Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/12/2024, 16:08
Static task
static1
Behavioral task
behavioral1
Sample
ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/ProcDll.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/ProcDll.dll
Resource
win10v2004-20241007-en
General
-
Target
ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe
-
Size
1.0MB
-
MD5
14c057aa28de8f08e9ff1498351f6d90
-
SHA1
ebe3b736756ca6b81752459f02cce257e3381263
-
SHA256
ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707
-
SHA512
070b87e18df1a594c05c65e15fb3c92a99952438635df3c47c871ec2b6366e9488bf5a86e40a530321446a35edc3e85d6fcea71f751ae70797cf4a286b47706a
-
SSDEEP
12288:MYEWcMwLfzH5BUdtsKR0yCKM8CxF7h5NGyENSrzXVoGsqACwUeCCbSzVczdDsgcx:MYUk3X5N2FXNGCrZEqACXeCXcdve1D
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" Au_.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" Au_.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Au_.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" Au_.exe -
Deletes itself 1 IoCs
pid Process 2516 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 2516 Au_.exe -
Loads dropped DLL 6 IoCs
pid Process 1724 ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe 2516 Au_.exe 2516 Au_.exe 2516 Au_.exe 2516 Au_.exe 2516 Au_.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc Au_.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Au_.exe -
Enumerates connected drives 3 TTPs 14 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: Au_.exe File opened (read-only) \??\P: Au_.exe File opened (read-only) \??\R: Au_.exe File opened (read-only) \??\K: Au_.exe File opened (read-only) \??\O: Au_.exe File opened (read-only) \??\N: Au_.exe File opened (read-only) \??\Q: Au_.exe File opened (read-only) \??\L: Au_.exe File opened (read-only) \??\G: Au_.exe File opened (read-only) \??\H: Au_.exe File opened (read-only) \??\I: Au_.exe File opened (read-only) \??\J: Au_.exe File opened (read-only) \??\S: Au_.exe File opened (read-only) \??\E: Au_.exe -
resource yara_rule behavioral1/memory/2516-30-0x0000000002450000-0x00000000034DE000-memory.dmp upx behavioral1/memory/2516-27-0x0000000002450000-0x00000000034DE000-memory.dmp upx behavioral1/memory/2516-53-0x0000000002450000-0x00000000034DE000-memory.dmp upx behavioral1/memory/2516-25-0x0000000002450000-0x00000000034DE000-memory.dmp upx behavioral1/memory/2516-28-0x0000000002450000-0x00000000034DE000-memory.dmp upx behavioral1/memory/2516-26-0x0000000002450000-0x00000000034DE000-memory.dmp upx behavioral1/memory/2516-24-0x0000000002450000-0x00000000034DE000-memory.dmp upx behavioral1/memory/2516-23-0x0000000002450000-0x00000000034DE000-memory.dmp upx behavioral1/memory/2516-29-0x0000000002450000-0x00000000034DE000-memory.dmp upx behavioral1/memory/2516-55-0x0000000002450000-0x00000000034DE000-memory.dmp upx behavioral1/memory/2516-21-0x0000000002450000-0x00000000034DE000-memory.dmp upx behavioral1/memory/1724-17-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral1/memory/1724-2-0x0000000002600000-0x000000000368E000-memory.dmp upx behavioral1/memory/2516-56-0x0000000002450000-0x00000000034DE000-memory.dmp upx behavioral1/memory/2516-57-0x0000000002450000-0x00000000034DE000-memory.dmp upx behavioral1/memory/2516-58-0x0000000002450000-0x00000000034DE000-memory.dmp upx behavioral1/memory/2516-59-0x0000000002450000-0x00000000034DE000-memory.dmp upx behavioral1/memory/2516-61-0x0000000002450000-0x00000000034DE000-memory.dmp upx behavioral1/memory/2516-62-0x0000000002450000-0x00000000034DE000-memory.dmp upx behavioral1/memory/2516-63-0x0000000002450000-0x00000000034DE000-memory.dmp upx behavioral1/memory/2516-65-0x0000000002450000-0x00000000034DE000-memory.dmp upx behavioral1/memory/2516-69-0x0000000002450000-0x00000000034DE000-memory.dmp upx behavioral1/memory/2516-70-0x0000000002450000-0x00000000034DE000-memory.dmp upx behavioral1/memory/2516-87-0x0000000002450000-0x00000000034DE000-memory.dmp upx behavioral1/memory/2516-89-0x0000000002450000-0x00000000034DE000-memory.dmp upx behavioral1/memory/2516-101-0x0000000002450000-0x00000000034DE000-memory.dmp upx behavioral1/memory/2516-104-0x0000000002450000-0x00000000034DE000-memory.dmp upx behavioral1/memory/2516-103-0x0000000002450000-0x00000000034DE000-memory.dmp upx behavioral1/memory/2516-140-0x0000000002450000-0x00000000034DE000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2516 Au_.exe 2516 Au_.exe 2516 Au_.exe 2516 Au_.