Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 04:31
Static task
static1
Behavioral task
behavioral1
Sample
7df2f15c74913a715f788512528faa53f5ae4214aa70f68198d407f172e7c0d5.dll
Resource
win7-20240903-en
General
-
Target
7df2f15c74913a715f788512528faa53f5ae4214aa70f68198d407f172e7c0d5.dll
-
Size
120KB
-
MD5
88622bd3eff75a907b5c9cc4f71cfa08
-
SHA1
7bbc9f785560b28a9e00bc8a97fab2af8452fee5
-
SHA256
7df2f15c74913a715f788512528faa53f5ae4214aa70f68198d407f172e7c0d5
-
SHA512
f25daeab790751b5ddf6707b3194b6fd652dd544ed5cb71815a832403305426c4ceee7bc43f25a9a8b18cbd131f4f6449eb9cc3b71a9ae6113b38bda3efaa974
-
SSDEEP
1536:o29KEEppnoQGJ4SAbIRch6CFuArYcCDXBpIF/LOugRtOwAyG+52hyr/lJ1KM9:MEEjoNJ44ch6gueCDXDugRbvYhyBJ1H9
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76ae49.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76ae49.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76ca32.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76ca32.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76ca32.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76ae49.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76ae49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76ca32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76ae49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76ae49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76ca32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76ca32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76ca32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76ca32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76ca32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76ae49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76ae49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76ae49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76ae49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76ca32.exe -
Executes dropped EXE 3 IoCs
pid Process 3028 f76ae49.exe 2276 f76afee.exe 2612 f76ca32.exe -
Loads dropped DLL 6 IoCs
pid Process 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76ae49.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76ca32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76ae49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76ae49.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76ae49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76ca32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76ca32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76ae49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76ca32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76ae49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76ae49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76ca32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76ca32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76ca32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76ae49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76ca32.exe -
Enumerates connected drives 3 TTPs 17 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: f76ae49.exe File opened (read-only) \??\M: f76ae49.exe File opened (read-only) \??\S: f76ae49.exe File opened (read-only) \??\E: f76ca32.exe File opened (read-only) \??\G: f76ae49.exe File opened (read-only) \??\H: f76ae49.exe File opened (read-only) \??\I: f76ae49.exe File opened (read-only) \??\N: f76ae49.exe File opened (read-only) \??\O: f76ae49.exe File opened (read-only) \??\Q: f76ae49.exe File opened (read-only) \??\E: f76ae49.exe File opened (read-only) \??\J: f76ae49.exe File opened (read-only) \??\K: f76ae49.exe File opened (read-only) \??\P: f76ae49.exe File opened (read-only) \??\T: f76ae49.exe File opened (read-only) \??\G: f76ca32.exe File opened (read-only) \??\R: f76ae49.exe -
resource yara_rule behavioral1/memory/3028-18-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3028-21-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3028-14-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3028-16-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3028-19-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3028-17-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3028-23-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3028-24-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3028-22-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3028-20-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3028-64-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3028-65-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3028-66-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3028-68-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3028-67-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3028-70-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3028-71-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3028-86-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3028-89-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3028-91-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3028-110-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3028-154-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2612-180-0x00000000009B0000-0x0000000001A6A000-memory.dmp upx behavioral1/memory/2612-207-0x00000000009B0000-0x0000000001A6A000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI f76ae49.exe File created C:\Windows\f76feb9 f76ca32.exe File created C:\Windows\f76aea7 f76ae49.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76ae49.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76ca32.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3028 f76ae49.exe 3028 f76ae49.exe 2612 f76ca32.