Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/12/2024, 13:58
Static task
static1
Behavioral task
behavioral1
Sample
9f4507cfc67278bdf47e2ba1ec2f0cf445fc63703213fd983b90394acacab142N.dll
Resource
win7-20240903-en
General
-
Target
9f4507cfc67278bdf47e2ba1ec2f0cf445fc63703213fd983b90394acacab142N.dll
-
Size
120KB
-
MD5
f0c8288cc6dc225b1db902a84e4ffbc0
-
SHA1
6bea47dbbbfc0ac78d2cfa8ef2b698c7ea1fdb35
-
SHA256
9f4507cfc67278bdf47e2ba1ec2f0cf445fc63703213fd983b90394acacab142
-
SHA512
a2db9842f85927bede519297ec57697e6d257473df9a66c20281303f35d684464850cde1eb9328563e5b12bcca8d634dec0f98ad4fe51709a6e953108c2bf2ae
-
SSDEEP
3072:79MvdYipneTiQ85dkWH3xWD2EP+ED40zN:w1deTXY+AxWHz
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76785b.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76785b.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76785b.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f7693f6.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f7693f6.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f7693f6.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76785b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7693f6.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76785b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f7693f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f7693f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f7693f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f7693f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f7693f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76785b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76785b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76785b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76785b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76785b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f7693f6.exe -
Executes dropped EXE 3 IoCs
pid Process 2224 f76785b.exe 2644 f7679f1.exe 1920 f7693f6.exe -
Loads dropped DLL 6 IoCs
pid Process 2292 rundll32.exe 2292 rundll32.exe 2292 rundll32.exe 2292 rundll32.exe 2292 rundll32.exe 2292 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f7693f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f7693f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76785b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f7693f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76785b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76785b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f7693f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f7693f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76785b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f7693f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76785b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f7693f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76785b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76785b.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76785b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7693f6.exe -
Enumerates connected drives 3 TTPs 17 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: f76785b.exe File opened (read-only) \??\H: f76785b.exe File opened (read-only) \??\K: f76785b.exe File opened (read-only) \??\M: f76785b.exe File opened (read-only) \??\O: f76785b.exe File opened (read-only) \??\J: f76785b.exe File opened (read-only) \??\L: f76785b.exe File opened (read-only) \??\R: f76785b.exe File opened (read-only) \??\S: f76785b.exe File opened (read-only) \??\E: f76785b.exe File opened (read-only) \??\N: f76785b.exe File opened (read-only) \??\P: f76785b.exe File opened (read-only) \??\E: f7693f6.exe File opened (read-only) \??\I: f76785b.exe File opened (read-only) \??\Q: f76785b.exe File opened (read-only) \??\T: f76785b.exe File opened (read-only) \??\G: f7693f6.exe -
