Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
27s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16/12/2024, 04:30
Static task
static1
Behavioral task
behavioral1
Sample
d2cbd749f8985550ad9d83189a91abf8814f6fa8d4dcffa46d4251a362309c84N.dll
Resource
win7-20241010-en
General
-
Target
d2cbd749f8985550ad9d83189a91abf8814f6fa8d4dcffa46d4251a362309c84N.dll
-
Size
120KB
-
MD5
c3005c2e5968f83c067e4b4a226fb5e0
-
SHA1
792d0d7346348c48d104baa24d8d87d8fb041e6b
-
SHA256
d2cbd749f8985550ad9d83189a91abf8814f6fa8d4dcffa46d4251a362309c84
-
SHA512
7131b4c37c1619b336aba4578e9f64f1e0a70d4371cb9f5116f5011fb9916b1c983a9124f1bb27f08c040b377cac0ee66fb38e8126cad9e620ff3231e705b121
-
SSDEEP
1536:yMnMxp9dFG0mAlIpqPS552jdL+kdv/AUWPe9YNIQzsmk9X7cDaAzyjWF0eJ8pze:4z+pAS55kdL92Us85X7MVkWF0a
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f78280a.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f78257b.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f78257b.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f78257b.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f78280a.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f78280a.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f78257b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f78280a.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f78257b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f78257b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f78257b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f78280a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f78280a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f78280a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f78257b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f78257b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f78280a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f78280a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f78280a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f78257b.exe -
Executes dropped EXE 3 IoCs
pid Process 1244 f78257b.exe 2924 f78280a.exe 2292 f783f51.exe -
Loads dropped DLL 6 IoCs
pid Process 1176 rundll32.exe 1176 rundll32.exe 1176 rundll32.exe 1176 rundll32.exe 1176 rundll32.exe 1176 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f78257b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f78280a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f78257b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f78280a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f78280a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f78280a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f78257b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f78257b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f78257b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f78280a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f78280a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f78280a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f78257b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f78257b.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f78257b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f78280a.exe -
Enumerates connected drives 3 TTPs 13 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: f78257b.exe File opened (read-only) \??\L: f78257b.exe File opened (read-only) \??\O: f78257b.exe File opened (read-only) \??\Q: f78257b.exe File opened (read-only) \??\R: f78257b.exe File opened (read-only) \??\M: f78257b.exe File opened (read-only) \??\N: f78257b.exe File opened (read-only) \??\P: f78257b.exe File opened (read-only) \??\E: f78257b.exe File opened (read-only) \??\G: f78257b.exe File opened (read-only) \??\I: f78257b.exe File opened (read-only) \??\J: f78257b.exe File opened (read-only) \??\K: f78257b.exe -
resource yara_rule behavioral1/memory/1244-15-0x0000000000960000-0x0000000001A1A000-memory.dmp upx behavioral1/memory/1244-18-0x0000000000960000-0x0000000001A1A000-memory.dmp upx behavioral1/memory/1244-17-0x0000000000960000-0x0000000001A1A000-memory.dmp upx behavioral1/memory/1244-41-0x0000000000960000-0x0000000001A1A000-memory.dmp upx behavioral1/memory/1244-42-0x0000000000960000-0x0000000001A1A000-memory.dmp upx behavioral1/memory/1244-23-0x0000000000960000-0x0000000001A1A000-memory.dmp upx behavioral1/memory/1244-22-0x0000000000960000-0x0000000001A1A000-memory.dmp upx behavioral1/memory/1244-19-0x0000000000960000-0x0000000001A1A000-memory.dmp upx behavioral1/memory/1244-21-0x0000000000960000-0x0000000001A1A000-memory.dmp upx behavioral1/memory/1244-20-0x0000000000960000-0x0000000001A1A000-memory.dmp upx behavioral1/memory/1244-64-0x0000000000960000-0x0000000001A1A000-memory.dmp upx behavioral1/memory/1244-65-0x0000000000960000-0x0000000001A1A000-memory.dmp upx behavioral1/memory/1244-66-0x0000000000960000-0x0000000001A1A000-memory.dmp upx behavioral1/memory/1244-68-0x0000000000960000-0x0000000001A1A000-memory.dmp upx behavioral1/memory/1244-67-0x0000000000960000-0x0000000001A1A000-memory.dmp upx behavioral1/memory/1244-83-0x0000000000960000-0x0000000001A1A000-memory.dmp upx behavioral1/memory/1244-70-0x0000000000960000-0x0000000001A1A000-memory.dmp upx behavioral1/memory/1244-86-0x0000000000960000-0x0000000001A1A000-memory.dmp upx behavioral1/memory/1244-87-0x0000000000960000-0x0000000001A1A000-memory.dmp upx behavioral1/memory/1244-90-0x0000000000960000-0x0000000001A1A000-memory.dmp upx behavioral1/memory/1244-152-0x0000000000960000-0x0000000001A1A000-memory.dmp upx behavioral1/memory/2924-163-0x0000000000940000-0x00000000019FA000-memory.dmp upx behavioral1/memory/2924-177-0x0000000000940000-0x00000000019FA000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\f782694 f78257b.exe File opened for modification C:\Windows\SYSTEM.INI f78257b.exe File created C:\Windows\f7876c5 f78280a.