Analysis
-
max time kernel
30s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 03:25
Static task
static1
Behavioral task
behavioral1
Sample
fa4831a044629ddae349896b5cc6b2dc47015b76cd09c88b9029b188dd13f915.dll
Resource
win7-20240903-en
General
-
Target
fa4831a044629ddae349896b5cc6b2dc47015b76cd09c88b9029b188dd13f915.dll
-
Size
120KB
-
MD5
ea5dfd10ef14c8c2e7c8489d4f4a6edd
-
SHA1
dac3c6a3b77b095034db3630bc0f6b9169d61d3a
-
SHA256
fa4831a044629ddae349896b5cc6b2dc47015b76cd09c88b9029b188dd13f915
-
SHA512
03333e3bf9f55b8e10a1b5cf0d21dd19f3bfa3f5971c1465f48b667f22f45434b782c0f051ee9eb981855d1d853d6296d8d1fac9d6019a2392a5bd3c57bdf030
-
SSDEEP
1536:Vbv5J+HgKH142iN+dMwx5WD38btu41kGa79xb4z/m5rZjyBkSnX/3Bx0lG:V7/7KH142i7CIbot9g9xb4ql2uSP3Bd
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76eadc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76eadc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76eadc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76c581.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76c581.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76c581.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76c581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76eadc.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76c581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76eadc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76eadc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76eadc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76c581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76c581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76c581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76c581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76eadc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76eadc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76eadc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76c581.exe -
Executes dropped EXE 3 IoCs
pid Process 3008 f76c581.exe 2944 f76c948.exe 3044 f76eadc.exe -
Loads dropped DLL 6 IoCs
pid Process 2984 rundll32.exe 2984 rundll32.exe 2984 rundll32.exe 2984 rundll32.exe 2984 rundll32.exe 2984 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76c581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76c581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76eadc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76eadc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76c581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76c581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76eadc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76c581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76c581.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76c581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76eadc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76eadc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76eadc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76eadc.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76c581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76eadc.exe -
Enumerates connected drives 3 TTPs 15 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: f76eadc.exe File opened (read-only) \??\I: f76eadc.exe File opened (read-only) \??\K: f76c581.exe File opened (read-only) \??\M: f76c581.exe File opened (read-only) \??\N: f76c581.exe File opened (read-only) \??\O: f76c581.exe File opened (read-only) \??\E: f76eadc.exe File opened (read-only) \??\E: f76c581.exe File opened (read-only) \??\H: f76c581.exe File opened (read-only) \??\I: f76c581.exe File opened (read-only) \??\J: f76c581.exe File opened (read-only) \??\L: f76c581.exe File opened (read-only) \??\G: f76c581.exe File opened (read-only) \??\P: f76c581.exe File opened (read-only) \??\G: f76eadc.exe -
resource yara_rule behavioral1/memory/3008-17-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/3008-19-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/3008-14-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/3008-16-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/3008-15-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/3008-23-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/3008-22-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/3008-21-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/3008-20-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/3008-18-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/3008-62-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/3008-63-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/3008-64-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/3008-65-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/3008-67-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/3008-70-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/3008-87-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/3008-107-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/3008-108-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/3008-111-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/3008-153-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/3044-172-0x0000000000A00000-0x0000000001ABA000-memory.dmp upx behavioral1/memory/3044-214-0x0000000000A00000-0x0000000001ABA000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\f76c5fd f76c581.exe File opened for modification C:\Windows\SYSTEM.INI f76c581.exe File created C:\Windows\f771890 f76eadc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76c581.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76eadc.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3008 f76c581.exe 3008 f76c581.exe 3044 f76eadc.