Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
83s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16/12/2024, 02:26
Static task
static1
Behavioral task
behavioral1
Sample
8330b89617b335208b4a038ac56a1b2c85246cc7c0d59a12353980fb41064a57N.dll
Resource
win7-20240903-en
General
-
Target
8330b89617b335208b4a038ac56a1b2c85246cc7c0d59a12353980fb41064a57N.dll
-
Size
120KB
-
MD5
7a9e488daf6b579afc7c20acac9c1140
-
SHA1
dcefbf0e3ecacef72e1992f86aad1aac4d9c4bae
-
SHA256
8330b89617b335208b4a038ac56a1b2c85246cc7c0d59a12353980fb41064a57
-
SHA512
59c9e59efd46f1633edb41130ce8511b469e496827d635e92f40c929459d8c34efb95b60e5c977cb06a36639fb7be25d0ef2fdb804079e0eae318b939083e5e2
-
SSDEEP
3072:GYXwGUXxTREjDNrXUdB1+JJZjOFD7DVX3/pgH2:yXxTijDNrEdB1+JJZChVHi
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76f769.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76f769.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76f769.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76dbaf.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76dbaf.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76dbaf.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76dbaf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76f769.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76dbaf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76f769.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76f769.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76f769.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76dbaf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76dbaf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76dbaf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76f769.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76f769.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76f769.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76dbaf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76dbaf.exe -
Executes dropped EXE 3 IoCs
pid Process 2832 f76dbaf.exe 2860 f76dd64.exe 2980 f76f769.exe -
Loads dropped DLL 6 IoCs
pid Process 2616 rundll32.exe 2616 rundll32.exe 2616 rundll32.exe 2616 rundll32.exe 2616 rundll32.exe 2616 rundll32.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76dbaf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76f769.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76f769.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76f769.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76dbaf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76dbaf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76f769.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76f769.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76dbaf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76f769.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76dbaf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76dbaf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76dbaf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76f769.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76dbaf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76f769.exe -
Enumerates connected drives 3 TTPs 13 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: f76dbaf.exe File opened (read-only) \??\M: f76dbaf.exe File opened (read-only) \??\P: f76dbaf.exe File opened (read-only) \??\E: f76f769.exe File opened (read-only) \??\H: f76dbaf.exe File opened (read-only) \??\G: f76dbaf.exe File opened (read-only) \??\J: f76dbaf.exe File opened (read-only) \??\K: f76dbaf.exe File opened (read-only) \??\L: f76dbaf.exe File opened (read-only) \??\N: f76dbaf.exe File opened (read-only) \??\O: f76dbaf.exe File opened (read-only) \??\G: f76f769.exe File opened (read-only) \??\E: f76dbaf.exe -
resource yara_rule behavioral1/memory/2832-22-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2832-13-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2832-14-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2832-16-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2832-18-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2832-21-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2832-20-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2832-19-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2832-17-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2832-15-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2832-62-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2832-63-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2832-64-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2832-66-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2832-67-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2832-83-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2832-84-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2832-103-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2832-105-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2832-107-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2832-109-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2832-146-0x00000000006B0000-0x000000000176A000-memory.dmp upx behavioral1/memory/2980-157-0x0000000000920000-0x00000000019DA000-memory.dmp upx behavioral1/memory/2980-203-0x0000000000920000-0x00000000019DA000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\f76dc1c f76dbaf.exe File opened for modification C:\Windows\SYSTEM.INI f76dbaf.exe File created C:\Windows\f772c5e f76f769.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76dbaf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76f769.