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f78257b.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1244 f78257b.exe 1244 f78257b.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 1244 f78257b.exe Token: SeDebugPrivilege 1244 f78257b.exe Token: SeDebugPrivilege 1244 f78257b.exe Token: SeDebugPrivilege 1244 f78257b.exe Token: SeDebugPrivilege 1244 f78257b.exe Token: SeDebugPrivilege 1244 f78257b.exe Token: SeDebugPrivilege 1244 f78257b.exe Token: SeDebugPrivilege 1244 f78257b.exe Token: SeDebugPrivilege 1244 f78257b.exe Token: SeDebugPrivilege 1244 f78257b.exe Token: SeDebugPrivilege 1244 f78257b.exe Token: SeDebugPrivilege 1244 f78257b.exe Token: SeDebugPrivilege 1244 f78257b.exe Token: SeDebugPrivilege 1244 f78257b.exe Token: SeDebugPrivilege 1244 f78257b.exe Token: SeDebugPrivilege 1244 f78257b.exe Token: SeDebugPrivilege 1244 f78257b.exe Token: SeDebugPrivilege 1244 f78257b.exe Token: SeDebugPrivilege 1244 f78257b.exe Token: SeDebugPrivilege 1244 f78257b.exe Token: SeDebugPrivilege 1244 f78257b.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2412 wrote to memory of 1176 2412 rundll32.exe 29 PID 2412 wrote to memory of 1176 2412 rundll32.exe 29 PID 2412 wrote to memory of 1176 2412 rundll32.exe 29 PID 2412 wrote to memory of 1176 2412 rundll32.exe 29 PID 2412 wrote to memory of 1176 2412 rundll32.exe 29 PID 2412 wrote to memory of 1176 2412 rundll32.exe 29 PID 2412 wrote to memory of 1176 2412 rundll32.exe 29 PID 1176 wrote to memory of 1244 1176 rundll32.exe 30 PID 1176 wrote to memory of 1244 1176 rundll32.exe 30 PID 1176 wrote to memory of 1244 1176 rundll32.exe 30 PID 1176 wrote to memory of 1244 1176 rundll32.exe 30 PID 1244 wrote to memory of 1212 1244 f78257b.exe 18 PID 1244 wrote to memory of 1300 1244 f78257b.exe 19 PID 1244 wrote to memory of 1364 1244 f78257b.exe 20 PID 1244 wrote to memory of 1124 1244 f78257b.exe 22 PID 1244 wrote to memory of 2412 1244 f78257b.exe 28 PID 1244 wrote to memory of 1176 1244 f78257b.exe 29 PID 1244 wrote to memory of 1176 1244 f78257b.exe 29 PID 1176 wrote to memory of 2924 1176 rundll32.exe 31 PID 1176 wrote to memory of 2924 1176 rundll32.exe 31 PID 1176 wrote to memory of 2924 1176 rundll32.exe 31 PID 1176 wrote to memory of 2924 1176 rundll32.exe 31 PID 1176 wrote to memory of 2292 1176 rundll32.exe 32 PID 1176 wrote to memory of 2292 1176 rundll32.exe 32 PID 1176 wrote to memory of 2292 1176 rundll32.exe 32 PID 1176 wrote to memory of 2292 1176 rundll32.exe 32 PID 1244 wrote to memory of 1212 1244 f78257b.exe 18 PID 1244 wrote to memory of 1300 1244 f78257b.exe 19 PID 1244 wrote to memory of 1364 1244 f78257b.exe 20 PID 1244 wrote to memory of 1124 1244 f78257b.exe 22 PID 1244 wrote to memory of 2924 1244 f78257b.exe 31 PID 1244 wrote to memory of 2924 1244 f78257b.exe 31 PID 1244 wrote to memory of 2292 1244 f78257b.exe 32 PID 1244 wrote to memory of 2292 1244 f78257b.exe 32 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f78280a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f78257b.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1212
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1300
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1364
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d2cbd749f8985550ad9d83189a91abf8814f6fa8d4dcffa46d4251a362309c84N.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d2cbd749f8985550ad9d83189a91abf8814f6fa8d4dcffa46d4251a362309c84N.dll,#13⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\f78257b.exeC:\Users\Admin\AppData\Local\Temp\f78257b.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1244
-
-
C:\Users\Admin\AppData\Local\Temp\f78280a.exeC:\Users\Admin\AppData\Local\Temp\f78280a.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System policy modification
PID:2924
-
-
C:\Users\Admin\AppData\Local\Temp\f783f51.exeC:\Users\Admin\AppData\Local\Temp\f783f51.exe4⤵
- Executes dropped EXE
PID:2292
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1124
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD5bcb59c17cef081f9b43771715f3d5620
SHA1328e90dc25d1e1b333b72c004237f36783b10fb3
SHA2567a7097c79bed441320ac02acb31bc57760fb55914ff3773862202c23fbb212b2
SHA512346126084a4aeee3fe5b4197d6637075b7bb72fb6ae020c5dc5b38fb0c0ee42b025ea97722b4b476621a31cbea57eecd7c14d51ee4a443e9ab682e5160b4ed3a
-
Filesize
97KB
MD57335b3a8bf55a851cd3a207970b2eca4
SHA1a004eeabcab093235b981d259969a609d0edb8e8
SHA2567da9e795f53f69134d9bbd3e498c3b187eeeb020562f69b9693dcc30125df120
SHA5122fba674bbe677e4da415b407d4e5a63654609394d8d4772ba324ffc4922eade250b209e58879623a59915f2804243d8fe534ef3a597f052ad4de0b671d5f1e8c