Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16/12/2024, 00:30
Static task
static1
Behavioral task
behavioral1
Sample
875db80a0a413e8f78f7120c878460494b1f4199f8d5aa20e646098818fa21a4.dll
Resource
win7-20240903-en
General
-
Target
875db80a0a413e8f78f7120c878460494b1f4199f8d5aa20e646098818fa21a4.dll
-
Size
120KB
-
MD5
df8e4237a548ebe1eaa080e1f13eaa32
-
SHA1
d0746ec564e3ddd5a2aa18ab9117235cac640a74
-
SHA256
875db80a0a413e8f78f7120c878460494b1f4199f8d5aa20e646098818fa21a4
-
SHA512
e1d91cfb057c44a231a6a0d26c38ca298bf49bbfd2a0d838e9ff4e18f796faa3ab4d83428db6f2660b7ff76bc437633d693359d80539a118d039ea360d4d5615
-
SSDEEP
3072:ryAedAKhJ7/CxMq5DPuzCXrBnoH78o08Ug:redAwxY5DPe43oJ
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f769f99.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76a14e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76a14e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76a14e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f769f99.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f769f99.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f769f99.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76a14e.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76a14e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76a14e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76a14e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76a14e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f769f99.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f769f99.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f769f99.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76a14e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76a14e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f769f99.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f769f99.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f769f99.exe -
Executes dropped EXE 3 IoCs
pid Process 2564 f769f99.exe 2268 f76a14e.exe 2708 f76be9e.exe -
Loads dropped DLL 6 IoCs
pid Process 2908 rundll32.exe 2908 rundll32.exe 2908 rundll32.exe 2908 rundll32.exe 2908 rundll32.exe 2908 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f769f99.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76a14e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76a14e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76a14e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76a14e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f769f99.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f769f99.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76a14e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76a14e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76a14e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f769f99.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f769f99.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f769f99.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f769f99.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f769f99.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76a14e.exe -
Enumerates connected drives 3 TTPs 15 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: f769f99.exe File opened (read-only) \??\K: f769f99.exe File opened (read-only) \??\P: f769f99.exe File opened (read-only) \??\I: f769f99.exe File opened (read-only) \??\L: f769f99.exe File opened (read-only) \??\Q: f769f99.exe File opened (read-only) \??\T: f769f99.exe File opened (read-only) \??\H: f769f99.exe File opened (read-only) \??\N: f769f99.exe File opened (read-only) \??\O: f769f99.exe File opened (read-only) \??\R: f769f99.exe File opened (read-only) \??\S: f769f99.exe File opened (read-only) \??\M: f769f99.exe File opened (read-only) \??\G: f769f99.exe File opened (read-only) \??\E: f769f99.exe -
resource yara_rule behavioral1/memory/2564-17-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2564-19-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2564-22-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2564-20-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2564-18-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2564-16-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2564-15-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2564-23-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2564-14-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2564-21-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2564-60-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2564-61-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2564-62-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2564-63-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2564-65-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2564-66-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2564-67-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2564-68-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2564-69-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2564-87-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2564-88-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2564-152-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2268-164-0x0000000000900000-0x00000000019BA000-memory.dmp upx behavioral1/memory/2268-187-0x0000000000900000-0x00000000019BA000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\f769ff7 f769f99.exe File opened for modification C:\Windows\SYSTEM.INI f769f99.exe File created C:\Windows\f76f067 f76a14e.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f769f99.