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 2516 Au_.exe Token: SeDebugPrivilege 2516 Au_.exe Token: SeDebugPrivilege 2516 Au_.exe Token: SeDebugPrivilege 2516 Au_.exe Token: SeDebugPrivilege 2516 Au_.exe Token: SeDebugPrivilege 2516 Au_.exe Token: SeDebugPrivilege 2516 Au_.exe Token: SeDebugPrivilege 2516 Au_.exe Token: SeDebugPrivilege 2516 Au_.exe Token: SeDebugPrivilege 2516 Au_.exe Token: SeDebugPrivilege 2516 Au_.exe Token: SeDebugPrivilege 2516 Au_.exe Token: SeDebugPrivilege 2516 Au_.exe Token: SeDebugPrivilege 2516 Au_.exe Token: SeDebugPrivilege 2516 Au_.exe Token: SeDebugPrivilege 2516 Au_.exe Token: SeDebugPrivilege 2516 Au_.exe Token: SeDebugPrivilege 2516 Au_.exe Token: SeDebugPrivilege 2516 Au_.exe Token: SeDebugPrivilege 2516 Au_.exe Token: SeDebugPrivilege 2516 Au_.exe Token: SeDebugPrivilege 2516 Au_.exe Token: SeDebugPrivilege 2516 Au_.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2516 1724 ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe 30 PID 1724 wrote to memory of 2516 1724 ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe 30 PID 1724 wrote to memory of 2516 1724 ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe 30 PID 1724 wrote to memory of 2516 1724 ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe 30 PID 1724 wrote to memory of 2516 1724 ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe 30 PID 1724 wrote to memory of 2516 1724 ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe 30 PID 1724 wrote to memory of 2516 1724 ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe 30 PID 2516 wrote to memory of 1088 2516 Au_.exe 19 PID 2516 wrote to memory of 1168 2516 Au_.exe 20 PID 2516 wrote to memory of 1212 2516 Au_.exe 21 PID 2516 wrote to memory of 1444 2516 Au_.exe 25 PID 2516 wrote to memory of 1088 2516 Au_.exe 19 PID 2516 wrote to memory of 1168 2516 Au_.exe 20 PID 2516 wrote to memory of 1212 2516 Au_.exe 21 PID 2516 wrote to memory of 1444 2516 Au_.exe 25 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Au_.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1088
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe"C:\Users\Admin\AppData\Local\Temp\ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\3⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2516
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1444
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
994KB
MD54e56691e6a461094f27547a3d8d322a3
SHA136e595fa2d7dfe01ec8fc1b3c21654c067b48264
SHA2560b50a7c90a09552566d63926c57904b1c89e6c3a1ab583e5c16e8d1922ca44f0
SHA51288cd05445a186d591b61210b9afb59e21d50ccac415ce297c353fb3c79bff921ca9827769e4b60ba2ad83316f1f2f0925d0e1f994862bb853461800a5c306f2d
-
Filesize
1.5MB
MD50d360c149b2c6649637985ee8b0a90a8
SHA12b86f26310127645bc0c758ddf1fd0f42465b053
SHA2569088ac40d822a32efaf756d4d866faa72e69070d691907adfb0dfe916ccdb05f
SHA51296342c15738fc766ce7ea65b5c4a18829d68cc65f1ce931733820d9c9bda4e8bf570f90e26726b063eeddfc40bf454c6ae7751936c5d085cbc03d7f6989f7091
-
Filesize
5KB
MD5cae8cbe148469accf1ccf9692316e8f9
SHA164e9308e6b541ad99c6fe4dc90829c7e17794ea4
SHA2568a27ff148592c3bdd33e5e9e87b9b05f54a1c136d002746696aeb9e9bd426395
SHA51272f1c7ec5f272d51c3f712c3b03eead35c3c0540adc5cd1f27004fb659f384720aa841f32fb76ada506398be767c3851633c95755af9af3d6b8980d74cee1023
-
Filesize
1.0MB
MD514c057aa28de8f08e9ff1498351f6d90
SHA1ebe3b736756ca6b81752459f02cce257e3381263
SHA256ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707
SHA512070b87e18df1a594c05c65e15fb3c92a99952438635df3c47c871ec2b6366e9488bf5a86e40a530321446a35edc3e85d6fcea71f751ae70797cf4a286b47706a