Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10/12/2024, 22:47 UTC

General

  • Target

    5bea5e192ace7c08563f23198c71a433a5c5da05f002b642ba6bd481a8d6b8fa.dll

  • Size

    120KB

  • MD5

    cfd4ed35d874eab4c394d99234886c10

  • SHA1

    d4eeca9c9ab2d8c8452008cfd8d9b54dedd190c3

  • SHA256

    5bea5e192ace7c08563f23198c71a433a5c5da05f002b642ba6bd481a8d6b8fa

  • SHA512

    0379d613b41b39afdb58b1f88554a92dfe118e8dfd9b975cef27a6b7d09369d9d410bc4cd13dcf675700370ad564e907ff3b33bc5565129ccacdef25aed1b511

  • SSDEEP

    1536:9Zdk5ZW766g5o7VtMz3IIgC/q7xtwoZBEugVbtZieVIEbhk0Biu+Ys:MgWH5kVt8gC/gtwozEvVbtseVp/1+

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Signatures

  • Modifies firewall policy service 3 TTPs 6 IoCs
  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • Sality family
  • UAC bypass 3 TTPs 2 IoCs
  • Windows security bypass 2 TTPs 12 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Windows security modification 2 TTPs 14 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 15 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1060
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1120
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1188
          • C:\Windows\system32\rundll32.exe
            rundll32.exe C:\Users\Admin\AppData\Local\Temp\5bea5e192ace7c08563f23198c71a433a5c5da05f002b642ba6bd481a8d6b8fa.dll,#1
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2828
            • C:\Windows\SysWOW64\rundll32.exe
              rundll32.exe C:\Users\Admin\AppData\Local\Temp\5bea5e192ace7c08563f23198c71a433a5c5da05f002b642ba6bd481a8d6b8fa.dll,#1
              3⤵
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2844
              • C:\Users\Admin\AppData\Local\Temp\f76fec9.exe
                C:\Users\Admin\AppData\Local\Temp\f76fec9.exe
                4⤵
                • Modifies firewall policy service
                • UAC bypass
                • Windows security bypass
                • Executes dropped EXE
                • Windows security modification
                • Checks whether UAC is enabled
                • Enumerates connected drives
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                • System policy modification
                PID:2980
              • C:\Users\Admin\AppData\Local\Temp\f77005e.exe
                C:\Users\Admin\AppData\Local\Temp\f77005e.exe
                4⤵
                • Modifies firewall policy service
                • UAC bypass
                • Windows security bypass
                • Executes dropped EXE
                • Windows security modification
                • Checks whether UAC is enabled
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                • System policy modification
                PID:1928
              • C:\Users\Admin\AppData\Local\Temp\f771ac1.exe
                C:\Users\Admin\AppData\Local\Temp\f771ac1.exe
                4⤵
                • Executes dropped EXE
                PID:2628
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1572

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SYSTEM.INI

            Filesize

            256B

            MD5

            e9452ebf728a817fa6b2b7c8b55b4072

            SHA1

            436caf3d81f487787e358a4ea7acd28176207e24

            SHA256

            c10c3e57384190971fd585b5bfaa2f69a459e0da4e0036b546cff799689e7e86

            SHA512

            0f711cfef02b8a1da872b0cb19dae671476b8afe9454160a631978bdf304f1a5bf8651cdea2687eead400f91c9a3c43d62e343bfe46c3cbb75cf6d5eb830a214

          • \Users\Admin\AppData\Local\Temp\f76fec9.exe

            Filesize

            97KB

            MD5

            d75787a844d8e14a0432e56706416f21

            SHA1

            b3e6a67e7fdda71b8ee912061c396bb63b7aa461

            SHA256

            f3b360d50728a7af92256c3f28691aa50b83f382f59bc7b2446316f375d377be

            SHA512

            72d37d5f75d5ea4c6d8310331e2acb96de3337f912c1dd80b692f5bebfe24eceb6100d9cc4324dabdadd97cda815c345adedbecb6f7a990071dcea7c769899b4

