Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 13:43
Static task
static1
Behavioral task
behavioral1
Sample
810a37e5ba8a2ccd463b2a19850d476c1c8eca86a9016381486fa778424eea83.dll
Resource
win7-20240903-en
General
-
Target
810a37e5ba8a2ccd463b2a19850d476c1c8eca86a9016381486fa778424eea83.dll
-
Size
120KB
-
MD5
700d57b5cd2de9e09438553875608b64
-
SHA1
b781cf7e5a8bbbe4bf40f4f4511e827a715ff841
-
SHA256
810a37e5ba8a2ccd463b2a19850d476c1c8eca86a9016381486fa778424eea83
-
SHA512
25454219391b1704b1ea1d82dd9064610d8fafd6d97b3f3b6915ccbffdc0330e81ab8ba8d6bca9078dd3418603f6436e76a2c81dbe21deaa9da96e170a024498
-
SSDEEP
3072:q1xPoZ8ljNp20zN3T7EnCVScVk4Kt6q0kzl:qw69NE0xD7qO9S4iVl
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76e10c.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76e10c.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76fdcf.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76fdcf.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76fdcf.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76e10c.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76e10c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76fdcf.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76e10c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76e10c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76fdcf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76fdcf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76fdcf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76fdcf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76e10c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76e10c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76e10c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76e10c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76fdcf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76fdcf.exe -
Executes dropped EXE 3 IoCs
pid Process 2952 f76e10c.exe 2540 f76e32e.exe 2576 f76fdcf.exe -
Loads dropped DLL 6 IoCs
pid Process 1372 rundll32.exe 1372 rundll32.exe 1372 rundll32.exe 1372 rundll32.exe 1372 rundll32.exe 1372 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76e10c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76e10c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76fdcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76fdcf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76e10c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76e10c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76e10c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76fdcf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76fdcf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76e10c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76e10c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76fdcf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76fdcf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76fdcf.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76e10c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76fdcf.exe -
Enumerates connected drives 3 TTPs 15 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: f76e10c.exe File opened (read-only) \??\P: f76e10c.exe File opened (read-only) \??\S: f76e10c.exe File opened (read-only) \??\E: f76fdcf.exe File opened (read-only) \??\E: f76e10c.exe File opened (read-only) \??\G: f76e10c.exe File opened (read-only) \??\K: f76e10c.exe File opened (read-only) \??\N: f76e10c.exe File opened (read-only) \??\R: f76e10c.exe File opened (read-only) \??\H: f76e10c.exe File opened (read-only) \??\I: f76e10c.exe File opened (read-only) \??\J: f76e10c.exe File opened (read-only) \??\M: f76e10c.exe File opened (read-only) \??\O: f76e10c.exe File opened (read-only) \??\Q: f76e10c.exe -
resource yara_rule behavioral1/memory/2952-15-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2952-17-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2952-18-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2952-19-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2952-43-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2952-52-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2952-56-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2952-20-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2952-41-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2952-40-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2952-64-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2952-65-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2952-66-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2952-67-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2952-68-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2952-70-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2952-71-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2952-88-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2952-90-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2952-92-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2952-94-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2952-162-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2576-172-0x0000000000920000-0x00000000019DA000-memory.dmp upx behavioral1/memory/2576-216-0x0000000000920000-0x00000000019DA000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\f76e1c7 f76e10c.exe File opened for modification C:\Windows\SYSTEM.INI f76e10c.exe File created C:\Windows\f77365c f76fdcf.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76e10c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76fdcf.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2952 f76e10c.exe 2952 f76e10c.exe 2576 f76fdcf.