Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 03:57
Static task
static1
Behavioral task
behavioral1
Sample
e089f803a0c4e085b25e73d57ed46244268ad1fb250ef22f546043db69e6eebf.dll
Resource
win7-20240708-en
General
-
Target
e089f803a0c4e085b25e73d57ed46244268ad1fb250ef22f546043db69e6eebf.dll
-
Size
120KB
-
MD5
36ef8d9f850799f6681b1b0f36d77b14
-
SHA1
9d63f151db59043bd89e9ccbdf486360bed57f54
-
SHA256
e089f803a0c4e085b25e73d57ed46244268ad1fb250ef22f546043db69e6eebf
-
SHA512
bf9de43a58afefc44d235c463887984b7cf168e3c986675eaf9ecb4e9ee7d9062b4ae8180f264e38e893a6a5ae421f90c25eed7f6cfca22f2f4f6b2b8db94a41
-
SSDEEP
3072:6jK8wjj91Rl/jBw79cA5A8q9kuP9jI4tQ:6Ozzb/twRcA5B2kuiL
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f7707ce.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f7707ce.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f7707ce.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f772388.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f772388.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f772388.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7707ce.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f772388.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f7707ce.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f7707ce.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f7707ce.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f7707ce.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f772388.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f772388.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f772388.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f7707ce.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f772388.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f772388.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f772388.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f7707ce.exe -
Executes dropped EXE 3 IoCs
pid Process 2704 f7707ce.exe 2632 f770973.exe 1728 f772388.exe -
Loads dropped DLL 6 IoCs
pid Process 2404 rundll32.exe 2404 rundll32.exe 2404 rundll32.exe 2404 rundll32.exe 2404 rundll32.exe 2404 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f7707ce.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f772388.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f772388.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f772388.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f7707ce.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f7707ce.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f772388.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f772388.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f7707ce.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f7707ce.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f7707ce.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f772388.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f7707ce.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f772388.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7707ce.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f772388.exe -
Enumerates connected drives 3 TTPs 17 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: f7707ce.exe File opened (read-only) \??\I: f7707ce.exe File opened (read-only) \??\J: f7707ce.exe File opened (read-only) \??\Q: f7707ce.exe File opened (read-only) \??\S: f7707ce.exe File opened (read-only) \??\E: f772388.exe File opened (read-only) \??\H: f7707ce.exe File opened (read-only) \??\K: f7707ce.exe File opened (read-only) \??\L: f7707ce.exe File opened (read-only) \??\N: f7707ce.exe File opened (read-only) \??\P: f7707ce.exe File opened (read-only) \??\O: f7707ce.exe File opened (read-only) \??\R: f7707ce.exe File opened (read-only) \??\T: f7707ce.exe File opened (read-only) \??\G: f772388.exe File opened (read-only) \??\G: f7707ce.exe File opened (read-only) \??\M: f7707ce.exe -
resource yara_rule behavioral1/memory/2704-16-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2704-13-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2704-15-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2704-17-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2704-18-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2704-20-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2704-21-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2704-22-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2704-19-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2704-14-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2704-60-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2704-61-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2704-62-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2704-63-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2704-64-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2704-66-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2704-67-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2704-86-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2704-87-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2704-90-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2704-111-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2704-112-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2704-156-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/1728-172-0x0000000000900000-0x00000000019BA000-memory.dmp upx behavioral1/memory/1728-212-0x0000000000900000-0x00000000019BA000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\f77085a f7707ce.exe File opened for modification C:\Windows\SYSTEM.INI f7707ce.exe File created C:\Windows\f77586d f772388.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7707ce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f772388.