Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
28s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16/12/2024, 22:56
Static task
static1
Behavioral task
behavioral1
Sample
0a9b5f9ee551c20981af20431d48f84cd0d189a42dc840904f3e66e27f2a1578N.dll
Resource
win7-20241010-en
General
-
Target
0a9b5f9ee551c20981af20431d48f84cd0d189a42dc840904f3e66e27f2a1578N.dll
-
Size
120KB
-
MD5
6809d71ef46483a16816634399eda3c0
-
SHA1
951d8503dc5eb2febd7738352ab73f8aa2a072ea
-
SHA256
0a9b5f9ee551c20981af20431d48f84cd0d189a42dc840904f3e66e27f2a1578
-
SHA512
8a44862f61a7e30229892fab6206f18eab2cf213e4ec4dd16ef443411bd24e55f2bfde5013387f72a2fcf24333571cd581aceb549a4b4bd23d39b8f0b6bc4798
-
SSDEEP
3072:tK6ioXmfTybpc2pkjhDW/nm8GQUqx7dewAXC:cToXuTCmQiDcn5ndLGC
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f775e27.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f778131.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f778131.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f778131.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f775e27.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f775e27.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f775e27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f778131.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f775e27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f775e27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f778131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f775e27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f775e27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f778131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f778131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f778131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f778131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f778131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f775e27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f775e27.exe -
Executes dropped EXE 3 IoCs
pid Process 2908 f775e27.exe 2712 f7760e5.exe 2136 f778131.exe -
Loads dropped DLL 6 IoCs
pid Process 2808 rundll32.exe 2808 rundll32.exe 2808 rundll32.exe 2808 rundll32.exe 2808 rundll32.exe 2808 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f775e27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f775e27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f778131.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f778131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f778131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f775e27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f775e27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f778131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f778131.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f775e27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f778131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f775e27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f775e27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f778131.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f775e27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f778131.exe -
Enumerates connected drives 3 TTPs 13 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: f775e27.exe File opened (read-only) \??\P: f775e27.exe File opened (read-only) \??\Q: f775e27.exe File opened (read-only) \??\R: f775e27.exe File opened (read-only) \??\I: f775e27.exe File opened (read-only) \??\J: f775e27.exe File opened (read-only) \??\M: f775e27.exe File opened (read-only) \??\K: f775e27.exe File opened (read-only) \??\L: f775e27.exe File opened (read-only) \??\N: f775e27.exe File opened (read-only) \??\E: f775e27.exe File opened (read-only) \??\G: f775e27.exe File opened (read-only) \??\H: f775e27.exe -
resource yara_rule behavioral1/memory/2908-17-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2908-20-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2908-22-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2908-44-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2908-43-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2908-42-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2908-23-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2908-18-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2908-21-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2908-19-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2908-67-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2908-66-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2908-68-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2908-70-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2908-69-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2908-72-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2908-73-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2908-75-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2908-74-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2908-111-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2908-153-0x0000000000520000-0x00000000015DA000-memory.dmp upx behavioral1/memory/2136-179-0x0000000000910000-0x00000000019CA000-memory.dmp upx behavioral1/memory/2136-207-0x0000000000910000-0x00000000019CA000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\f775f4f f775e27.exe File opened for modification C:\Windows\SYSTEM.INI f775e27.exe File created C:\Windows\f77b145 f778131.