Analysis
-
max time kernel
123s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
18-06-2024 10:51
Static task
static1
Behavioral task
behavioral1
Sample
dil.exe
Resource
win7-20240508-en
General
-
Target
dil.exe
-
Size
104KB
-
MD5
1c4eae5ef3e10ce0676618418ea9ed65
-
SHA1
26e7f992746b0e9b783d360c8cf9e475bd1ce015
-
SHA256
b9c3adeb63e6be94b581a68b3b675737501283db663484bfc7e14bdecfc7e940
-
SHA512
d459f72f5403941a7c1666dc91911446ac608faba8cae0a44ab8a2324536ed8db25f5a8c9e80cfcffd09df61a541ba181f94545404e62cf23f5e67e896bc2645
-
SSDEEP
1536:sKSowsA2YQWZzF90K/m2eMJN6tOwSDW7tyQPjccFl3kvQhMuJlAGGk/l:s1JsACe3uNM6tXb7tyOjtb3OQrEDW
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
Processes:
dil.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" dil.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" dil.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" dil.exe -
Processes:
dil.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dil.exe -
Processes:
dil.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" dil.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" dil.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" dil.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" dil.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" dil.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" dil.exe -
Processes:
resource yara_rule behavioral1/memory/3016-4-0x0000000001CF0000-0x0000000002D7E000-memory.dmp upx behavioral1/memory/3016-7-0x0000000001CF0000-0x0000000002D7E000-memory.dmp upx behavioral1/memory/3016-10-0x0000000001CF0000-0x0000000002D7E000-memory.dmp upx behavioral1/memory/3016-9-0x0000000001CF0000-0x0000000002D7E000-memory.dmp upx behavioral1/memory/3016-8-0x0000000001CF0000-0x0000000002D7E000-memory.dmp upx behavioral1/memory/3016-6-0x0000000001CF0000-0x0000000002D7E000-memory.dmp upx behavioral1/memory/3016-5-0x0000000001CF0000-0x0000000002D7E000-memory.dmp upx behavioral1/memory/3016-3-0x0000000001CF0000-0x0000000002D7E000-memory.dmp upx behavioral1/memory/3016-11-0x0000000001CF0000-0x0000000002D7E000-memory.dmp upx behavioral1/memory/3016-28-0x0000000001CF0000-0x0000000002D7E000-memory.dmp upx behavioral1/memory/3016-27-0x0000000001CF0000-0x0000000002D7E000-memory.dmp upx behavioral1/memory/3016-29-0x0000000001CF0000-0x0000000002D7E000-memory.dmp upx behavioral1/memory/3016-30-0x0000000001CF0000-0x0000000002D7E000-memory.dmp upx behavioral1/memory/3016-31-0x0000000001CF0000-0x0000000002D7E000-memory.dmp upx behavioral1/memory/3016-33-0x0000000001CF0000-0x0000000002D7E000-memory.dmp upx behavioral1/memory/3016-47-0x0000000001CF0000-0x0000000002D7E000-memory.dmp upx behavioral1/memory/3016-49-0x0000000001CF0000-0x0000000002D7E000-memory.dmp upx behavioral1/memory/3016-50-0x0000000001CF0000-0x0000000002D7E000-memory.dmp upx behavioral1/memory/3016-52-0x0000000001CF0000-0x0000000002D7E000-memory.dmp upx behavioral1/memory/3016-55-0x0000000001CF0000-0x0000000002D7E000-memory.dmp upx behavioral1/memory/3016-56-0x0000000001CF0000-0x0000000002D7E000-memory.dmp upx behavioral1/memory/3016-57-0x0000000001CF0000-0x0000000002D7E000-memory.dmp upx behavioral1/memory/3016-60-0x0000000001CF0000-0x0000000002D7E000-memory.dmp upx behavioral1/memory/3016-62-0x0000000001CF0000-0x0000000002D7E000-memory.dmp upx behavioral1/memory/3016-65-0x0000000001CF0000-0x0000000002D7E000-memory.dmp upx behavioral1/memory/3016-79-0x0000000001CF0000-0x0000000002D7E000-memory.dmp upx -
