral1/memory/3028-5-0x0000000001CC0000-0x0000000002D7A000-memory.dmp UPX behavioral1/memory/3028-9-0x0000000001CC0000-0x0000000002D7A000-memory.dmp UPX behavioral1/memory/3028-11-0x0000000001CC0000-0x0000000002D7A000-memory.dmp UPX behavioral1/memory/3028-8-0x0000000001CC0000-0x0000000002D7A000-memory.dmp UPX behavioral1/memory/3028-6-0x0000000001CC0000-0x0000000002D7A000-memory.dmp UPX behavioral1/memory/3028-3-0x0000000001CC0000-0x0000000002D7A000-memory.dmp UPX behavioral1/memory/3028-12-0x0000000001CC0000-0x0000000002D7A000-memory.dmp UPX behavioral1/memory/3028-10-0x0000000001CC0000-0x0000000002D7A000-memory.dmp UPX behavioral1/memory/3028-32-0x0000000001CC0000-0x0000000002D7A000-memory.dmp UPX behavioral1/memory/3028-33-0x0000000001CC0000-0x0000000002D7A000-memory.dmp UPX behavioral1/memory/3028-34-0x0000000001CC0000-0x0000000002D7A000-memory.dmp UPX behavioral1/memory/3028-35-0x0000000001CC0000-0x0000000002D7A000-memory.dmp UPX behavioral1/memory/3028-36-0x0000000001CC0000-0x0000000002D7A000-memory.dmp UPX behavioral1/memory/3028-54-0x0000000000400000-0x0000000000430000-memory.dmp UPX behavioral1/memory/3028-55-0x0000000001CC0000-0x0000000002D7A000-memory.dmp UPX -
Processes:
resource yara_rule behavioral1/memory/3028-4-0x0000000001CC0000-0x0000000002D7A000-memory.dmp upx behavioral1/memory/3028-7-0x0000000001CC0000-0x0000000002D7A000-memory.dmp upx behavioral1/memory/3028-5-0x0000000001CC0000-0x0000000002D7A000-memory.dmp upx behavioral1/memory/3028-9-0x0000000001CC0000-0x0000000002D7A000-memory.dmp upx behavioral1/memory/3028-11-0x0000000001CC0000-0x0000000002D7A000-memory.dmp upx behavioral1/memory/3028-8-0x0000000001CC0000-0x0000000002D7A000-memory.dmp upx behavioral1/memory/3028-6-0x0000000001CC0000-0x0000000002D7A000-memory.dmp upx behavioral1/memory/3028-3-0x0000000001CC0000-0x0000000002D7A000-memory.dmp upx behavioral1/memory/3028-12-0x0000000001CC0000-0x0000000002D7A000-memory.dmp upx behavioral1/memory/3028-10-0x0000000001CC0000-0x0000000002D7A000-memory.dmp upx behavioral1/memory/3028-32-0x0000000001CC0000-0x0000000002D7A000-memory.dmp upx behavioral1/memory/3028-33-0x0000000001CC0000-0x0000000002D7A000-memory.dmp upx behavioral1/memory/3028-34-0x0000000001CC0000-0x0000000002D7A000-memory.dmp upx behavioral1/memory/3028-35-0x0000000001CC0000-0x0000000002D7A000-memory.dmp upx behavioral1/memory/3028-36-0x0000000001CC0000-0x0000000002D7A000-memory.dmp upx behavioral1/memory/3028-55-0x0000000001CC0000-0x0000000002D7A000-memory.dmp upx -
Processes:
ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe -
Processes:
ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exedescription ioc process File opened (read-only) \??\E: ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe -
Drops file in Windows directory 2 IoCs
Processes:
ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exedescription ioc process File created C:\Windows\f762118 ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe File opened for modification C:\Windows\SYSTEM.INI ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exepid process 3028 ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
Processes:
ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exedescription pid process Token: SeDebugPrivilege 3028 ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Token: SeDebugPrivilege 3028 ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Token: SeDebugPrivilege 3028 ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Token: SeDebugPrivilege 3028 ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Token: SeDebugPrivilege 3028 ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Token: SeDebugPrivilege 3028 ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Token: SeDebugPrivilege 