Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
11/12/2024, 10:34
Static task
static1
Behavioral task
behavioral1
Sample
aef3472c320e376435b27c946fd17e41f0f3f96ca02ed316b18e11d2d005c879.dll
Resource
win7-20241023-en
General
-
Target
aef3472c320e376435b27c946fd17e41f0f3f96ca02ed316b18e11d2d005c879.dll
-
Size
120KB
-
MD5
784e2ed0fd141c50445065e4c3fc6585
-
SHA1
b3f5e02639435cb0a0409d310cc9f023cc8bfd38
-
SHA256
aef3472c320e376435b27c946fd17e41f0f3f96ca02ed316b18e11d2d005c879
-
SHA512
d762459a7118e2a9b40702546c9dae1146f691ca954b5b2260f5fb59331c15cffdcadd08378adff46ceda9fe2a79be27317859c2807df7c45dcf51a1b934d099
-
SSDEEP
3072:8zss6G0Mz1ERUSwUZJLuO/TQ0y6gGZF59c6:4ss6G0MhYUVmx/TQ0Zfb5
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76b72f.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76b72f.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76b72f.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f769878.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f769878.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f769878.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f769878.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76b72f.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76b72f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76b72f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f769878.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f769878.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76b72f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f769878.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76b72f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76b72f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76b72f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f769878.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f769878.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f769878.exe -
Executes dropped EXE 3 IoCs
pid Process 3048 f769878.exe 2904 f769a6b.exe 2364 f76b72f.exe -
Loads dropped DLL 6 IoCs
pid Process 1832 rundll32.exe 1832 rundll32.exe 1832 rundll32.exe 1832 rundll32.exe 1832 rundll32.exe 1832 rundll32.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f769878.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76b72f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76b72f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76b72f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f769878.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f769878.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f769878.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f769878.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76b72f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76b72f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76b72f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f769878.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f769878.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76b72f.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f769878.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76b72f.exe -
Enumerates connected drives 3 TTPs 17 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: f769878.exe File opened (read-only) \??\K: f769878.exe File opened (read-only) \??\L: f769878.exe File opened (read-only) \??\E: f76b72f.exe File opened (read-only) \??\O: f769878.exe File opened (read-only) \??\Q: f769878.exe File opened (read-only) \??\S: f769878.exe File opened (read-only) \??\H: f769878.exe File opened (read-only) \??\T: f769878.exe File opened (read-only) \??\G: f76b72f.exe File opened (read-only) \??\M: f769878.exe File opened (read-only) \??\N: f769878.exe File opened (read-only) \??\P: f769878.exe File opened (read-only) \??\R: f769878.exe File opened (read-only) \??\E: f769878.exe File opened (read-only) \??\G: f769878.exe File opened (read-only) \??\I: f769878.exe -
resource yara_rule behavioral1/memory/3048-15-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/3048-20-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/3048-24-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/3048-17-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/3048-21-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/3048-25-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/3048-23-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/3048-22-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/3048-26-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/3048-18-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/3048-64-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/3048-66-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/3048-68-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/3048-65-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/3048-67-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/3048-70-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/3048-71-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/3048-72-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/3048-91-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/3048-90-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/3048-93-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/3048-113-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/3048-115-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/3048-156-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2364-168-0x0000000000920000-0x00000000019DA000-memory.dmp upx behavioral1/memory/2364-210-0x0000000000920000-0x00000000019DA000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\f7698e5 f769878.exe File opened for modification C:\Windows\SYSTEM.INI f769878.exe File created C:\Windows\f76e8aa f76b72f.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f769878.