resource yara_rule behavioral1/memory/2224-17-0x0000000000680000-0x000000000173A000-memory.dmp upx behavioral1/memory/2224-19-0x0000000000680000-0x000000000173A000-memory.dmp upx behavioral1/memory/2224-16-0x0000000000680000-0x000000000173A000-memory.dmp upx behavioral1/memory/2224-18-0x0000000000680000-0x000000000173A000-memory.dmp upx behavioral1/memory/2224-22-0x0000000000680000-0x000000000173A000-memory.dmp upx behavioral1/memory/2224-23-0x0000000000680000-0x000000000173A000-memory.dmp upx behavioral1/memory/2224-25-0x0000000000680000-0x000000000173A000-memory.dmp upx behavioral1/memory/2224-24-0x0000000000680000-0x000000000173A000-memory.dmp upx behavioral1/memory/2224-21-0x0000000000680000-0x000000000173A000-memory.dmp upx behavioral1/memory/2224-20-0x0000000000680000-0x000000000173A000-memory.dmp upx behavioral1/memory/2224-62-0x0000000000680000-0x000000000173A000-memory.dmp upx behavioral1/memory/2224-63-0x0000000000680000-0x000000000173A000-memory.dmp upx behavioral1/memory/2224-64-0x0000000000680000-0x000000000173A000-memory.dmp upx behavioral1/memory/2224-65-0x0000000000680000-0x000000000173A000-memory.dmp upx behavioral1/memory/2224-66-0x0000000000680000-0x000000000173A000-memory.dmp upx behavioral1/memory/2224-68-0x0000000000680000-0x000000000173A000-memory.dmp upx behavioral1/memory/2224-69-0x0000000000680000-0x000000000173A000-memory.dmp upx behavioral1/memory/2224-86-0x0000000000680000-0x000000000173A000-memory.dmp upx behavioral1/memory/2224-88-0x0000000000680000-0x000000000173A000-memory.dmp upx behavioral1/memory/2224-89-0x0000000000680000-0x000000000173A000-memory.dmp upx behavioral1/memory/2224-111-0x0000000000680000-0x000000000173A000-memory.dmp upx behavioral1/memory/2224-114-0x0000000000680000-0x000000000173A000-memory.dmp upx behavioral1/memory/2224-158-0x0000000000680000-0x000000000173A000-memory.dmp upx behavioral1/memory/1920-172-0x0000000000900000-0x00000000019BA000-memory.dmp upx behavioral1/memory/1920-212-0x0000000000900000-0x00000000019BA000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI f76785b.exe File created C:\Windows\f76c8db f7693f6.exe File created C:\Windows\f7678b9 f76785b.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76785b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7693f6.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2224 f76785b.exe 2224 f76785b.exe 1920 f7693f6.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 2224 f76785b.exe Token: SeDebugPrivilege 2224 f76785b.exe Token: SeDebugPrivilege 2224 f76785b.exe Token: SeDebugPrivilege 2224 f76785b.exe Token: SeDebugPrivilege 2224 f76785b.exe Token: SeDebugPrivilege 2224 f76785b.exe Token: SeDebugPrivilege 2224 f76785b.exe Token: SeDebugPrivilege 2224 f76785b.exe Token: SeDebugPrivilege 2224 f76785b.exe Token: SeDebugPrivilege 2224 f76785b.exe Token: SeDebugPrivilege 2224 f76785b.exe Token: SeDebugPrivilege 2224 f76785b.exe Token: SeDebugPrivilege 2224 f76785b.exe Token: SeDebugPrivilege 2224 f76785b.exe Token: SeDebugPrivilege 2224 f76785b.exe Token: SeDebugPrivilege 2224 f76785b.exe Token: SeDebugPrivilege 2224 f76785b.exe Token: SeDebugPrivilege 2224 f76785b.exe Token: SeDebugPrivilege 2224 f76785b.exe Token: SeDebugPrivilege 2224 f76785b.exe Token: SeDebugPrivilege 2224 f76785b.exe Token: SeDebugPrivilege 2224 f76785b.exe Token: SeDebugPrivilege 2224 f76785b.exe Token: SeDebugPrivilege 1920 f7693f6.exe Token: SeDebugPrivilege 1920 f7693f6.exe Token: SeDebugPrivilege 1920 f7693f6.exe Token: SeDebugPrivilege 1920 f7693f6.exe Token: SeDebugPrivilege 1920 f7693f6.exe Token: SeDebugPrivilege 1920 f7693f6.exe Token: SeDebugPrivilege 1920 f7693f6.exe Token: SeDebugPrivilege 1920 f7693f6.exe Token: SeDebugPrivilege 1920 f7693f6.exe Token: SeDebugPrivilege 1920 f7693f6.exe Token: SeDebugPrivilege 1920 f7693f6.exe Token: SeDebugPrivilege 1920 f7693f6.exe Token: SeDebugPrivilege 1920 f7693f6.exe Token: SeDebugPrivilege 1920 f7693f6.exe Token: SeDebugPrivilege 1920 f7693f6.exe Token: SeDebugPrivilege 1920 f7693f6.exe Token: SeDebugPrivilege 1920 f7693f6.exe Token: SeDebugPrivilege 1920 f7693f6.exe Token: SeDebugPrivilege 1920 f7693f6.exe Token: SeDebugPrivilege 1920 f7693f6.exe Token: SeDebugPrivilege 1920 f7693f6.exe Token: SeDebugPrivilege 1920 f7693f6.