Analysis
-
max time kernel
81s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 02:02
Static task
static1
Behavioral task
behavioral1
Sample
e80405ef16edc0ea6db2f3d96e24f8907506f7dec26e7bcfba0e4c31e65587dbN.dll
Resource
win7-20240729-en
General
-
Target
e80405ef16edc0ea6db2f3d96e24f8907506f7dec26e7bcfba0e4c31e65587dbN.dll
-
Size
120KB
-
MD5
1ac1b855056f20a0cb8206dc8616adb0
-
SHA1
f10c28bf84296a5ef3a14f0d957afb0f2a288aca
-
SHA256
e80405ef16edc0ea6db2f3d96e24f8907506f7dec26e7bcfba0e4c31e65587db
-
SHA512
6775c64a29a48d3cc8de11f403d6223c1ae30fd4e3a312cb41f5b4e2c35634fe4a36d0effeed1ea6a35f3d848635e0948b22c368e4b07b9d8460bc33804274c6
-
SSDEEP
3072:xdTlgQ9WqLOAjvHs2wa7eh++nzZudLu1Ip:xdT19LDcUdLue
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76f68f.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76f853.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76f853.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76f853.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76f68f.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76f68f.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76f68f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76f853.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76f68f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76f853.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76f853.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76f853.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76f853.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76f68f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76f68f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76f68f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76f853.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76f68f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76f68f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76f853.exe -
Executes dropped EXE 3 IoCs
pid Process 2680 f76f68f.exe 3024 f76f853.exe 1360 f7718de.exe -
Loads dropped DLL 6 IoCs
pid Process 2200 rundll32.exe 2200 rundll32.exe 2200 rundll32.exe 2200 rundll32.exe 2200 rundll32.exe 2200 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76f68f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76f853.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76f853.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76f68f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76f68f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76f853.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76f68f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76f68f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76f853.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76f853.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76f68f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76f68f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76f853.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76f853.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76f68f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76f853.exe -
Enumerates connected drives 3 TTPs 14 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: f76f68f.exe File opened (read-only) \??\H: f76f68f.exe File opened (read-only) \??\K: f76f68f.exe File opened (read-only) \??\N: f76f68f.exe File opened (read-only) \??\G: f76f68f.exe File opened (read-only) \??\P: f76f68f.exe File opened (read-only) \??\L: f76f68f.exe File opened (read-only) \??\S: f76f68f.exe File opened (read-only) \??\E: f76f68f.exe File opened (read-only) \??\I: f76f68f.exe File opened (read-only) \??\J: f76f68f.exe File opened (read-only) \??\M: f76f68f.exe File opened (read-only) \??\Q: f76f68f.exe File opened (read-only) \??\R: f76f68f.exe -
resource yara_rule behavioral1/memory/2680-21-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2680-17-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2680-25-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2680-23-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2680-22-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2680-20-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2680-19-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2680-26-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2680-18-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2680-24-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2680-64-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2680-65-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2680-66-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2680-67-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2680-68-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2680-70-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2680-71-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2680-72-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2680-73-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2680-88-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2680-90-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2680-152-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/3024-164-0x0000000000910000-0x00000000019CA000-memory.dmp upx behavioral1/memory/3024-188-0x0000000000910000-0x00000000019CA000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\f76f6ec f76f68f.exe File opened for modification C:\Windows\SYSTEM.INI f76f68f.exe File created C:\Windows\f774692 f76f853.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76f68f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76f853.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2680 f76f68f.exe 2680 f76f68f.exe 3024 f76f853.