Analysis

  • max time kernel
    14s
  • max time network
    40s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    09-10-2024 08:26

General

  • Target

    21774c4738539daf6f2e348afe5159d9a5e8e85b034acb239176ce27bebffb9c.exe

  • Size

    232KB

  • MD5

    1240c2b02ccf18357e1bff94f0b4afdc

  • SHA1

    62dba22a7214051e7f6d21df13dca10d551364ce

  • SHA256

    21774c4738539daf6f2e348afe5159d9a5e8e85b034acb239176ce27bebffb9c

  • SHA512

    8c357fd51281e9954fa8a654fe2f7c150624c05646fcb29e547df84cb3b6fcd05b92e192e2dd7c1027e246dfaae671e0f67f6300d21f92cafdb239bc96c9161a

  • SSDEEP

    3072:Wn+htWMtf+7GZYGVA2QJgi8xJLDoUiLGCHObD+g6jBRnRvtrmBT0FHm:oEGqZYGVd82PD2yLIRnBtaBTcG

Malware Config

Extracted

Family

bdaejec

C2

ddos.dnsnb8.net

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Signatures

  • Bdaejec

    Bdaejec is a backdoor written in C++.

  • Detects Bdaejec Backdoor. 3 IoCs

    Bdaejec is backdoor written in C++.

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Modifies firewall policy service 3 TTPs 6 IoCs
  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • UAC bypass 3 TTPs 2 IoCs
  • Windows security bypass 2 TTPs 18 IoCs
  • Fatal Rat payload 5 IoCs
  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Windows security modification 2 TTPs 20 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 10 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 2 IoCs
  • UPX packed file 25 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1292
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1360
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1388
          • C:\Users\Admin\AppData\Local\Temp\21774c4738539daf6f2e348afe5159d9a5e8e85b034acb239176ce27bebffb9c.exe
            "C:\Users\Admin\AppData\Local\Temp\21774c4738539daf6f2e348afe5159d9a5e8e85b034acb239176ce27bebffb9c.exe"
            2⤵
            • Modifies firewall policy service
            • UAC bypass
            • Windows security bypass
            • Loads dropped DLL
            • Windows security modification
            • Checks whether UAC is enabled
            • Enumerates connected drives
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:1656
            • C:\Users\Admin\AppData\Local\Temp\alkFi.exe
              C:\Users\Admin\AppData\Local\Temp\alkFi.exe
              3⤵
              • Executes dropped EXE
              • Drops file in Program Files directory
              • System Location Discovery: System Language Discovery
              PID:2900
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c ""C:\Users\Admin\AppData\Local\Temp\131a76ff.bat" "
                4⤵
                  PID:2932
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
            1⤵
              PID:1028
            • C:\Windows\Stuvwx.exe
              C:\Windows\Stuvwx.exe
              1⤵
              • Modifies firewall policy service
              • UAC bypass
              • Windows security bypass
              • Executes dropped EXE
              • Loads dropped DLL
              • Windows security modification
              • Checks whether UAC is enabled
              • Enumerates connected drives
              • System Location Discovery: System Language Discovery
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:2708
              • C:\Windows\TEMP\alkFi.exe
                C:\Windows\TEMP\alkFi.exe
                2⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Drops file in Program Files directory
                • System Location Discovery: System Language Discovery
                • Modifies data under HKEY_USERS
                PID:3064
              • C:\Windows\Stuvwx.exe
                C:\Windows\Stuvwx.exe Win7
                2⤵
                  PID:1740

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe

                Filesize

                272KB

                MD5

                f0a669d49b8f0fc4c309c195295cbfda

                SHA1

                ed36767cae9665ce44e3506a918f423196203995

                SHA256

                d3240db00595da121683548f0839d0306532a7d6258845063d3169f91edb8416

                SHA512

                47178199d633976b933807e3aa1aa1d6eaaab875b1bd0c0143a79d67fe8526a42e652e271f5f71953498bedff4a1a72b872873b092bf98c4cee5540936bff5fc

              • C:\Program Files\7-Zip\Uninstall.exe

                Filesize

                31KB

                MD5

                92a5aee49da3baf414468c79182df6b4

                SHA1

                c1623fff4c6575a67185ab76284786d3a1eac663

                SHA256

                fb08ed133c9ea109c6e9ade968844e50e127c26f3caf89c1d9626af881311060

                SHA512

                d9c40153e0fc431127a25395f099e789ceaa6262e7a57e07524a1f97158f1f53d1461062c574b45a86c4b1848dd101bcb939b95d347324c2322e135870ebd1f2