3028 ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Token: SeDebugPrivilege 3028 ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Token: SeDebugPrivilege 3028 ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Token: SeDebugPrivilege 3028 ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Token: SeDebugPrivilege 3028 ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Token: SeDebugPrivilege 3028 ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Token: SeDebugPrivilege 3028 ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Token: SeDebugPrivilege 3028 ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Token: SeDebugPrivilege 3028 ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Token: SeDebugPrivilege 3028 ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Token: SeDebugPrivilege 3028 ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Token: SeDebugPrivilege 3028 ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Token: SeDebugPrivilege 3028 ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Token: SeDebugPrivilege 3028 ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exedescription pid process target process PID 3028 wrote to memory of 1132 3028 ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe taskhost.exe PID 3028 wrote to memory of 1192 3028 ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Dwm.exe PID 3028 wrote to memory of 1248 3028 ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe Explorer.EXE PID 3028 wrote to memory of 2036 3028 ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe DllHost.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe"C:\Users\Admin\AppData\Local\Temp\ece3ea9e88d7d918cc8b0c53d826b24aca93c642819607d5a3be46f9634b070a.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1132-13-0x0000000000150000-0x0000000000152000-memory.dmpFilesize
8KB
-
memory/3028-20-0x0000000002EE0000-0x0000000002EE2000-memory.dmpFilesize
8KB
-
memory/3028-39-0x0000000002EE0000-0x0000000002EE2000-memory.dmpFilesize
8KB
-
memory/3028-5-0x0000000001CC0000-0x0000000002D7A000-memory.dmpFilesize
16.7MB
-
memory/3028-21-0x0000000003AA0000-0x0000000003AA1000-memory.dmpFilesize
4KB
-
memory/3028-9-0x0000000001CC0000-0x0000000002D7A000-memory.dmpFilesize
16.7MB
-
memory/3028-24-0x0000000003AA0000-0x0000000003AA1000-memory.dmpFilesize
4KB
-
memory/3028-31-0x0000000002EE0000-0x0000000002EE2000-memory.dmpFilesize
8KB
-
memory/3028-30-0x0000000002EE0000-0x0000000002EE2000-memory.dmpFilesize
8KB
-
memory/3028-11-0x0000000001CC0000-0x0000000002D7A000-memory.dmpFilesize
16.7MB
-
memory/3028-8-0x0000000001CC0000-0x0000000002D7A000-memory.dmpFilesize
16.7MB
-
memory/3028-55-0x0000000001CC0000-0x0000000002D7A000-memory.dmpFilesize
16.7MB
-
memory/3028-7-0x0000000001CC0000-0x0000000002D7A000-memory.dmpFilesize
16.7MB
-
memory/3028-12-0x0000000001CC0000-0x0000000002D7A000-memory.dmpFilesize
16.7MB
-
memory/3028-3-0x0000000001CC0000-0x0000000002D7A000-memory.dmpFilesize
16.7MB
-
memory/3028-4-0x0000000001CC0000-0x0000000002D7A000-memory.dmpFilesize
16.7MB
-
memory/3028-10-0x0000000001CC0000-0x0000000002D7A000-memory.dmpFilesize
16.7MB
-
memory/3028-32-0x0000000001CC0000-0x0000000002D7A000-memory.dmpFilesize
16.7MB
-
memory/3028-33-0x0000000001CC0000-0x0000000002D7A000-memory.dmpFilesize
16.7MB
-
memory/3028-34-0x0000000001CC0000-0x0000000002D7A000-memory.dmpFilesize
16.7MB
-
memory/3028-35-0x0000000001CC0000-0x0000000002D7A000-memory.dmpFilesize
16.7MB
-
memory/3028-36-0x0000000001CC0000-0x0000000002D7A000-memory.dmpFilesize
16.7MB
-
memory/3028-0-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3028-54-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3028-6-0x0000000001CC0000-0x0000000002D7A000-memory.dmpFilesize
16.7MB