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeDebugPrivilege 2680 f76f68f.exe Token: SeDebugPrivilege 2680 f76f68f.exe Token: SeDebugPrivilege 2680 f76f68f.exe Token: SeDebugPrivilege 2680 f76f68f.exe Token: SeDebugPrivilege 2680 f76f68f.exe Token: SeDebugPrivilege 2680 f76f68f.exe Token: SeDebugPrivilege 2680 f76f68f.exe Token: SeDebugPrivilege 2680 f76f68f.exe Token: SeDebugPrivilege 2680 f76f68f.exe Token: SeDebugPrivilege 2680 f76f68f.exe Token: SeDebugPrivilege 2680 f76f68f.exe Token: SeDebugPrivilege 2680 f76f68f.exe Token: SeDebugPrivilege 2680 f76f68f.exe Token: SeDebugPrivilege 2680 f76f68f.exe Token: SeDebugPrivilege 2680 f76f68f.exe Token: SeDebugPrivilege 2680 f76f68f.exe Token: SeDebugPrivilege 2680 f76f68f.exe Token: SeDebugPrivilege 2680 f76f68f.exe Token: SeDebugPrivilege 2680 f76f68f.exe Token: SeDebugPrivilege 2680 f76f68f.exe Token: SeDebugPrivilege 2680 f76f68f.exe Token: SeDebugPrivilege 2680 f76f68f.exe Token: SeDebugPrivilege 2680 f76f68f.exe Token: SeDebugPrivilege 2680 f76f68f.exe Token: SeDebugPrivilege 3024 f76f853.exe Token: SeDebugPrivilege 3024 f76f853.exe Token: SeDebugPrivilege 3024 f76f853.exe Token: SeDebugPrivilege 3024 f76f853.exe Token: SeDebugPrivilege 3024 f76f853.exe Token: SeDebugPrivilege 3024 f76f853.exe Token: SeDebugPrivilege 3024 f76f853.exe Token: SeDebugPrivilege 3024 f76f853.exe Token: SeDebugPrivilege 3024 f76f853.exe Token: SeDebugPrivilege 3024 f76f853.exe Token: SeDebugPrivilege 3024 f76f853.exe Token: SeDebugPrivilege 3024 f76f853.exe Token: SeDebugPrivilege 3024 f76f853.exe Token: SeDebugPrivilege 3024 f76f853.exe Token: SeDebugPrivilege 3024 f76f853.exe Token: SeDebugPrivilege 3024 f76f853.exe Token: SeDebugPrivilege 3024 f76f853.exe Token: SeDebugPrivilege 3024 f76f853.exe Token: SeDebugPrivilege 3024 f76f853.exe Token: SeDebugPrivilege 3024 f76f853.exe Token: SeDebugPrivilege 3024 f76f853.exe Token: SeDebugPrivilege 3024 f76f853.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2200 2772 rundll32.exe 31 PID 2772 wrote to memory of 2200 2772 rundll32.exe 31 PID 2772 wrote to memory of 2200 2772 rundll32.exe 31 PID 2772 wrote to memory of 2200 2772 rundll32.exe 31 PID 2772 wrote to memory of 2200 2772 rundll32.exe 31 PID 2772 wrote to memory of 2200 2772 rundll32.exe 31 PID 2772 wrote to memory of 2200 2772 rundll32.exe 31 PID 2200 wrote to memory of 2680 2200 rundll32.exe 32 PID 2200 wrote to memory of 2680 2200 rundll32.exe 32 PID 2200 wrote to memory of 2680 2200 rundll32.exe 32 PID 2200 wrote to memory of 2680 2200 rundll32.exe 32 PID 2680 wrote to memory of 1060 2680 f76f68f.exe 18 PID 2680 wrote to memory of 1120 2680 f76f68f.exe 19 PID 2680 wrote to memory of 1180 2680 f76f68f.exe 21 PID 2680 wrote to memory of 1140 2680 f76f68f.exe 23 PID 2680 wrote to memory of 2772 2680 f76f68f.exe 30 PID 2680 wrote to memory of 2200 2680 f76f68f.exe 31 PID 2680 wrote to memory of 2200 2680 f76f68f.exe 31 PID 2200 wrote to memory of 3024 2200 rundll32.exe 33 PID 2200 wrote to memory of 3024 2200 rundll32.exe 33 PID 2200 wrote to memory of 3024 2200 rundll32.exe 33 PID 2200 wrote to memory of 3024 2200 rundll32.exe 33 PID 2200 wrote to memory of 1360 2200 rundll32.exe 34 PID 2200 wrote to memory of 1360 2200 rundll32.exe 34 PID 2200 wrote to memory of 1360 2200 rundll32.exe 34 PID 2200 wrote to memory of 1360 2200 rundll32.exe 34 PID 2680 wrote to memory of 1060 2680 f76f68f.exe 18 PID 2680 wrote to memory of 1120 2680 f76f68f.exe 19 PID 2680 wrote to memory of 1180 2680 f76f68f.exe 21 PID 2680 wrote to memory of 1140 2680 f76f68f.exe 23 PID 2680 wrote to memory of 3024 2680 f76f68f.exe 33 PID 2680 wrote to memory of 3024 2680 f76f68f.exe 33 PID 2680 wrote to memory of 1360 2680 f76f68f.exe 34 PID 2680 wrote to memory of 1360 2680 f76f68f.exe 34 PID 3024 wrote to memory of 1060 3024 f76f853.exe 18 PID 3024 wrote to memory of 1120 3024 f76f853.exe 19 PID 3024 wrote to memory of 1180 3024 f76f853.exe 21 PID 3024 wrote to memory of 1140 3024 f76f853.exe 23 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76f68f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76f853.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1060
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1120
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1180
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e80405ef16edc0ea6db2f3d96e24f8907506f7dec26e7bcfba0e4c31e65587dbN.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e80405ef16edc0ea6db2f3d96e24f8907506f7dec26e7bcfba0e4c31e65587dbN.dll,#13⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\f76f68f.exeC:\Users\Admin\AppData\Local\Temp\f76f68f.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\f76f853.exeC:\Users\Admin\AppData\Local\Temp\f76f853.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3024
-
-
C:\Users\Admin\AppData\Local\Temp\f7718de.exeC:\Users\Admin\AppData\Local\Temp\f7718de.exe4⤵
- Executes dropped EXE
PID:1360
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1140
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD5620380cc0b361fe7c1494ec62b09f125
SHA1e5d9e63be4be011d6ce4f6ef0c847d45ec9bcd03
SHA256f96a0d9eb399d19cb7cd27907c605a2d360671779b33fb03424646a0bdf24926
SHA512cd45cd85e58d1fbb070cc89c7f092a8ac311406468521226939145305434222bc124e9bae8e172efaf1dbad955531b1e2c3c02b17b77c3dc0758e9f652dee3a2
-
Filesize
97KB
MD5af5c81b2983292935dc85074102841aa
SHA194a87a31f241b33c886ed16678fcbe3976010e93
SHA2566bdaa9e423fcf163398fc22b9c933772dba833979ae8462b409b2e274be26dca
SHA512f109e1dc38696fac710a9065db75cdcaff338c6330b1fe04df85ea3176aa6812e8a658701fd8141183231fc8b9efcb42c444c8dc2af823ae63c2751abb4ead7b