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f775e27.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f778131.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2908 f775e27.exe 2908 f775e27.exe 2136 f778131.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 2908 f775e27.exe Token: SeDebugPrivilege 2908 f775e27.exe Token: SeDebugPrivilege 2908 f775e27.exe Token: SeDebugPrivilege 2908 f775e27.exe Token: SeDebugPrivilege 2908 f775e27.exe Token: SeDebugPrivilege 2908 f775e27.exe Token: SeDebugPrivilege 2908 f775e27.exe Token: SeDebugPrivilege 2908 f775e27.exe Token: SeDebugPrivilege 2908 f775e27.exe Token: SeDebugPrivilege 2908 f775e27.exe Token: SeDebugPrivilege 2908 f775e27.exe Token: SeDebugPrivilege 2908 f775e27.exe Token: SeDebugPrivilege 2908 f775e27.exe Token: SeDebugPrivilege 2908 f775e27.exe Token: SeDebugPrivilege 2908 f775e27.exe Token: SeDebugPrivilege 2908 f775e27.exe Token: SeDebugPrivilege 2908 f775e27.exe Token: SeDebugPrivilege 2908 f775e27.exe Token: SeDebugPrivilege 2908 f775e27.exe Token: SeDebugPrivilege 2908 f775e27.exe Token: SeDebugPrivilege 2908 f775e27.exe Token: SeDebugPrivilege 2908 f775e27.exe Token: SeDebugPrivilege 2908 f775e27.exe Token: SeDebugPrivilege 2136 f778131.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2808 2772 rundll32.exe 30 PID 2772 wrote to memory of 2808 2772 rundll32.exe 30 PID 2772 wrote to memory of 2808 2772 rundll32.exe 30 PID 2772 wrote to memory of 2808 2772 rundll32.exe 30 PID 2772 wrote to memory of 2808 2772 rundll32.exe 30 PID 2772 wrote to memory of 2808 2772 rundll32.exe 30 PID 2772 wrote to memory of 2808 2772 rundll32.exe 30 PID 2808 wrote to memory of 2908 2808 rundll32.exe 31 PID 2808 wrote to memory of 2908 2808 rundll32.exe 31 PID 2808 wrote to memory of 2908 2808 rundll32.exe 31 PID 2808 wrote to memory of 2908 2808 rundll32.exe 31 PID 2908 wrote to memory of 1132 2908 f775e27.exe 19 PID 2908 wrote to memory of 1232 2908 f775e27.exe 20 PID 2908 wrote to memory of 1280 2908 f775e27.exe 21 PID 2908 wrote to memory of 1588 2908 f775e27.exe 25 PID 2908 wrote to memory of 2772 2908 f775e27.exe 29 PID 2908 wrote to memory of 2808 2908 f775e27.exe 30 PID 2908 wrote to memory of 2808 2908 f775e27.exe 30 PID 2808 wrote to memory of 2712 2808 rundll32.exe 32 PID 2808 wrote to memory of 2712 2808 rundll32.exe 32 PID 2808 wrote to memory of 2712 2808 rundll32.exe 32 PID 2808 wrote to memory of 2712 2808 rundll32.exe 32 PID 2808 wrote to memory of 2136 2808 rundll32.exe 33 PID 2808 wrote to memory of 2136 2808 rundll32.exe 33 PID 2808 wrote to memory of 2136 2808 rundll32.exe 33 PID 2808 wrote to memory of 2136 2808 rundll32.exe 33 PID 2908 wrote to memory of 1132 2908 f775e27.exe 19 PID 2908 wrote to memory of 1232 2908 f775e27.exe 20 PID 2908 wrote to memory of 1280 2908 f775e27.exe 21 PID 2908 wrote to memory of 1588 2908 f775e27.exe 25 PID 2908 wrote to memory of 2712 2908 f775e27.exe 32 PID 2908 wrote to memory of 2712 2908 f775e27.exe 32 PID 2908 wrote to memory of 2136 2908 f775e27.exe 33 PID 2908 wrote to memory of 2136 2908 f775e27.exe 33 PID 2136 wrote to memory of 1132 2136 f778131.exe 19 PID 2136 wrote to memory of 1232 2136 f778131.exe 20 PID 2136 wrote to memory of 1280 2136 f778131.exe 21 PID 2136 wrote to memory of 1588 2136 f778131.exe 25 PID 2136 wrote to memory of 2908 2136 f778131.exe 31 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f775e27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f778131.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1132
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1232
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1280
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0a9b5f9ee551c20981af20431d48f84cd0d189a42dc840904f3e66e27f2a1578N.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0a9b5f9ee551c20981af20431d48f84cd0d189a42dc840904f3e66e27f2a1578N.dll,#13⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\f775e27.exeC:\Users\Admin\AppData\Local\Temp\f775e27.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2908
-
-
C:\Users\Admin\AppData\Local\Temp\f7760e5.exeC:\Users\Admin\AppData\Local\Temp\f7760e5.exe4⤵
- Executes dropped EXE
PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\f778131.exeC:\Users\Admin\AppData\Local\Temp\f778131.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2136
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1588
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD552ff8a69f4f75b6a133ae821d74bf2c7
SHA14558f8ef6c1e526d8ed0ec4c79e1607487a512ce
SHA2562cabae46cacf2ad824688e32d6bfc02772dc7e59a55228c9fd9ff93fdc571c4b
SHA5123a56422157a0e97b096521156fc2988da802543e4dbfc09ec2902c5b5b3039730e526f4c9f8c82ce74e1074db72d722d313328dd2ed3c8ab1c57482996b42acf
-
Filesize
97KB
MD5d816ac504664d18af73a18c0f8554ed0
SHA11b5716afa4de7b36aacce71a70d1091bcfe8f073
SHA256babbf3f21e1ed39d49652fc04f831dff5fe45c0f2cad78e549a79d39726953c0
SHA512563162b9c363be9478810c6ecad2499c4ba357c2158beb78e75ca90db933639313f04ae49ee379e27cc599eb499abe738dc9dbf6b545cfa9d2ebb24768147e28