Processes:
dil.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" dil.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" dil.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" dil.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" dil.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" dil.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" dil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc dil.exe -
Processes:
dil.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dil.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
dil.exedescription ioc process File opened (read-only) \??\P: dil.exe File opened (read-only) \??\T: dil.exe File opened (read-only) \??\N: dil.exe File opened (read-only) \??\I: dil.exe File opened (read-only) \??\J: dil.exe File opened (read-only) \??\L: dil.exe File opened (read-only) \??\O: dil.exe File opened (read-only) \??\Q: dil.exe File opened (read-only) \??\U: dil.exe File opened (read-only) \??\E: dil.exe File opened (read-only) \??\K: dil.exe File opened (read-only) \??\M: dil.exe File opened (read-only) \??\V: dil.exe File opened (read-only) \??\W: dil.exe File opened (read-only) \??\X: dil.exe File opened (read-only) \??\Z: dil.exe File opened (read-only) \??\G: dil.exe File opened (read-only) \??\R: dil.exe File opened (read-only) \??\S: dil.exe File opened (read-only) \??\Y: dil.exe File opened (read-only) \??\H: dil.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
dil.exedescription ioc process File opened for modification C:\autorun.inf dil.exe File opened for modification F:\autorun.inf dil.exe -
Drops file in Program Files directory 5 IoCs
Processes:
dil.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe dil.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe dil.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe dil.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe dil.exe File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe dil.exe -
Drops file in Windows directory 1 IoCs
Processes:
dil.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI dil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
dil.exepid process 3016 dil.exe 3016 dil.exe 3016 dil.exe 3016 dil.exe 3016 dil.exe 3016 dil.exe 3016 dil.exe 3016 dil.exe 3016 dil.exe 3016 dil.exe 3016 dil.exe 3016 dil.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
Processes:
dil.exedescription pid process Token: SeDebugPrivilege 3016 dil.exe Token: SeDebugPrivilege 3016 dil.exe Token: SeDebugPrivilege 3016 dil.exe Token: SeDebugPrivilege 3016 dil.exe Token: SeDebugPrivilege 3016 dil.exe Token: SeDebugPrivilege 3016 dil.exe Token: SeDebugPrivilege 3016 dil.exe Token: SeDebugPrivilege 3016 dil.exe Token: SeDebugPrivilege 3016 dil.exe Token: SeDebugPrivilege 3016 dil.exe Token: SeDebugPrivilege 3016 dil.exe Token: SeDebugPrivilege 3016 dil.exe Token: SeDebugPrivilege 3016 dil.exe Token: SeDebugPrivilege 3016 dil.exe Token: SeDebugPrivilege 3016 dil.exe Token: SeDebugPrivilege 3016 dil.exe Token: SeDebugPrivilege 3016 