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeDebugPrivilege 2952 f76e10c.exe Token: SeDebugPrivilege 2952 f76e10c.exe Token: SeDebugPrivilege 2952 f76e10c.exe Token: SeDebugPrivilege 2952 f76e10c.exe Token: SeDebugPrivilege 2952 f76e10c.exe Token: SeDebugPrivilege 2952 f76e10c.exe Token: SeDebugPrivilege 2952 f76e10c.exe Token: SeDebugPrivilege 2952 f76e10c.exe Token: SeDebugPrivilege 2952 f76e10c.exe Token: SeDebugPrivilege 2952 f76e10c.exe Token: SeDebugPrivilege 2952 f76e10c.exe Token: SeDebugPrivilege 2952 f76e10c.exe Token: SeDebugPrivilege 2952 f76e10c.exe Token: SeDebugPrivilege 2952 f76e10c.exe Token: SeDebugPrivilege 2952 f76e10c.exe Token: SeDebugPrivilege 2952 f76e10c.exe Token: SeDebugPrivilege 2952 f76e10c.exe Token: SeDebugPrivilege 2952 f76e10c.exe Token: SeDebugPrivilege 2952 f76e10c.exe Token: SeDebugPrivilege 2952 f76e10c.exe Token: SeDebugPrivilege 2952 f76e10c.exe Token: SeDebugPrivilege 2952 f76e10c.exe Token: SeDebugPrivilege 2952 f76e10c.exe Token: SeDebugPrivilege 2952 f76e10c.exe Token: SeDebugPrivilege 2576 f76fdcf.exe Token: SeDebugPrivilege 2576 f76fdcf.exe Token: SeDebugPrivilege 2576 f76fdcf.exe Token: SeDebugPrivilege 2576 f76fdcf.exe Token: SeDebugPrivilege 2576 f76fdcf.exe Token: SeDebugPrivilege 2576 f76fdcf.exe Token: SeDebugPrivilege 2576 f76fdcf.exe Token: SeDebugPrivilege 2576 f76fdcf.exe Token: SeDebugPrivilege 2576 f76fdcf.exe Token: SeDebugPrivilege 2576 f76fdcf.exe Token: SeDebugPrivilege 2576 f76fdcf.exe Token: SeDebugPrivilege 2576 f76fdcf.exe Token: SeDebugPrivilege 2576 f76fdcf.exe Token: SeDebugPrivilege 2576 f76fdcf.exe Token: SeDebugPrivilege 2576 f76fdcf.exe Token: SeDebugPrivilege 2576 f76fdcf.exe Token: SeDebugPrivilege 2576 f76fdcf.exe Token: SeDebugPrivilege 2576 f76fdcf.exe Token: SeDebugPrivilege 2576 f76fdcf.exe Token: SeDebugPrivilege 2576 f76fdcf.exe Token: SeDebugPrivilege 2576 f76fdcf.exe Token: SeDebugPrivilege 2576 f76fdcf.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1980 wrote to memory of 1372 1980 rundll32.exe 31 PID 1980 wrote to memory of 1372 1980 rundll32.exe 31 PID 1980 wrote to memory of 1372 1980 rundll32.exe 31 PID 1980 wrote to memory of 1372 1980 rundll32.exe 31 PID 1980 wrote to memory of 1372 1980 rundll32.exe 31 PID 1980 wrote to memory of 1372 1980 rundll32.exe 31 PID 1980 wrote to memory of 1372 1980 rundll32.exe 31 PID 1372 wrote to memory of 2952 1372 rundll32.exe 32 PID 1372 wrote to memory of 2952 1372 rundll32.exe 32 PID 1372 wrote to memory of 2952 1372 rundll32.exe 32 PID 1372 wrote to memory of 2952 1372 rundll32.exe 32 PID 2952 wrote to memory of 1048 2952 f76e10c.exe 18 PID 2952 wrote to memory of 1120 2952 f76e10c.exe 20 PID 2952 wrote to memory of 1168 2952 f76e10c.exe 21 PID 2952 wrote to memory of 1984 2952 f76e10c.exe 23 PID 2952 wrote to memory of 1980 2952 f76e10c.exe 30 PID 2952 wrote to memory of 1372 2952 f76e10c.exe 31 PID 2952 wrote to memory of 1372 2952 f76e10c.exe 31 PID 1372 wrote to memory of 2540 1372 rundll32.exe 33 PID 1372 wrote to memory of 2540 1372 rundll32.exe 33 PID 1372 wrote to memory of 2540 1372 rundll32.exe 33 PID 1372 wrote to memory of 2540 1372 rundll32.exe 33 PID 1372 wrote to memory of 2576 1372 rundll32.exe 34 PID 1372 wrote to memory of 2576 1372 rundll32.exe 34 PID 1372 wrote to memory of 2576 1372 rundll32.exe 34 PID 1372 wrote to memory of 2576 1372 rundll32.exe 34 PID 2952 wrote to memory of 1048 2952 f76e10c.exe 18 PID 2952 wrote to memory of 1120 2952 f76e10c.exe 20 PID 2952 wrote to memory of 1168 2952 f76e10c.exe 21 PID 2952 wrote to memory of 1984 2952 f76e10c.exe 23 PID 2952 wrote to memory of 2540 2952 f76e10c.exe 33 PID 2952 wrote to memory of 2540 2952 f76e10c.exe 33 PID 2952 wrote to memory of 2576 2952 f76e10c.exe 34 PID 2952 wrote to memory of 2576 2952 f76e10c.exe 34 PID 2576 wrote to memory of 1048 2576 f76fdcf.exe 18 PID 2576 wrote to memory of 1120 2576 f76fdcf.exe 20 PID 2576 wrote to memory of 1168 2576 f76fdcf.exe 21 PID 2576 wrote to memory of 1984 2576 f76fdcf.exe 23 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76e10c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76fdcf.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1048
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1120
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1168
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\810a37e5ba8a2ccd463b2a19850d476c1c8eca86a9016381486fa778424eea83.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\810a37e5ba8a2ccd463b2a19850d476c1c8eca86a9016381486fa778424eea83.dll,#13⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\f76e10c.exeC:\Users\Admin\AppData\Local\Temp\f76e10c.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2952
-
-
C:\Users\Admin\AppData\Local\Temp\f76e32e.exeC:\Users\Admin\AppData\Local\Temp\f76e32e.exe4⤵
- Executes dropped EXE
PID:2540
-
-
C:\Users\Admin\AppData\Local\Temp\f76fdcf.exeC:\Users\Admin\AppData\Local\Temp\f76fdcf.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2576
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1984
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD5a31cf3f57ad0119f29d789ca913942f0
SHA19a85bf7d3ed8094437a8b148a97709f43553226f
SHA25688d7ff6d7d2f1ee02b9e8d987f1d5a54c4b73054ae99a8e4b029caf25a315ad1
SHA51229d696934518a084775fa1e304866fa3668f970e171c8526c04a9e723cbd240604701f1a3de59a1164ca441edd185f945c989d1602080a445d28c7bca4e76067
-
Filesize
97KB
MD5c86d7675eff8ebb1ef791585e3500d89
SHA11e0e8bc22d8761ef94e22deb9f725ea3208c3cf5
SHA2567d42aa7324691ddf6d095bd631f0b6f0dad68c410c681aec019428c6e4468259
SHA5128c657811edeaf90a0e2a07209d6046e437aa2a054e43aff6dabfe977f671e0fcaf3711c9c8b143364e6b00e07ca20c235d69ac62569db3e531d8b86b6f30eeaa