              • C:\Users\Admin\AppData\Local\Temp\131a76ff.bat

                Filesize

                185B

                MD5

                8b4c797d6339ddfe288e2eba2cc894b4

                SHA1

                e47469a1d3fe4aa19fc6e82e54c86ecaab9262bc

                SHA256

                ba0a0cff5b6340ed637834f4335dfec15c4428c28b5fcf0e068a589ce69d8164

                SHA512

                3b7f8214fbccc468e427538c16805101f8f2fd4904b0814d779c5059d818ea29bfbd3694022e86edd4772a30fc31472eff94d10ece4d463d7e25394bc7e0f5b9

              • C:\Users\Admin\AppData\Local\Temp\1966518E.exe

                Filesize

                4B

                MD5

                20879c987e2f9a916e578386d499f629

                SHA1

                c7b33ddcc42361fdb847036fc07e880b81935d5d

                SHA256

                9f2981a7cc4d40a2a409dc895de64253acd819d7c0011c8e80b86fe899464e31

                SHA512

                bcdde1625364dd6dd143b45bdcec8d59cf8982aff33790d390b839f3869e0e815684568b14b555a596d616252aeeaa98dac2e6e551c9095ea11a575ff25ff84f

              • C:\Users\Admin\AppData\Local\Temp\alkFi.exe

                Filesize

                15KB

                MD5

                56b2c3810dba2e939a8bb9fa36d3cf96

                SHA1

                99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

                SHA256

                4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

                SHA512

                27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

              • C:\Windows\SYSTEM.INI

                Filesize

                257B

                MD5

                609fc84c38f1a89502daff75030cae33

                SHA1

                1a0413325f97267a4b1b000daa7ae3c74fa449b2

                SHA256

                a49364db50d78b935fe266f3128a1d2a853e868ae6077b1af7a69edd2bd23833

                SHA512

                d315add977a7b6a8a8504692028f631cfa4cfa26993361ca09e57f8f954a79a199ba0642ec8d368e21dc8953dab154320bd7a6315b415209ffbc387ac34e9189

              • C:\Windows\Stuvwx.exe

                Filesize

                232KB

                MD5

                1240c2b02ccf18357e1bff94f0b4afdc

                SHA1

                62dba22a7214051e7f6d21df13dca10d551364ce

                SHA256

                21774c4738539daf6f2e348afe5159d9a5e8e85b034acb239176ce27bebffb9c

                SHA512

                8c357fd51281e9954fa8a654fe2f7c150624c05646fcb29e547df84cb3b6fcd05b92e192e2dd7c1027e246dfaae671e0f67f6300d21f92cafdb239bc96c9161a