dil.exe Token: SeDebugPrivilege 3016 dil.exe Token: SeDebugPrivilege 3016 dil.exe Token: SeDebugPrivilege 3016 dil.exe Token: SeDebugPrivilege 3016 dil.exe Token: SeDebugPrivilege 3016 dil.exe Token: SeDebugPrivilege 3016 dil.exe Token: SeDebugPrivilege 3016 dil.exe Token: SeDebugPrivilege 3016 dil.exe Token: SeDebugPrivilege 3016 dil.exe Token: SeDebugPrivilege 3016 dil.exe Token: SeDebugPrivilege 3016 dil.exe Token: SeDebugPrivilege 3016 dil.exe Token: SeDebugPrivilege 3016 dil.exe Token: SeDebugPrivilege 3016 dil.exe Token: SeDebugPrivilege 3016 dil.exe -
Suspicious use of WriteProcessMemory 37 IoCs
Processes:
dil.exedescription pid process target process PID 3016 wrote to memory of 1124 3016 dil.exe taskhost.exe PID 3016 wrote to memory of 1184 3016 dil.exe Dwm.exe PID 3016 wrote to memory of 1208 3016 dil.exe Explorer.EXE PID 3016 wrote to memory of 1028 3016 dil.exe DllHost.exe PID 3016 wrote to memory of 1124 3016 dil.exe taskhost.exe PID 3016 wrote to memory of 1184 3016 dil.exe Dwm.exe PID 3016 wrote to memory of 1208 3016 dil.exe Explorer.EXE PID 3016 wrote to memory of 1124 3016 dil.exe taskhost.exe PID 3016 wrote to memory of 1184 3016 dil.exe Dwm.exe PID 3016 wrote to memory of 1208 3016 dil.exe Explorer.EXE PID 3016 wrote to memory of 1124 3016 dil.exe taskhost.exe PID 3016 wrote to memory of 1184 3016 dil.exe Dwm.exe PID 3016 wrote to memory of 1208 3016 dil.exe Explorer.EXE PID 3016 wrote to memory of 1124 3016 dil.exe taskhost.exe PID 3016 wrote to memory of 1184 3016 dil.exe Dwm.exe PID 3016 wrote to memory of 1208 3016 dil.exe Explorer.EXE PID 3016 wrote to memory of 1124 3016 dil.exe taskhost.exe PID 3016 wrote to memory of 1184 3016 dil.exe Dwm.exe PID 3016 wrote to memory of 1208 3016 dil.exe Explorer.EXE PID 3016 wrote to memory of 1124 3016 dil.exe taskhost.exe PID 3016 wrote to memory of 1184 3016 dil.exe Dwm.exe PID 3016 wrote to memory of 1208 3016 dil.exe Explorer.EXE PID 3016 wrote to memory of 1124 3016 dil.exe taskhost.exe PID 3016 wrote to memory of 1184 3016 dil.exe Dwm.exe PID 3016 wrote to memory of 1208 3016 dil.exe Explorer.EXE PID 3016 wrote to memory of 1124 3016 dil.exe taskhost.exe PID 3016 wrote to memory of 1184 3016 dil.exe Dwm.exe PID 3016 wrote to memory of 1208 3016 dil.exe Explorer.EXE PID 3016 wrote to memory of 1124 3016 dil.exe taskhost.exe PID 3016 wrote to memory of 1184 3016 dil.exe Dwm.exe PID 3016 wrote to memory of 1208 3016 dil.exe Explorer.EXE PID 3016 wrote to memory of 1124 3016 dil.exe taskhost.exe PID 3016 wrote to memory of 1184 3016 dil.exe Dwm.exe PID 3016 wrote to memory of 1208 3016 dil.exe Explorer.EXE PID 3016 wrote to memory of 1124 3016 dil.exe taskhost.exe PID 3016 wrote to memory of 1184 3016 dil.exe Dwm.exe PID 3016 wrote to memory of 1208 3016 dil.exe Explorer.EXE -
System policy modification 1 TTPs 1 IoCs
Processes:
dil.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dil.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\dil.exe"C:\Users\Admin\AppData\Local\Temp\dil.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Impair Defenses
4Disable or Modify Tools
3Disable or Modify System Firewall
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Replay Monitor
Loading Replay Monitor...