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2704 f7707ce.exe 2704 f7707ce.exe 1728 f772388.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 2704 f7707ce.exe Token: SeDebugPrivilege 2704 f7707ce.exe Token: SeDebugPrivilege 2704 f7707ce.exe Token: SeDebugPrivilege 2704 f7707ce.exe Token: SeDebugPrivilege 2704 f7707ce.exe Token: SeDebugPrivilege 2704 f7707ce.exe Token: SeDebugPrivilege 2704 f7707ce.exe Token: SeDebugPrivilege 2704 f7707ce.exe Token: SeDebugPrivilege 2704 f7707ce.exe Token: SeDebugPrivilege 2704 f7707ce.exe Token: SeDebugPrivilege 2704 f7707ce.exe Token: SeDebugPrivilege 2704 f7707ce.exe Token: SeDebugPrivilege 2704 f7707ce.exe Token: SeDebugPrivilege 2704 f7707ce.exe Token: SeDebugPrivilege 2704 f7707ce.exe Token: SeDebugPrivilege 2704 f7707ce.exe Token: SeDebugPrivilege 2704 f7707ce.exe Token: SeDebugPrivilege 2704 f7707ce.exe Token: SeDebugPrivilege 2704 f7707ce.exe Token: SeDebugPrivilege 2704 f7707ce.exe Token: SeDebugPrivilege 2704 f7707ce.exe Token: SeDebugPrivilege 2704 f7707ce.exe Token: SeDebugPrivilege 2704 f7707ce.exe Token: SeDebugPrivilege 1728 f772388.exe Token: SeDebugPrivilege 1728 f772388.exe Token: SeDebugPrivilege 1728 f772388.exe Token: SeDebugPrivilege 1728 f772388.exe Token: SeDebugPrivilege 1728 f772388.exe Token: SeDebugPrivilege 1728 f772388.exe Token: SeDebugPrivilege 1728 f772388.exe Token: SeDebugPrivilege 1728 f772388.exe Token: SeDebugPrivilege 1728 f772388.exe Token: SeDebugPrivilege 1728 f772388.exe Token: SeDebugPrivilege 1728 f772388.exe Token: SeDebugPrivilege 1728 f772388.exe Token: SeDebugPrivilege 1728 f772388.exe Token: SeDebugPrivilege 1728 f772388.exe Token: SeDebugPrivilege 1728 f772388.exe Token: SeDebugPrivilege 1728 f772388.exe Token: SeDebugPrivilege 1728 f772388.exe Token: SeDebugPrivilege 1728 f772388.exe Token: SeDebugPrivilege 1728 f772388.exe Token: SeDebugPrivilege 1728 f772388.exe Token: SeDebugPrivilege 1728 f772388.exe Token: SeDebugPrivilege 1728 f772388.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1504 wrote to memory of 2404 1504 rundll32.exe 30 PID 1504 wrote to memory of 2404 1504 rundll32.exe 30 PID 1504 wrote to memory of 2404 1504 rundll32.exe 30 PID 1504 wrote to memory of 2404 1504 rundll32.exe 30 PID 1504 wrote to memory of 2404 1504 rundll32.exe 30 PID 1504 wrote to memory of 2404 1504 rundll32.exe 30 PID 1504 wrote to memory of 2404 1504 rundll32.exe 30 PID 2404 wrote to memory of 2704 2404 rundll32.exe 31 PID 2404 wrote to memory of 2704 2404 rundll32.exe 31 PID 2404 wrote to memory of 2704 2404 rundll32.exe 31 PID 2404 wrote to memory of 2704 2404 rundll32.exe 31 PID 2704 wrote to memory of 1104 2704 f7707ce.exe 19 PID 2704 wrote to memory of 1160 2704 f7707ce.exe 20 PID 2704 wrote to memory of 1184 2704 f7707ce.exe 21 PID 2704 wrote to memory of 1520 2704 f7707ce.exe 25 PID 2704 wrote to memory of 1504 2704 f7707ce.exe 29 PID 2704 wrote to memory of 2404 2704 f7707ce.exe 30 PID 2704 wrote to memory of 2404 2704 f7707ce.exe 30 PID 2404 wrote to memory of 2632 2404 rundll32.exe 32 PID 2404 wrote to memory of 2632 2404 rundll32.exe 32 PID 2404 wrote to memory of 2632 2404 rundll32.exe 32 PID 2404 wrote to memory of 2632 2404 rundll32.exe 32 PID 2404 wrote to memory of 1728 2404 rundll32.exe 33 PID 2404 wrote to memory of 1728 2404 rundll32.exe 33 PID 2404 wrote to memory of 1728 2404 rundll32.exe 33 PID 2404 wrote to memory of 1728 2404 rundll32.exe 33 PID 2704 wrote to memory of 1104 2704 f7707ce.exe 19 PID 2704 wrote to memory of 1160 2704 f7707ce.exe 20 PID 2704 wrote to memory of 1184 2704 f7707ce.exe 21 PID 2704 wrote to memory of 1520 2704 f7707ce.exe 25 PID 2704 wrote to memory of 2632 2704 f7707ce.exe 32 PID 2704 wrote to memory of 2632 2704 f7707ce.exe 32 PID 2704 wrote to memory of 1728 2704 f7707ce.exe 33 PID 2704 wrote to memory of 1728 2704 f7707ce.exe 33 PID 1728 wrote to memory of 1104 1728 f772388.exe 19 PID 1728 wrote to memory of 1160 1728 f772388.exe 20 PID 1728 wrote to memory of 1184 1728 f772388.exe 21 PID 1728 wrote to memory of 1520 1728 f772388.exe 25 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7707ce.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f772388.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1104
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1160
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e089f803a0c4e085b25e73d57ed46244268ad1fb250ef22f546043db69e6eebf.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e089f803a0c4e085b25e73d57ed46244268ad1fb250ef22f546043db69e6eebf.dll,#13⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\f7707ce.exeC:\Users\Admin\AppData\Local\Temp\f7707ce.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2704
-
-
C:\Users\Admin\AppData\Local\Temp\f770973.exeC:\Users\Admin\AppData\Local\Temp\f770973.exe4⤵
- Executes dropped EXE
PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\f772388.exeC:\Users\Admin\AppData\Local\Temp\f772388.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1728
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1520
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD543b7f9aebf9f15b46eb4517e106e0af6
SHA19cc1338f2f7e07e34427345940fd6385c16bac13
SHA256cae3f95e863dfeba2df3d9b99fa54a3116e33afcffd04708718de0eed7dc1634
SHA5121fc89dfe8215b3031d843f2d5dd5318eb161d4f2bf685fb5b3fe7fe21d7f91cb9d25df054accabde63dd5f10800bd21aca679e6076bfbda9bd61924e8c8c4bd5
-
Filesize
97KB
MD5a2b8825f95e3a5b3171cd84b367669fc
SHA1014e9a89d60fb3bb919f8c29f99f5345dc4de260
SHA256a70aa6aaa27b3a3657e5fc570c79b90af6d4d3437bc4e22e497074a323d35261
SHA512216ef9d975022a0a9fbeea4ceb45f61bb8a233686560a63ff5e32dda7609b4d5bac55ad57f572773c4b9573aa94eaab6adaee38afbac347feeafbf087b3139a7