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2832 f76dbaf.exe 2832 f76dbaf.exe 2980 f76f769.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeDebugPrivilege 2832 f76dbaf.exe Token: SeDebugPrivilege 2832 f76dbaf.exe Token: SeDebugPrivilege 2832 f76dbaf.exe Token: SeDebugPrivilege 2832 f76dbaf.exe Token: SeDebugPrivilege 2832 f76dbaf.exe Token: SeDebugPrivilege 2832 f76dbaf.exe Token: SeDebugPrivilege 2832 f76dbaf.exe Token: SeDebugPrivilege 2832 f76dbaf.exe Token: SeDebugPrivilege 2832 f76dbaf.exe Token: SeDebugPrivilege 2832 f76dbaf.exe Token: SeDebugPrivilege 2832 f76dbaf.exe Token: SeDebugPrivilege 2832 f76dbaf.exe Token: SeDebugPrivilege 2832 f76dbaf.exe Token: SeDebugPrivilege 2832 f76dbaf.exe Token: SeDebugPrivilege 2832 f76dbaf.exe Token: SeDebugPrivilege 2832 f76dbaf.exe Token: SeDebugPrivilege 2832 f76dbaf.exe Token: SeDebugPrivilege 2832 f76dbaf.exe Token: SeDebugPrivilege 2832 f76dbaf.exe Token: SeDebugPrivilege 2832 f76dbaf.exe Token: SeDebugPrivilege 2832 f76dbaf.exe Token: SeDebugPrivilege 2832 f76dbaf.exe Token: SeDebugPrivilege 2832 f76dbaf.exe Token: SeDebugPrivilege 2832 f76dbaf.exe Token: SeDebugPrivilege 2980 f76f769.exe Token: SeDebugPrivilege 2980 f76f769.exe Token: SeDebugPrivilege 2980 f76f769.exe Token: SeDebugPrivilege 2980 f76f769.exe Token: SeDebugPrivilege 2980 f76f769.exe Token: SeDebugPrivilege 2980 f76f769.exe Token: SeDebugPrivilege 2980 f76f769.exe Token: SeDebugPrivilege 2980 f76f769.exe Token: SeDebugPrivilege 2980 f76f769.exe Token: SeDebugPrivilege 2980 f76f769.exe Token: SeDebugPrivilege 2980 f76f769.exe Token: SeDebugPrivilege 2980 f76f769.exe Token: SeDebugPrivilege 2980 f76f769.exe Token: SeDebugPrivilege 2980 f76f769.exe Token: SeDebugPrivilege 2980 f76f769.exe Token: SeDebugPrivilege 2980 f76f769.exe Token: SeDebugPrivilege 2980 f76f769.exe Token: SeDebugPrivilege 2980 f76f769.exe Token: SeDebugPrivilege 2980 f76f769.exe Token: SeDebugPrivilege 2980 f76f769.exe Token: SeDebugPrivilege 2980 f76f769.exe Token: SeDebugPrivilege 2980 f76f769.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2616 2016 rundll32.exe 31 PID 2016 wrote to memory of 2616 2016 rundll32.exe 31 PID 2016 wrote to memory of 2616 2016 rundll32.exe 31 PID 2016 wrote to memory of 2616 2016 rundll32.exe 31 PID 2016 wrote to memory of 2616 2016 rundll32.exe 31 PID 2016 wrote to memory of 2616 2016 rundll32.exe 31 PID 2016 wrote to memory of 2616 2016 rundll32.exe 31 PID 2616 wrote to memory of 2832 2616 rundll32.exe 32 PID 2616 wrote to memory of 2832 2616 rundll32.exe 32 PID 2616 wrote to memory of 2832 2616 rundll32.exe 32 PID 2616 wrote to memory of 2832 2616 rundll32.exe 32 PID 2832 wrote to memory of 1120 2832 f76dbaf.exe 19 PID 2832 wrote to memory of 1168 2832 f76dbaf.exe 20 PID 2832 wrote to memory of 1212 2832 f76dbaf.exe 21 PID 2832 wrote to memory of 1540 2832 f76dbaf.exe 23 PID 2832 wrote to memory of 2016 2832 f76dbaf.exe 30 PID 2832 wrote to memory of 2616 2832 f76dbaf.exe 31 PID 2832 wrote to memory of 2616 2832 f76dbaf.exe 31 PID 2616 wrote to memory of 2860 2616 rundll32.exe 33 PID 2616 wrote to memory of 2860 2616 rundll32.exe 33 PID 2616 wrote to memory of 2860 2616 rundll32.exe 33 PID 2616 wrote to memory of 2860 2616 rundll32.exe 33 PID 2616 wrote to memory of 2980 2616 rundll32.exe 34 PID 2616 wrote to memory of 2980 2616 rundll32.exe 34 PID 2616 wrote to memory of 2980 2616 rundll32.exe 34 PID 2616 wrote to memory of 2980 2616 rundll32.exe 34 PID 2832 wrote to memory of 1120 2832 f76dbaf.exe 19 PID 2832 wrote to memory of 1168 2832 f76dbaf.exe 20 PID 2832 wrote to memory of 1212 2832 f76dbaf.exe 21 PID 2832 wrote to memory of 1540 2832 f76dbaf.exe 23 PID 2832 wrote to memory of 2860 2832 f76dbaf.exe 33 PID 2832 wrote to memory of 2860 2832 f76dbaf.exe 33 PID 2832 wrote to memory of 2980 2832 f76dbaf.exe 34 PID 2832 wrote to memory of 2980 2832 f76dbaf.exe 34 PID 2980 wrote to memory of 1120 2980 f76f769.exe 19 PID 2980 wrote to memory of 1168 2980 f76f769.exe 20 PID 2980 wrote to memory of 1212 2980 f76f769.exe 21 PID 2980 wrote to memory of 1540 2980 f76f769.exe 23 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76dbaf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76f769.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8330b89617b335208b4a038ac56a1b2c85246cc7c0d59a12353980fb41064a57N.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8330b89617b335208b4a038ac56a1b2c85246cc7c0d59a12353980fb41064a57N.dll,#13⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\f76dbaf.exeC:\Users\Admin\AppData\Local\Temp\f76dbaf.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2832
-
-
C:\Users\Admin\AppData\Local\Temp\f76dd64.exeC:\Users\Admin\AppData\Local\Temp\f76dd64.exe4⤵
- Executes dropped EXE
PID:2860
-
-
C:\Users\Admin\AppData\Local\Temp\f76f769.exeC:\Users\Admin\AppData\Local\Temp\f76f769.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2980
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1540
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD5011d3cc969d96e7e6d300703c25eb480
SHA1aede2a3f349d7b3be10260e7643ab895b8f02e60
SHA256a84e0787261dac0f4609691d55c309d71f34fa7a31966ee5892410a94422b21a
SHA512fec5bb95e46ad2ad18e4be1b9f7011b9b104cf2337b6a987f5de774a31194addfb22d581c22de6910802e6f1be36a4724f616f7bbb35215d801f7e088ebb335c
-
Filesize
97KB
MD514b5733743f4b59902aa8fb70c85de39
SHA16594170595de851115582139fa3084b960998a9c
SHA256d0dbaad6ebaacef8b233befb3aff4b5981e66a70742927d06e1279231316b7d9
SHA512c708b58f4aa6fbb153d6ffe53086a8a6a0f5c76aabacc0b5162f784668bba92568b2a27e1b5e8b98db44c2bbe2a75fba72a008bfd37e4f129c13c5f5961de97e