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeDebugPrivilege 3008 f76c581.exe Token: SeDebugPrivilege 3008 f76c581.exe Token: SeDebugPrivilege 3008 f76c581.exe Token: SeDebugPrivilege 3008 f76c581.exe Token: SeDebugPrivilege 3008 f76c581.exe Token: SeDebugPrivilege 3008 f76c581.exe Token: SeDebugPrivilege 3008 f76c581.exe Token: SeDebugPrivilege 3008 f76c581.exe Token: SeDebugPrivilege 3008 f76c581.exe Token: SeDebugPrivilege 3008 f76c581.exe Token: SeDebugPrivilege 3008 f76c581.exe Token: SeDebugPrivilege 3008 f76c581.exe Token: SeDebugPrivilege 3008 f76c581.exe Token: SeDebugPrivilege 3008 f76c581.exe Token: SeDebugPrivilege 3008 f76c581.exe Token: SeDebugPrivilege 3008 f76c581.exe Token: SeDebugPrivilege 3008 f76c581.exe Token: SeDebugPrivilege 3008 f76c581.exe Token: SeDebugPrivilege 3008 f76c581.exe Token: SeDebugPrivilege 3008 f76c581.exe Token: SeDebugPrivilege 3008 f76c581.exe Token: SeDebugPrivilege 3008 f76c581.exe Token: SeDebugPrivilege 3008 f76c581.exe Token: SeDebugPrivilege 3008 f76c581.exe Token: SeDebugPrivilege 3044 f76eadc.exe Token: SeDebugPrivilege 3044 f76eadc.exe Token: SeDebugPrivilege 3044 f76eadc.exe Token: SeDebugPrivilege 3044 f76eadc.exe Token: SeDebugPrivilege 3044 f76eadc.exe Token: SeDebugPrivilege 3044 f76eadc.exe Token: SeDebugPrivilege 3044 f76eadc.exe Token: SeDebugPrivilege 3044 f76eadc.exe Token: SeDebugPrivilege 3044 f76eadc.exe Token: SeDebugPrivilege 3044 f76eadc.exe Token: SeDebugPrivilege 3044 f76eadc.exe Token: SeDebugPrivilege 3044 f76eadc.exe Token: SeDebugPrivilege 3044 f76eadc.exe Token: SeDebugPrivilege 3044 f76eadc.exe Token: SeDebugPrivilege 3044 f76eadc.exe Token: SeDebugPrivilege 3044 f76eadc.exe Token: SeDebugPrivilege 3044 f76eadc.exe Token: SeDebugPrivilege 3044 f76eadc.exe Token: SeDebugPrivilege 3044 f76eadc.exe Token: SeDebugPrivilege 3044 f76eadc.exe Token: SeDebugPrivilege 3044 f76eadc.exe Token: SeDebugPrivilege 3044 f76eadc.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1480 wrote to memory of 2984 1480 rundll32.exe 30 PID 1480 wrote to memory of 2984 1480 rundll32.exe 30 PID 1480 wrote to memory of 2984 1480 rundll32.exe 30 PID 1480 wrote to memory of 2984 1480 rundll32.exe 30 PID 1480 wrote to memory of 2984 1480 rundll32.exe 30 PID 1480 wrote to memory of 2984 1480 rundll32.exe 30 PID 1480 wrote to memory of 2984 1480 rundll32.exe 30 PID 2984 wrote to memory of 3008 2984 rundll32.exe 31 PID 2984 wrote to memory of 3008 2984 rundll32.exe 31 PID 2984 wrote to memory of 3008 2984 rundll32.exe 31 PID 2984 wrote to memory of 3008 2984 rundll32.exe 31 PID 3008 wrote to memory of 1100 3008 f76c581.exe 19 PID 3008 wrote to memory of 1160 3008 f76c581.exe 20 PID 3008 wrote to memory of 1248 3008 f76c581.exe 21 PID 3008 wrote to memory of 800 3008 f76c581.exe 25 PID 3008 wrote to memory of 1480 3008 f76c581.exe 29 PID 3008 wrote to memory of 2984 3008 f76c581.exe 30 PID 3008 wrote to memory of 2984 3008 f76c581.exe 30 PID 2984 wrote to memory of 2944 2984 rundll32.exe 32 PID 2984 wrote to memory of 2944 2984 rundll32.exe 32 PID 2984 wrote to memory of 2944 2984 rundll32.exe 32 PID 2984 wrote to memory of 2944 2984 rundll32.exe 32 PID 2984 wrote to memory of 3044 2984 rundll32.exe 34 PID 2984 wrote to memory of 3044 2984 rundll32.exe 34 PID 2984 wrote to memory of 3044 2984 rundll32.exe 34 PID 2984 wrote to memory of 3044 2984 rundll32.exe 34 PID 3008 wrote to memory of 1100 3008 f76c581.exe 19 PID 3008 wrote to memory of 1160 3008 f76c581.exe 20 PID 3008 wrote to memory of 1248 3008 f76c581.exe 21 PID 3008 wrote to memory of 800 3008 f76c581.exe 25 PID 3008 wrote to memory of 2944 3008 f76c581.exe 32 PID 3008 wrote to memory of 2944 3008 f76c581.exe 32 PID 3008 wrote to memory of 3044 3008 f76c581.exe 34 PID 3008 wrote to memory of 3044 3008 f76c581.exe 34 PID 3044 wrote to memory of 1100 3044 f76eadc.exe 19 PID 3044 wrote to memory of 1160 3044 f76eadc.exe 20 PID 3044 wrote to memory of 1248 3044 f76eadc.exe 21 PID 3044 wrote to memory of 800 3044 f76eadc.exe 25 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76c581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76eadc.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1100
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1160
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1248
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fa4831a044629ddae349896b5cc6b2dc47015b76cd09c88b9029b188dd13f915.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fa4831a044629ddae349896b5cc6b2dc47015b76cd09c88b9029b188dd13f915.dll,#13⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\f76c581.exeC:\Users\Admin\AppData\Local\Temp\f76c581.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3008
-
-
C:\Users\Admin\AppData\Local\Temp\f76c948.exeC:\Users\Admin\AppData\Local\Temp\f76c948.exe4⤵
- Executes dropped EXE
PID:2944
-
-
C:\Users\Admin\AppData\Local\Temp\f76eadc.exeC:\Users\Admin\AppData\Local\Temp\f76eadc.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3044
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:800
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD58d971b279115679dddda6f73c30c60e5
SHA1b24a080e663090971d720231068a5edf6cf8a079
SHA25694e891d3fe8f600c02ccfed6e66643eda5e3fe6e1180536711984ae51dd2f547
SHA51269c5415e7e2d368571e9524caab907dbba3ce22b8b58a4433e8dc87c2027e151a86cc5b51144e68d723907666603b408069af88e6a24ee01d311f693c3d714a3
-
Filesize
97KB
MD5c7d941c6e0e888e64bb3ed30dd61782b
SHA13ab1460dc288539d70d55304933b1f96ec88e4ad
SHA25698eea928e83630c832cb13e989a4897739ff97829a4a1b7a50b42f9dacb0c5b7
SHA512e7669401c7c695344ef4ffcee84ae633d66f0b22159b5e80f319c26d316404d7e1c8be494f083eb46fa11a3ca836391b4288a925cd4c3f613fd12ddafb01c6e7