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76a14e.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2564 f769f99.exe 2564 f769f99.exe 2268 f76a14e.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeDebugPrivilege 2564 f769f99.exe Token: SeDebugPrivilege 2564 f769f99.exe Token: SeDebugPrivilege 2564 f769f99.exe Token: SeDebugPrivilege 2564 f769f99.exe Token: SeDebugPrivilege 2564 f769f99.exe Token: SeDebugPrivilege 2564 f769f99.exe Token: SeDebugPrivilege 2564 f769f99.exe Token: SeDebugPrivilege 2564 f769f99.exe Token: SeDebugPrivilege 2564 f769f99.exe Token: SeDebugPrivilege 2564 f769f99.exe Token: SeDebugPrivilege 2564 f769f99.exe Token: SeDebugPrivilege 2564 f769f99.exe Token: SeDebugPrivilege 2564 f769f99.exe Token: SeDebugPrivilege 2564 f769f99.exe Token: SeDebugPrivilege 2564 f769f99.exe Token: SeDebugPrivilege 2564 f769f99.exe Token: SeDebugPrivilege 2564 f769f99.exe Token: SeDebugPrivilege 2564 f769f99.exe Token: SeDebugPrivilege 2564 f769f99.exe Token: SeDebugPrivilege 2564 f769f99.exe Token: SeDebugPrivilege 2564 f769f99.exe Token: SeDebugPrivilege 2268 f76a14e.exe Token: SeDebugPrivilege 2268 f76a14e.exe Token: SeDebugPrivilege 2268 f76a14e.exe Token: SeDebugPrivilege 2268 f76a14e.exe Token: SeDebugPrivilege 2268 f76a14e.exe Token: SeDebugPrivilege 2268 f76a14e.exe Token: SeDebugPrivilege 2268 f76a14e.exe Token: SeDebugPrivilege 2268 f76a14e.exe Token: SeDebugPrivilege 2268 f76a14e.exe Token: SeDebugPrivilege 2268 f76a14e.exe Token: SeDebugPrivilege 2268 f76a14e.exe Token: SeDebugPrivilege 2268 f76a14e.exe Token: SeDebugPrivilege 2268 f76a14e.exe Token: SeDebugPrivilege 2268 f76a14e.exe Token: SeDebugPrivilege 2268 f76a14e.exe Token: SeDebugPrivilege 2268 f76a14e.exe Token: SeDebugPrivilege 2268 f76a14e.exe Token: SeDebugPrivilege 2268 f76a14e.exe Token: SeDebugPrivilege 2268 f76a14e.exe Token: SeDebugPrivilege 2268 f76a14e.exe Token: SeDebugPrivilege 2268 f76a14e.exe Token: SeDebugPrivilege 2268 f76a14e.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2908 2896 rundll32.exe 28 PID 2896 wrote to memory of 2908 2896 rundll32.exe 28 PID 2896 wrote to memory of 2908 2896 rundll32.exe 28 PID 2896 wrote to memory of 2908 2896 rundll32.exe 28 PID 2896 wrote to memory of 2908 2896 rundll32.exe 28 PID 2896 wrote to memory of 2908 2896 rundll32.exe 28 PID 2896 wrote to memory of 2908 2896 rundll32.exe 28 PID 2908 wrote to memory of 2564 2908 rundll32.exe 29 PID 2908 wrote to memory of 2564 2908 rundll32.exe 29 PID 2908 wrote to memory of 2564 2908 rundll32.exe 29 PID 2908 wrote to memory of 2564 2908 rundll32.exe 29 PID 2564 wrote to memory of 1116 2564 f769f99.exe 19 PID 2564 wrote to memory of 1160 2564 f769f99.exe 20 PID 2564 wrote to memory of 1196 2564 f769f99.exe 21 PID 2564 wrote to memory of 1048 2564 f769f99.exe 23 PID 2564 wrote to memory of 2896 2564 f769f99.exe 27 PID 2564 wrote to memory of 2908 2564 f769f99.exe 28 PID 2564 wrote to memory of 2908 2564 f769f99.exe 28 PID 2908 wrote to memory of 2268 2908 rundll32.exe 30 PID 2908 wrote to memory of 2268 2908 rundll32.exe 30 PID 2908 wrote to memory of 2268 2908 rundll32.exe 30 PID 2908 wrote to memory of 2268 2908 rundll32.exe 30 PID 2908 wrote to memory of 2708 2908 rundll32.exe 31 PID 2908 wrote to memory of 2708 2908 rundll32.exe 31 PID 2908 wrote to memory of 2708 2908 rundll32.exe 31 PID 2908 wrote to memory of 2708 2908 rundll32.exe 31 PID 2564 wrote to memory of 1116 2564 f769f99.exe 19 PID 2564 wrote to memory of 1160 2564 f769f99.exe 20 PID 2564 wrote to memory of 1196 2564 f769f99.exe 21 PID 2564 wrote to memory of 1048 2564 f769f99.exe 23 PID 2564 wrote to memory of 2268 2564 f769f99.exe 30 PID 2564 wrote to memory of 2268 2564 f769f99.exe 30 PID 2564 wrote to memory of 2708 2564 f769f99.exe 31 PID 2564 wrote to memory of 2708 2564 f769f99.exe 31 PID 2268 wrote to memory of 1116 2268 f76a14e.exe 19 PID 2268 wrote to memory of 1160 2268 f76a14e.exe 20 PID 2268 wrote to memory of 1196 2268 f76a14e.exe 21 PID 2268 wrote to memory of 1048 2268 f76a14e.exe 23 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f769f99.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76a14e.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1160
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\875db80a0a413e8f78f7120c878460494b1f4199f8d5aa20e646098818fa21a4.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\875db80a0a413e8f78f7120c878460494b1f4199f8d5aa20e646098818fa21a4.dll,#13⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\f769f99.exeC:\Users\Admin\AppData\Local\Temp\f769f99.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2564
-
-
C:\Users\Admin\AppData\Local\Temp\f76a14e.exeC:\Users\Admin\AppData\Local\Temp\f76a14e.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2268
-
-
C:\Users\Admin\AppData\Local\Temp\f76be9e.exeC:\Users\Admin\AppData\Local\Temp\f76be9e.exe4⤵
- Executes dropped EXE
PID:2708
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1048
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD50f9a9dd51cc31f47875cbc12beaae67d
SHA1bad2fdc8d8d8b817682655bfc0c4bd476fd354a1
SHA25683274817b54ac2390fd13cca2ed92953dbcf2bafe6ef794fb1c4dfd0aad0dba6
SHA512a279885005ec3290a93aca4c6397f29d1fd75b0c58c6ecfb057c1de44c48a13f4f3ad4ded883d9bae9b1058f18d30fc236dfae592963329e63b33f6c54f11fdf
-
Filesize
97KB
MD5879c4e50ec35b2c6f587e50262046d38
SHA149dff8414e14692b322bb2d6c0f8f9b9ed74a428
SHA256610404c9f454cfc507e86a82f14d3b20fffe1ffaa2039a80d90be3228c94d9d3
SHA512973483e9082b95ee0e8111d93236e3ea25379a59743bd6283b68d6bc0520879ce01efd9e304d322256128f3a794515ebe24b2f5ad8834d6d0ade3ca2e0c801fe