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2292 2936 rundll32.exe 30 PID 2936 wrote to memory of 2292 2936 rundll32.exe 30 PID 2936 wrote to memory of 2292 2936 rundll32.exe 30 PID 2936 wrote to memory of 2292 2936 rundll32.exe 30 PID 2936 wrote to memory of 2292 2936 rundll32.exe 30 PID 2936 wrote to memory of 2292 2936 rundll32.exe 30 PID 2936 wrote to memory of 2292 2936 rundll32.exe 30 PID 2292 wrote to memory of 2224 2292 rundll32.exe 31 PID 2292 wrote to memory of 2224 2292 rundll32.exe 31 PID 2292 wrote to memory of 2224 2292 rundll32.exe 31 PID 2292 wrote to memory of 2224 2292 rundll32.exe 31 PID 2224 wrote to memory of 1116 2224 f76785b.exe 19 PID 2224 wrote to memory of 1176 2224 f76785b.exe 20 PID 2224 wrote to memory of 1232 2224 f76785b.exe 21 PID 2224 wrote to memory of 1316 2224 f76785b.exe 25 PID 2224 wrote to memory of 2936 2224 f76785b.exe 29 PID 2224 wrote to memory of 2292 2224 f76785b.exe 30 PID 2224 wrote to memory of 2292 2224 f76785b.exe 30 PID 2292 wrote to memory of 2644 2292 rundll32.exe 32 PID 2292 wrote to memory of 2644 2292 rundll32.exe 32 PID 2292 wrote to memory of 2644 2292 rundll32.exe 32 PID 2292 wrote to memory of 2644 2292 rundll32.exe 32 PID 2292 wrote to memory of 1920 2292 rundll32.exe 33 PID 2292 wrote to memory of 1920 2292 rundll32.exe 33 PID 2292 wrote to memory of 1920 2292 rundll32.exe 33 PID 2292 wrote to memory of 1920 2292 rundll32.exe 33 PID 2224 wrote to memory of 1116 2224 f76785b.exe 19 PID 2224 wrote to memory of 1176 2224 f76785b.exe 20 PID 2224 wrote to memory of 1232 2224 f76785b.exe 21 PID 2224 wrote to memory of 1316 2224 f76785b.exe 25 PID 2224 wrote to memory of 2644 2224 f76785b.exe 32 PID 2224 wrote to memory of 2644 2224 f76785b.exe 32 PID 2224 wrote to memory of 1920 2224 f76785b.exe 33 PID 2224 wrote to memory of 1920 2224 f76785b.exe 33 PID 1920 wrote to memory of 1116 1920 f7693f6.exe 19 PID 1920 wrote to memory of 1176 1920 f7693f6.exe 20 PID 1920 wrote to memory of 1232 1920 f7693f6.exe 21 PID 1920 wrote to memory of 1316 1920 f7693f6.exe 25 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76785b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7693f6.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1232
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9f4507cfc67278bdf47e2ba1ec2f0cf445fc63703213fd983b90394acacab142N.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9f4507cfc67278bdf47e2ba1ec2f0cf445fc63703213fd983b90394acacab142N.dll,#13⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\f76785b.exeC:\Users\Admin\AppData\Local\Temp\f76785b.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2224
-
-
C:\Users\Admin\AppData\Local\Temp\f7679f1.exeC:\Users\Admin\AppData\Local\Temp\f7679f1.exe4⤵
- Executes dropped EXE
PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\f7693f6.exeC:\Users\Admin\AppData\Local\Temp\f7693f6.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1920
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1316
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256B
MD5a1ca61e21e41f0f07a433829fc62eae6
SHA19663492d1d59a039988cf6f03ea20b80c9dbc02a
SHA256baba7606c263aabbaede5b4a4df09947f359f0e547597efa5a2cf834ebd76c92
SHA512dd213552375a3d3f45cfdaa6e94d5343084e2026ee9905998e218ee4be3bcab8bcdd70be2bf25e1354dca9389877476b20d1921733df1e856aeabaa8886febfa
-
Filesize
97KB
MD55257e5306ebff3b0005523bb8919b8c7
SHA17a9b634d70ee650d263e49d6dc16a14741f4f794
SHA256e902fdaaf6d5a109e94f50e7b326c8f773e73ab58487fad52c47bb7e324d67a4
SHA512044c812773dcce782ba6d97bede5fa767642ffee0a73918cc02146fdac17307f7c7a6d7a5da5572111e703acce6953effc059a47f0580d9c516f4ab6189bf39c