          • memory/1060-29-0x0000000001ED0000-0x0000000001ED2000-memory.dmp

            Filesize

            8KB

          • memory/1928-107-0x0000000000260000-0x0000000000262000-memory.dmp

            Filesize

            8KB

          • memory/1928-129-0x0000000000260000-0x0000000000262000-memory.dmp

            Filesize

            8KB

          • memory/1928-62-0x0000000000400000-0x0000000000412000-memory.dmp

            Filesize

            72KB

          • memory/1928-191-0x0000000000930000-0x00000000019EA000-memory.dmp

            Filesize

            16.7MB

          • memory/1928-192-0x0000000000400000-0x0000000000412000-memory.dmp

            Filesize

            72KB

          • memory/1928-166-0x0000000000930000-0x00000000019EA000-memory.dmp

            Filesize

            16.7MB

          • memory/1928-105-0x0000000000260000-0x0000000000262000-memory.dmp

            Filesize

            8KB

          • memory/1928-99-0x00000000002B0000-0x00000000002B1000-memory.dmp

            Filesize

            4KB

          • memory/2628-108-0x00000000001B0000-0x00000000001B2000-memory.dmp

            Filesize

            8KB

          • memory/2628-106-0x00000000001B0000-0x00000000001B2000-memory.dmp

            Filesize

            8KB

          • memory/2628-85-0x0000000000400000-0x0000000000412000-memory.dmp

            Filesize

            72KB

          • memory/2628-196-0x0000000000400000-0x0000000000412000-memory.dmp

            Filesize

            72KB

          • memory/2628-104-0x0000000000240000-0x0000000000241000-memory.dmp

            Filesize

            4KB

          • memory/2844-2-0x0000000010000000-0x0000000010020000-memory.dmp

            Filesize

            128KB

          • memory/2844-47-0x0000000000200000-0x0000000000201000-memory.dmp

            Filesize

            4KB

          • memory/2844-38-0x0000000000200000-0x0000000000201000-memory.dmp

            Filesize

            4KB

          • memory/2844-37-0x00000000001F0000-0x00000000001F2000-memory.dmp

            Filesize

            8KB

          • memory/2844-4-0x00000000001C0000-0x00000000001D2000-memory.dmp

            Filesize

            72KB

          • memory/2844-83-0x00000000001C0000-0x00000000001C2000-memory.dmp

            Filesize

            8KB

          • memory/2844-197-0x0000000000290000-0x00000000002A2000-memory.dmp

            Filesize

            72KB

          • memory/2844-1-0x0000000010000000-0x0000000010020000-memory.dmp

            Filesize

            128KB

          • memory/2844-61-0x00000000001F0000-0x00000000001F2000-memory.dmp

            Filesize

            8KB

          • memory/2844-60-0x0000000000270000-0x0000000000282000-memory.dmp

            Filesize

            72KB

          • memory/2844-84-0x0000000000290000-0x00000000002A2000-memory.dmp

            Filesize

            72KB

          • memory/2844-58-0x00000000001F0000-0x00000000001F2000-memory.dmp

            Filesize

            8KB

          • memory/2980-51-0x00000000004D0000-0x00000000004D2000-memory.dmp

            Filesize

            8KB

          • memory/2980-67-0x00000000006F0000-0x00000000017AA000-memory.dmp

            Filesize

            16.7MB

          • memory/2980-66-0x00000000006F0000-0x00000000017AA000-memory.dmp

            Filesize

            16.7MB

          • memory/2980-69-0x00000000006F0000-0x00000000017AA000-memory.dmp

            Filesize

            16.7MB

          • memory/2980-70-0x00000000006F0000-0x00000000017AA000-memory.dmp

            Filesize

            16.7MB

          • memory/2980-65-0x00000000006F0000-0x00000000017AA000-memory.dmp

            Filesize

            16.7MB

          • memory/2980-64-0x00000000006F0000-0x00000000017AA000-memory.dmp

            Filesize

            16.7MB

          • memory/2980-63-0x00000000006F0000-0x00000000017AA000-memory.dmp

            Filesize

            16.7MB

          • memory/2980-80-0x00000000004D0000-0x00000000004D2000-memory.dmp

            Filesize

            8KB

          • memory/2980-86-0x00000000006F0000-0x00000000017AA000-memory.dmp

            Filesize

            16.7MB

          • memory/2980-87-0x00000000006F0000-0x00000000017AA000-memory.dmp

            Filesize

            16.7MB

          • memory/2980-91-0x00000000006F0000-0x00000000017AA000-memory.dmp

            Filesize

            16.7MB

          • memory/2980-21-0x00000000006F0000-0x00000000017AA000-memory.dmp

            Filesize

            16.7MB

          • memory/2980-16-0x00000000006F0000-0x00000000017AA000-memory.dmp

            Filesize

            16.7MB

          • memory/2980-20-0x00000000006F0000-0x00000000017AA000-memory.dmp

            Filesize

            16.7MB

          • memory/2980-48-0x0000000000520000-0x0000000000521000-memory.dmp

            Filesize

            4KB

          • memory/2980-23-0x00000000006F0000-0x00000000017AA000-memory.dmp

            Filesize

            16.7MB

          • memory/2980-49-0x00000000004D0000-0x00000000004D2000-memory.dmp

            Filesize

            8KB

          • memory/2980-109-0x00000000006F0000-0x00000000017AA000-memory.dmp

            Filesize

            16.7MB

          • memory/2980-22-0x00000000006F0000-0x00000000017AA000-memory.dmp

            Filesize

            16.7MB

          • memory/2980-158-0x00000000006F0000-0x00000000017AA000-memory.dmp

            Filesize

            16.7MB

          • memory/2980-157-0x0000000000400000-0x0000000000412000-memory.dmp

            Filesize

            72KB

          • memory/2980-18-0x00000000006F0000-0x00000000017AA000-memory.dmp

            Filesize

            16.7MB

          • memory/2980-15-0x00000000006F0000-0x00000000017AA000-memory.dmp

            Filesize

            16.7MB

          • memory/2980-19-0x00000000006F0000-0x00000000017AA000-memory.dmp

            Filesize

            16.7MB

          • memory/2980-17-0x00000000006F0000-0x00000000017AA000-memory.dmp

            Filesize

            16.7MB

          • memory/2980-13-0x00000000006F0000-0x00000000017AA000-memory.dmp

            Filesize

            16.7MB

          • memory/2980-11-0x0000000000400000-0x0000000000412000-memory.dmp

            Filesize

            72KB

          We care about your privacy.

          This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.