Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 20:05
Static task
static1
Behavioral task
behavioral1
Sample
b89a9551dc6944e70b3b664547affc18b85fbe07904697644f03f5964c4ac43aN.dll
Resource
win7-20240903-en
General
-
Target
b89a9551dc6944e70b3b664547affc18b85fbe07904697644f03f5964c4ac43aN.dll
-
Size
120KB
-
MD5
cb9bae02f2a20ed4374ee655a8e42450
-
SHA1
aed5bb140b6a8e775c154ec34e29dcd02674c359
-
SHA256
b89a9551dc6944e70b3b664547affc18b85fbe07904697644f03f5964c4ac43a
-
SHA512
eb40ff42c28efdcbfa5a85aff00223062cad97a036e10aaedaa310b4723cdcf168fd71c0029125820b24ed90a8aced6b20d59d07a1dd753e0c549f561ba893b6
-
SSDEEP
3072:67q6xc4VN+GjlLjl6jFb9uLZFyGJwhQCMZs6p02FWrSHRJju:6Lx9IGjlLYjmHyG5CMZjFT7S
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76afcf.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76afcf.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76b1b3.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76b1b3.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76b1b3.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76afcf.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76afcf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76b1b3.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76afcf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76afcf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76afcf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76b1b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76b1b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76b1b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76afcf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76afcf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76b1b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76b1b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76b1b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76afcf.exe -
Executes dropped EXE 3 IoCs
pid Process 1136 f76afcf.exe 2772 f76b1b3.exe 2684 f76cb5a.exe -
Loads dropped DLL 6 IoCs
pid Process 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76afcf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76afcf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76afcf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76b1b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76b1b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76b1b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76b1b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76b1b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76afcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76afcf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76b1b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76afcf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76afcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76b1b3.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76afcf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76b1b3.exe -
Enumerates connected drives 3 TTPs 15 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: f76afcf.exe File opened (read-only) \??\P: f76afcf.exe File opened (read-only) \??\S: f76afcf.exe File opened (read-only) \??\T: f76afcf.exe File opened (read-only) \??\I: f76afcf.exe File opened (read-only) \??\J: f76afcf.exe File opened (read-only) \??\Q: f76afcf.exe File opened (read-only) \??\R: f76afcf.exe File opened (read-only) \??\G: f76afcf.exe File opened (read-only) \??\L: f76afcf.exe File opened (read-only) \??\N: f76afcf.exe File opened (read-only) \??\E: f76afcf.exe File opened (read-only) \??\K: f76afcf.exe File opened (read-only) \??\M: f76afcf.exe File opened (read-only) \??\O: f76afcf.exe -
resource yara_rule behavioral1/memory/1136-19-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/1136-22-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/1136-23-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/1136-17-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/1136-26-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/1136-25-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/1136-24-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/1136-21-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/1136-20-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/1136-18-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/1136-63-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/1136-64-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/1136-66-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/1136-67-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/1136-68-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/1136-70-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/1136-71-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/1136-87-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/1136-86-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/1136-91-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/1136-92-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/1136-110-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/1136-113-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/1136-153-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2772-160-0x0000000000920000-0x00000000019DA000-memory.dmp upx behavioral1/memory/2772-191-0x0000000000920000-0x00000000019DA000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\f76b04c f76afcf.exe File opened for modification C:\Windows\SYSTEM.INI f76afcf.exe File created C:\Windows\f7700ac f76b1b3.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76afcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76b1b3.