Downloads
-
F:\dggkns.exeFilesize
100KB
MD55bcab855470d6f779af9f696f521b570
SHA18d9e69146187ceaff354ec2feaebd98ae7880a14
SHA256336564064d0de23af06402b841f1bc1a28b11069f3de0bc9994119a46ec64a30
SHA512bd46b073aa56cd8d56da183adea69b1c60f3566747a7297529528fadb78ccf5186fe3443509dc3127ced46a42d15006205cfebd379501487c5663da479e303a0
-
memory/1124-12-0x0000000000450000-0x0000000000452000-memory.dmpFilesize
8KB
-
memory/3016-29-0x0000000001CF0000-0x0000000002D7E000-memory.dmpFilesize
16.6MB
-
memory/3016-106-0x0000000000630000-0x0000000000632000-memory.dmpFilesize
8KB
-
memory/3016-10-0x0000000001CF0000-0x0000000002D7E000-memory.dmpFilesize
16.6MB
-
memory/3016-31-0x0000000001CF0000-0x0000000002D7E000-memory.dmpFilesize
16.6MB
-
memory/3016-24-0x0000000003EA0000-0x0000000003EA1000-memory.dmpFilesize
4KB
-
memory/3016-22-0x0000000003EA0000-0x0000000003EA1000-memory.dmpFilesize
4KB
-
memory/3016-21-0x0000000003E50000-0x0000000003E52000-memory.dmpFilesize
8KB
-
memory/3016-7-0x0000000001CF0000-0x0000000002D7E000-memory.dmpFilesize
16.6MB
-
memory/3016-8-0x0000000001CF0000-0x0000000002D7E000-memory.dmpFilesize
16.6MB
-
memory/3016-6-0x0000000001CF0000-0x0000000002D7E000-memory.dmpFilesize
16.6MB
-
memory/3016-5-0x0000000001CF0000-0x0000000002D7E000-memory.dmpFilesize
16.6MB
-
memory/3016-3-0x0000000001CF0000-0x0000000002D7E000-memory.dmpFilesize
16.6MB
-
memory/3016-11-0x0000000001CF0000-0x0000000002D7E000-memory.dmpFilesize
16.6MB
-
memory/3016-26-0x0000000003E50000-0x0000000003E52000-memory.dmpFilesize
8KB
-
memory/3016-28-0x0000000001CF0000-0x0000000002D7E000-memory.dmpFilesize
16.6MB
-
memory/3016-27-0x0000000001CF0000-0x0000000002D7E000-memory.dmpFilesize
16.6MB
-
memory/3016-0-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/3016-30-0x0000000001CF0000-0x0000000002D7E000-memory.dmpFilesize
16.6MB
-
memory/3016-9-0x0000000001CF0000-0x0000000002D7E000-memory.dmpFilesize
16.6MB
-
memory/3016-25-0x0000000003E50000-0x0000000003E52000-memory.dmpFilesize
8KB
-
memory/3016-44-0x0000000000630000-0x0000000000632000-memory.dmpFilesize
8KB
-
memory/3016-45-0x0000000003ED0000-0x0000000003ED1000-memory.dmpFilesize
4KB
-
memory/3016-46-0x0000000000630000-0x0000000000632000-memory.dmpFilesize
8KB
-
memory/3016-47-0x0000000001CF0000-0x0000000002D7E000-memory.dmpFilesize
16.6MB
-
memory/3016-49-0x0000000001CF0000-0x0000000002D7E000-memory.dmpFilesize
16.6MB
-
memory/3016-50-0x0000000001CF0000-0x0000000002D7E000-memory.dmpFilesize
16.6MB
-
memory/3016-52-0x0000000001CF0000-0x0000000002D7E000-memory.dmpFilesize
16.6MB
-
memory/3016-55-0x0000000001CF0000-0x0000000002D7E000-memory.dmpFilesize
16.6MB
-
memory/3016-56-0x0000000001CF0000-0x0000000002D7E000-memory.dmpFilesize
16.6MB
-
memory/3016-57-0x0000000001CF0000-0x0000000002D7E000-memory.dmpFilesize
16.6MB
-
memory/3016-60-0x0000000001CF0000-0x0000000002D7E000-memory.dmpFilesize
16.6MB
-
memory/3016-62-0x0000000001CF0000-0x0000000002D7E000-memory.dmpFilesize
16.6MB
-
memory/3016-65-0x0000000001CF0000-0x0000000002D7E000-memory.dmpFilesize
16.6MB
-
memory/3016-79-0x0000000001CF0000-0x0000000002D7E000-memory.dmpFilesize
16.6MB
-
memory/3016-91-0x0000000003E50000-0x0000000003E52000-memory.dmpFilesize
8KB
-
memory/3016-33-0x0000000001CF0000-0x0000000002D7E000-memory.dmpFilesize
16.6MB
-
memory/3016-4-0x0000000001CF0000-0x0000000002D7E000-memory.dmpFilesize
16.6MB