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeDebugPrivilege 3028 f76ae49.exe Token: SeDebugPrivilege 3028 f76ae49.exe Token: SeDebugPrivilege 3028 f76ae49.exe Token: SeDebugPrivilege 3028 f76ae49.exe Token: SeDebugPrivilege 3028 f76ae49.exe Token: SeDebugPrivilege 3028 f76ae49.exe Token: SeDebugPrivilege 3028 f76ae49.exe Token: SeDebugPrivilege 3028 f76ae49.exe Token: SeDebugPrivilege 3028 f76ae49.exe Token: SeDebugPrivilege 3028 f76ae49.exe Token: SeDebugPrivilege 3028 f76ae49.exe Token: SeDebugPrivilege 3028 f76ae49.exe Token: SeDebugPrivilege 3028 f76ae49.exe Token: SeDebugPrivilege 3028 f76ae49.exe Token: SeDebugPrivilege 3028 f76ae49.exe Token: SeDebugPrivilege 3028 f76ae49.exe Token: SeDebugPrivilege 3028 f76ae49.exe Token: SeDebugPrivilege 3028 f76ae49.exe Token: SeDebugPrivilege 3028 f76ae49.exe Token: SeDebugPrivilege 3028 f76ae49.exe Token: SeDebugPrivilege 3028 f76ae49.exe Token: SeDebugPrivilege 3028 f76ae49.exe Token: SeDebugPrivilege 3028 f76ae49.exe Token: SeDebugPrivilege 3028 f76ae49.exe Token: SeDebugPrivilege 2612 f76ca32.exe Token: SeDebugPrivilege 2612 f76ca32.exe Token: SeDebugPrivilege 2612 f76ca32.exe Token: SeDebugPrivilege 2612 f76ca32.exe Token: SeDebugPrivilege 2612 f76ca32.exe Token: SeDebugPrivilege 2612 f76ca32.exe Token: SeDebugPrivilege 2612 f76ca32.exe Token: SeDebugPrivilege 2612 f76ca32.exe Token: SeDebugPrivilege 2612 f76ca32.exe Token: SeDebugPrivilege 2612 f76ca32.exe Token: SeDebugPrivilege 2612 f76ca32.exe Token: SeDebugPrivilege 2612 f76ca32.exe Token: SeDebugPrivilege 2612 f76ca32.exe Token: SeDebugPrivilege 2612 f76ca32.exe Token: SeDebugPrivilege 2612 f76ca32.exe Token: SeDebugPrivilege 2612 f76ca32.exe Token: SeDebugPrivilege 2612 f76ca32.exe Token: SeDebugPrivilege 2612 f76ca32.exe Token: SeDebugPrivilege 2612 f76ca32.exe Token: SeDebugPrivilege 2612 f76ca32.exe Token: SeDebugPrivilege 2612 f76ca32.exe Token: SeDebugPrivilege 2612 f76ca32.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2072 2384 rundll32.exe 30 PID 2384 wrote to memory of 2072 2384 rundll32.exe 30 PID 2384 wrote to memory of 2072 2384 rundll32.exe 30 PID 2384 wrote to memory of 2072 2384 rundll32.exe 30 PID 2384 wrote to memory of 2072 2384 rundll32.exe 30 PID 2384 wrote to memory of 2072 2384 rundll32.exe 30 PID 2384 wrote to memory of 2072 2384 rundll32.exe 30 PID 2072 wrote to memory of 3028 2072 rundll32.exe 31 PID 2072 wrote to memory of 3028 2072 rundll32.exe 31 PID 2072 wrote to memory of 3028 2072 rundll32.exe 31 PID 2072 wrote to memory of 3028 2072 rundll32.exe 31 PID 3028 wrote to memory of 1104 3028 f76ae49.exe 19 PID 3028 wrote to memory of 1160 3028 f76ae49.exe 20 PID 3028 wrote to memory of 1192 3028 f76ae49.exe 21 PID 3028 wrote to memory of 1388 3028 f76ae49.exe 23 PID 3028 wrote to memory of 2384 3028 f76ae49.exe 29 PID 3028 wrote to memory of 2072 3028 f76ae49.exe 30 PID 3028 wrote to memory of 2072 3028 f76ae49.exe 30 PID 2072 wrote to memory of 2276 2072 rundll32.exe 32 PID 2072 wrote to memory of 2276 2072 rundll32.exe 32 PID 2072 wrote to memory of 2276 2072 rundll32.exe 32 PID 2072 wrote to memory of 2276 2072 rundll32.exe 32 PID 2072 wrote to memory of 2612 2072 rundll32.exe 33 PID 2072 wrote to memory of 2612 2072 rundll32.exe 33 PID 2072 wrote to memory of 2612 2072 rundll32.exe 33 PID 2072 wrote to memory of 2612 2072 rundll32.exe 33 PID 3028 wrote to memory of 1104 3028 f76ae49.exe 19 PID 3028 wrote to memory of 1160 3028 f76ae49.exe 20 PID 3028 wrote to memory of 1192 3028 f76ae49.exe 21 PID 3028 wrote to memory of 1388 3028 f76ae49.exe 23 PID 3028 wrote to memory of 2276 3028 f76ae49.exe 32 PID 3028 wrote to memory of 2276 3028 f76ae49.exe 32 PID 3028 wrote to memory of 2612 3028 f76ae49.exe 33 PID 3028 wrote to memory of 2612 3028 f76ae49.exe 33 PID 2612 wrote to memory of 1104 2612 f76ca32.exe 19 PID 2612 wrote to memory of 1160 2612 f76ca32.exe 20 PID 2612 wrote to memory of 1192 2612 f76ca32.exe 21 PID 2612 wrote to memory of 1388 2612 f76ca32.exe 23 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76ca32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76ae49.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1104
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1160
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7df2f15c74913a715f788512528faa53f5ae4214aa70f68198d407f172e7c0d5.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7df2f15c74913a715f788512528faa53f5ae4214aa70f68198d407f172e7c0d5.dll,#13⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\f76ae49.exeC:\Users\Admin\AppData\Local\Temp\f76ae49.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3028
-
-
C:\Users\Admin\AppData\Local\Temp\f76afee.exeC:\Users\Admin\AppData\Local\Temp\f76afee.exe4⤵
- Executes dropped EXE
PID:2276
-
-
C:\Users\Admin\AppData\Local\Temp\f76ca32.exeC:\Users\Admin\AppData\Local\Temp\f76ca32.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2612
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1388
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD5fbda1b3396088c40825aaf1f737ba02e
SHA15a5249ad43d595b242a2583f1163657ea368da06
SHA256c71bb069c534feceb4e34518fb75f6084b19330b0de4b0263b824a6608da2a8a
SHA5121b13effe163940013fad79773b0bfe3085ffd510dcf3547c145e2ee93d21aa6f5e8739ca49feeaab6b0ac8fdb8dd151bfb9e381f2ac50a4f6d637801ffebee4c
-
Filesize
97KB
MD5114fedd38f155f4dd7945a3ccd41c626
SHA1b12d10f4097d27c133b7813fbcf70817d766dc41
SHA25657f6409839dd14d69ce5fe961d35cded8190016f5e373b2ff159004497d7931c
SHA51218bc440e40eda81582b3ea88a13a5160b722444b0ce6228eba94aaf58b950b23d3463896d556d9d90c506108e5c77444a82a76ed911b690e1419e2abdbe773e0