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1136 f76afcf.exe 1136 f76afcf.exe 2772 f76b1b3.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeDebugPrivilege 1136 f76afcf.exe Token: SeDebugPrivilege 1136 f76afcf.exe Token: SeDebugPrivilege 1136 f76afcf.exe Token: SeDebugPrivilege 1136 f76afcf.exe Token: SeDebugPrivilege 1136 f76afcf.exe Token: SeDebugPrivilege 1136 f76afcf.exe Token: SeDebugPrivilege 1136 f76afcf.exe Token: SeDebugPrivilege 1136 f76afcf.exe Token: SeDebugPrivilege 1136 f76afcf.exe Token: SeDebugPrivilege 1136 f76afcf.exe Token: SeDebugPrivilege 1136 f76afcf.exe Token: SeDebugPrivilege 1136 f76afcf.exe Token: SeDebugPrivilege 1136 f76afcf.exe Token: SeDebugPrivilege 1136 f76afcf.exe Token: SeDebugPrivilege 1136 f76afcf.exe Token: SeDebugPrivilege 1136 f76afcf.exe Token: SeDebugPrivilege 1136 f76afcf.exe Token: SeDebugPrivilege 1136 f76afcf.exe Token: SeDebugPrivilege 1136 f76afcf.exe Token: SeDebugPrivilege 1136 f76afcf.exe Token: SeDebugPrivilege 1136 f76afcf.exe Token: SeDebugPrivilege 1136 f76afcf.exe Token: SeDebugPrivilege 1136 f76afcf.exe Token: SeDebugPrivilege 1136 f76afcf.exe Token: SeDebugPrivilege 2772 f76b1b3.exe Token: SeDebugPrivilege 2772 f76b1b3.exe Token: SeDebugPrivilege 2772 f76b1b3.exe Token: SeDebugPrivilege 2772 f76b1b3.exe Token: SeDebugPrivilege 2772 f76b1b3.exe Token: SeDebugPrivilege 2772 f76b1b3.exe Token: SeDebugPrivilege 2772 f76b1b3.exe Token: SeDebugPrivilege 2772 f76b1b3.exe Token: SeDebugPrivilege 2772 f76b1b3.exe Token: SeDebugPrivilege 2772 f76b1b3.exe Token: SeDebugPrivilege 2772 f76b1b3.exe Token: SeDebugPrivilege 2772 f76b1b3.exe Token: SeDebugPrivilege 2772 f76b1b3.exe Token: SeDebugPrivilege 2772 f76b1b3.exe Token: SeDebugPrivilege 2772 f76b1b3.exe Token: SeDebugPrivilege 2772 f76b1b3.exe Token: SeDebugPrivilege 2772 f76b1b3.exe Token: SeDebugPrivilege 2772 f76b1b3.exe Token: SeDebugPrivilege 2772 f76b1b3.exe Token: SeDebugPrivilege 2772 f76b1b3.exe Token: SeDebugPrivilege 2772 f76b1b3.exe Token: SeDebugPrivilege 2772 f76b1b3.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1800 wrote to memory of 1692 1800 rundll32.exe 30 PID 1800 wrote to memory of 1692 1800 rundll32.exe 30 PID 1800 wrote to memory of 1692 1800 rundll32.exe 30 PID 1800 wrote to memory of 1692 1800 rundll32.exe 30 PID 1800 wrote to memory of 1692 1800 rundll32.exe 30 PID 1800 wrote to memory of 1692 1800 rundll32.exe 30 PID 1800 wrote to memory of 1692 1800 rundll32.exe 30 PID 1692 wrote to memory of 1136 1692 rundll32.exe 31 PID 1692 wrote to memory of 1136 1692 rundll32.exe 31 PID 1692 wrote to memory of 1136 1692 rundll32.exe 31 PID 1692 wrote to memory of 1136 1692 rundll32.exe 31 PID 1136 wrote to memory of 1116 1136 f76afcf.exe 19 PID 1136 wrote to memory of 1168 1136 f76afcf.exe 20 PID 1136 wrote to memory of 1204 1136 f76afcf.exe 21 PID 1136 wrote to memory of 1528 1136 f76afcf.exe 25 PID 1136 wrote to memory of 1800 1136 f76afcf.exe 29 PID 1136 wrote to memory of 1692 1136 f76afcf.exe 30 PID 1136 wrote to memory of 1692 1136 f76afcf.exe 30 PID 1692 wrote to memory of 2772 1692 rundll32.exe 32 PID 1692 wrote to memory of 2772 1692 rundll32.exe 32 PID 1692 wrote to memory of 2772 1692 rundll32.exe 32 PID 1692 wrote to memory of 2772 1692 rundll32.exe 32 PID 1692 wrote to memory of 2684 1692 rundll32.exe 33 PID 1692 wrote to memory of 2684 1692 rundll32.exe 33 PID 1692 wrote to memory of 2684 1692 rundll32.exe 33 PID 1692 wrote to memory of 2684 1692 rundll32.exe 33 PID 1136 wrote to memory of 1116 1136 f76afcf.exe 19 PID 1136 wrote to memory of 1168 1136 f76afcf.exe 20 PID 1136 wrote to memory of 1204 1136 f76afcf.exe 21 PID 1136 wrote to memory of 1528 1136 f76afcf.exe 25 PID 1136 wrote to memory of 2772 1136 f76afcf.exe 32 PID 1136 wrote to memory of 2772 1136 f76afcf.exe 32 PID 1136 wrote to memory of 2684 1136 f76afcf.exe 33 PID 1136 wrote to memory of 2684 1136 f76afcf.exe 33 PID 2772 wrote to memory of 1116 2772 f76b1b3.exe 19 PID 2772 wrote to memory of 1168 2772 f76b1b3.exe 20 PID 2772 wrote to memory of 1204 2772 f76b1b3.exe 21 PID 2772 wrote to memory of 1528 2772 f76b1b3.exe 25 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76afcf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76b1b3.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b89a9551dc6944e70b3b664547affc18b85fbe07904697644f03f5964c4ac43aN.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b89a9551dc6944e70b3b664547affc18b85fbe07904697644f03f5964c4ac43aN.dll,#13⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\f76afcf.exeC:\Users\Admin\AppData\Local\Temp\f76afcf.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1136
-
-
C:\Users\Admin\AppData\Local\Temp\f76b1b3.exeC:\Users\Admin\AppData\Local\Temp\f76b1b3.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2772
-
-
C:\Users\Admin\AppData\Local\Temp\f76cb5a.exeC:\Users\Admin\AppData\Local\Temp\f76cb5a.exe4⤵
- Executes dropped EXE
PID:2684
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1528
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD5dd08f943bad32ef5bd9e7d6cbf9884cb
SHA1afa4d51081cc2380e13a4b84502831dc86db3c17
SHA2566626e5e0d5feba6a1bd33a0ee9dce0854e97e6736b16e44cb63d9bbbe20fe302
SHA5124d69a693bb852b2ed69acba3593f889d01b1cced1a43f1a5a42d441daca0f94c05bc7308420aba8ea5c9c1504274508d3e8a7fbba3f7e2bd39d07156d0e9ffdf
-
Filesize
97KB
MD51cc0de15cc5bba02bcaac63aa0b893ed
SHA12b6d08520c5eebfa999e6c5f88a6bc81e0d2f8c2
SHA256b1261b132b9449ebbfd916c3400af66ac323b1588b454e1fe86319e176104c82
SHA512009259600d43acc1e18f9e481b35c245e421feb01a47cb4112b8284706d3a7403acbc771b86e65c78354c7690a3aeb63a3a6cda6e7692b3fcdb96c5db6ca926e