              • memory/1292-21-0x0000000001FE0000-0x0000000001FE2000-memory.dmp

                Filesize

                8KB

              • memory/1656-28-0x00000000003E0000-0x00000000003E1000-memory.dmp

                Filesize

                4KB

              • memory/1656-63-0x00000000006A0000-0x000000000172E000-memory.dmp

                Filesize

                16.6MB

              • memory/1656-40-0x00000000006A0000-0x000000000172E000-memory.dmp

                Filesize

                16.6MB

              • memory/1656-37-0x00000000006A0000-0x000000000172E000-memory.dmp

                Filesize

                16.6MB

              • memory/1656-30-0x00000000003E0000-0x00000000003E1000-memory.dmp

                Filesize

                4KB

              • memory/1656-0-0x0000000000400000-0x000000000043B000-memory.dmp

                Filesize

                236KB

              • memory/1656-27-0x00000000003D0000-0x00000000003D2000-memory.dmp

                Filesize

                8KB

              • memory/1656-18-0x0000000000280000-0x0000000000289000-memory.dmp

                Filesize

                36KB

              • memory/1656-20-0x00000000006A0000-0x000000000172E000-memory.dmp

                Filesize

                16.6MB

              • memory/1656-15-0x00000000006A0000-0x000000000172E000-memory.dmp

                Filesize

                16.6MB

              • memory/1656-12-0x00000000006A0000-0x000000000172E000-memory.dmp

                Filesize

                16.6MB

              • memory/1656-39-0x00000000003D0000-0x00000000003D2000-memory.dmp

                Filesize

                8KB

              • memory/1656-13-0x00000000006A0000-0x000000000172E000-memory.dmp

                Filesize

                16.6MB

              • memory/1656-14-0x00000000006A0000-0x000000000172E000-memory.dmp

                Filesize

                16.6MB

              • memory/1656-8-0x00000000006A0000-0x000000000172E000-memory.dmp

                Filesize

                16.6MB

              • memory/1656-19-0x00000000006A0000-0x000000000172E000-memory.dmp

                Filesize

                16.6MB

              • memory/1656-45-0x00000000006A0000-0x000000000172E000-memory.dmp

                Filesize

                16.6MB

              • memory/1656-47-0x0000000010000000-0x000000001001C000-memory.dmp

                Filesize

                112KB

              • memory/1656-46-0x00000000006A0000-0x000000000172E000-memory.dmp

                Filesize

                16.6MB

              • memory/1656-58-0x00000000006A0000-0x000000000172E000-memory.dmp

                Filesize

                16.6MB

              • memory/1656-59-0x00000000006A0000-0x000000000172E000-memory.dmp

                Filesize

                16.6MB

              • memory/1656-60-0x00000000006A0000-0x000000000172E000-memory.dmp

                Filesize

                16.6MB

              • memory/1656-62-0x00000000006A0000-0x000000000172E000-memory.dmp

                Filesize

                16.6MB

              • memory/1656-42-0x00000000003D0000-0x00000000003D2000-memory.dmp

                Filesize

                8KB

              • memory/1656-64-0x0000000000400000-0x000000000043B000-memory.dmp

                Filesize

                236KB

              • memory/1656-67-0x00000000006A0000-0x000000000172E000-memory.dmp

                Filesize

                16.6MB

              • memory/1656-66-0x00000000006A0000-0x000000000172E000-memory.dmp

                Filesize

                16.6MB

              • memory/1656-38-0x00000000006A0000-0x000000000172E000-memory.dmp

                Filesize

                16.6MB

              • memory/1656-200-0x00000000006A0000-0x000000000172E000-memory.dmp

                Filesize

                16.6MB

              • memory/1656-75-0x00000000006A0000-0x000000000172E000-memory.dmp

                Filesize

                16.6MB

              • memory/1656-16-0x0000000000280000-0x0000000000289000-memory.dmp

                Filesize

                36KB

              • memory/1740-281-0x0000000000400000-0x000000000043B000-memory.dmp

                Filesize

                236KB

              • memory/1740-367-0x0000000000400000-0x000000000043B000-memory.dmp

                Filesize

                236KB

              • memory/2708-234-0x0000000003CC0000-0x0000000003CFB000-memory.dmp

                Filesize

                236KB

              • memory/2708-93-0x0000000000540000-0x00000000015CE000-memory.dmp

                Filesize

                16.6MB

              • memory/2708-362-0x0000000003CC0000-0x0000000003CFB000-memory.dmp

                Filesize

                236KB

              • memory/2708-80-0x0000000000400000-0x000000000043B000-memory.dmp

                Filesize

                236KB

              • memory/2708-91-0x0000000000540000-0x00000000015CE000-memory.dmp

                Filesize

                16.6MB

              • memory/2708-96-0x0000000000540000-0x00000000015CE000-memory.dmp

                Filesize

                16.6MB

              • memory/2708-94-0x0000000000540000-0x00000000015CE000-memory.dmp

                Filesize

                16.6MB

              • memory/2708-255-0x0000000000400000-0x000000000043B000-memory.dmp

                Filesize

                236KB

              • memory/2900-78-0x00000000001A0000-0x00000000001A2000-memory.dmp

                Filesize

                8KB

              • memory/2900-17-0x0000000000AF0000-0x0000000000AF9000-memory.dmp

                Filesize

                36KB

              • memory/2900-97-0x0000000000AF0000-0x0000000000AF9000-memory.dmp

                Filesize

                36KB

              • memory/2900-41-0x00000000001A0000-0x00000000001A2000-memory.dmp

                Filesize

                8KB

              • memory/2900-43-0x00000000001A0000-0x00000000001A2000-memory.dmp

                Filesize

                8KB

              • memory/2900-36-0x00000000001B0000-0x00000000001B1000-memory.dmp

                Filesize

                4KB

              • memory/3064-98-0x0000000001000000-0x0000000001009000-memory.dmp

                Filesize

                36KB