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76b72f.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3048 f769878.exe 3048 f769878.exe 2364 f76b72f.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeDebugPrivilege 3048 f769878.exe Token: SeDebugPrivilege 3048 f769878.exe Token: SeDebugPrivilege 3048 f769878.exe Token: SeDebugPrivilege 3048 f769878.exe Token: SeDebugPrivilege 3048 f769878.exe Token: SeDebugPrivilege 3048 f769878.exe Token: SeDebugPrivilege 3048 f769878.exe Token: SeDebugPrivilege 3048 f769878.exe Token: SeDebugPrivilege 3048 f769878.exe Token: SeDebugPrivilege 3048 f769878.exe Token: SeDebugPrivilege 3048 f769878.exe Token: SeDebugPrivilege 3048 f769878.exe Token: SeDebugPrivilege 3048 f769878.exe Token: SeDebugPrivilege 3048 f769878.exe Token: SeDebugPrivilege 3048 f769878.exe Token: SeDebugPrivilege 3048 f769878.exe Token: SeDebugPrivilege 3048 f769878.exe Token: SeDebugPrivilege 3048 f769878.exe Token: SeDebugPrivilege 3048 f769878.exe Token: SeDebugPrivilege 3048 f769878.exe Token: SeDebugPrivilege 3048 f769878.exe Token: SeDebugPrivilege 3048 f769878.exe Token: SeDebugPrivilege 3048 f769878.exe Token: SeDebugPrivilege 2364 f76b72f.exe Token: SeDebugPrivilege 2364 f76b72f.exe Token: SeDebugPrivilege 2364 f76b72f.exe Token: SeDebugPrivilege 2364 f76b72f.exe Token: SeDebugPrivilege 2364 f76b72f.exe Token: SeDebugPrivilege 2364 f76b72f.exe Token: SeDebugPrivilege 2364 f76b72f.exe Token: SeDebugPrivilege 2364 f76b72f.exe Token: SeDebugPrivilege 2364 f76b72f.exe Token: SeDebugPrivilege 2364 f76b72f.exe Token: SeDebugPrivilege 2364 f76b72f.exe Token: SeDebugPrivilege 2364 f76b72f.exe Token: SeDebugPrivilege 2364 f76b72f.exe Token: SeDebugPrivilege 2364 f76b72f.exe Token: SeDebugPrivilege 2364 f76b72f.exe Token: SeDebugPrivilege 2364 f76b72f.exe Token: SeDebugPrivilege 2364 f76b72f.exe Token: SeDebugPrivilege 2364 f76b72f.exe Token: SeDebugPrivilege 2364 f76b72f.exe Token: SeDebugPrivilege 2364 f76b72f.exe Token: SeDebugPrivilege 2364 f76b72f.exe Token: SeDebugPrivilege 2364 f76b72f.exe Token: SeDebugPrivilege 2364 f76b72f.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2416 wrote to memory of 1832 2416 rundll32.exe 30 PID 2416 wrote to memory of 1832 2416 rundll32.exe 30 PID 2416 wrote to memory of 1832 2416 rundll32.exe 30 PID 2416 wrote to memory of 1832 2416 rundll32.exe 30 PID 2416 wrote to memory of 1832 2416 rundll32.exe 30 PID 2416 wrote to memory of 1832 2416 rundll32.exe 30 PID 2416 wrote to memory of 1832 2416 rundll32.exe 30 PID 1832 wrote to memory of 3048 1832 rundll32.exe 31 PID 1832 wrote to memory of 3048 1832 rundll32.exe 31 PID 1832 wrote to memory of 3048 1832 rundll32.exe 31 PID 1832 wrote to memory of 3048 1832 rundll32.exe 31 PID 3048 wrote to memory of 1112 3048 f769878.exe 19 PID 3048 wrote to memory of 1184 3048 f769878.exe 20 PID 3048 wrote to memory of 1208 3048 f769878.exe 21 PID 3048 wrote to memory of 1532 3048 f769878.exe 23 PID 3048 wrote to memory of 2416 3048 f769878.exe 29 PID 3048 wrote to memory of 1832 3048 f769878.exe 30 PID 3048 wrote to memory of 1832 3048 f769878.exe 30 PID 1832 wrote to memory of 2904 1832 rundll32.exe 32 PID 1832 wrote to memory of 2904 1832 rundll32.exe 32 PID 1832 wrote to memory of 2904 1832 rundll32.exe 32 PID 1832 wrote to memory of 2904 1832 rundll32.exe 32 PID 1832 wrote to memory of 2364 1832 rundll32.exe 33 PID 1832 wrote to memory of 2364 1832 rundll32.exe 33 PID 1832 wrote to memory of 2364 1832 rundll32.exe 33 PID 1832 wrote to memory of 2364 1832 rundll32.exe 33 PID 3048 wrote to memory of 1112 3048 f769878.exe 19 PID 3048 wrote to memory of 1184 3048 f769878.exe 20 PID 3048 wrote to memory of 1208 3048 f769878.exe 21 PID 3048 wrote to memory of 1532 3048 f769878.exe 23 PID 3048 wrote to memory of 2904 3048 f769878.exe 32 PID 3048 wrote to memory of 2904 3048 f769878.exe 32 PID 3048 wrote to memory of 2364 3048 f769878.exe 33 PID 3048 wrote to memory of 2364 3048 f769878.exe 33 PID 2364 wrote to memory of 1112 2364 f76b72f.exe 19 PID 2364 wrote to memory of 1184 2364 f76b72f.exe 20 PID 2364 wrote to memory of 1208 2364 f76b72f.exe 21 PID 2364 wrote to memory of 1532 2364 f76b72f.exe 23 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f769878.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76b72f.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1184
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aef3472c320e376435b27c946fd17e41f0f3f96ca02ed316b18e11d2d005c879.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aef3472c320e376435b27c946fd17e41f0f3f96ca02ed316b18e11d2d005c879.dll,#13⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\f769878.exeC:\Users\Admin\AppData\Local\Temp\f769878.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3048
-
-
C:\Users\Admin\AppData\Local\Temp\f769a6b.exeC:\Users\Admin\AppData\Local\Temp\f769a6b.exe4⤵
- Executes dropped EXE
PID:2904
-
-
C:\Users\Admin\AppData\Local\Temp\f76b72f.exeC:\Users\Admin\AppData\Local\Temp\f76b72f.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2364
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1532
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD5f4fa18962ab36ac873bf804a6a33cde4
SHA152940f738078dc85eeebd670c60adde1da49b852
SHA2566a0bf75e0a5dfd418d823b2a8bc7112aee0810ecb62bad20cfdb85040cdc1c3d
SHA512fe7efba8f92fb732e3668eaa07dade7a9029dcb22cb932e3339a12526bad8b47e8d17112fbc0a2b038565b2397d2601c212b5296a38ded83edeb495a7ae775a9
-
Filesize
257B
MD5125db4b9b6021358e0d0ef54e3588278
SHA1bd73afd68dc4e5c6ff9148a75cdd1d1eece84a35
SHA2565d8c11a1aa24ed978cc13d1c73ec78b9660a48179ff492ad43eb61b19c82c13f
SHA512a3ce9670091e4bdf108acca6a1b83dbec6ad0344fe11814a824021864aa01a5190592e8ef6038c43e1c2414600df549645f7e75c51b892b6397b0822b50e866b