Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 04:00
Static task
static1
Behavioral task
behavioral1
Sample
e089f803a0c4e085b25e73d57ed46244268ad1fb250ef22f546043db69e6eebf.dll
Resource
win7-20240903-en
General
-
Target
e089f803a0c4e085b25e73d57ed46244268ad1fb250ef22f546043db69e6eebf.dll
-
Size
120KB
-
MD5
36ef8d9f850799f6681b1b0f36d77b14
-
SHA1
9d63f151db59043bd89e9ccbdf486360bed57f54
-
SHA256
e089f803a0c4e085b25e73d57ed46244268ad1fb250ef22f546043db69e6eebf
-
SHA512
bf9de43a58afefc44d235c463887984b7cf168e3c986675eaf9ecb4e9ee7d9062b4ae8180f264e38e893a6a5ae421f90c25eed7f6cfca22f2f4f6b2b8db94a41
-
SSDEEP
3072:6jK8wjj91Rl/jBw79cA5A8q9kuP9jI4tQ:6Ozzb/twRcA5B2kuiL
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f770609.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76e9b3.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76e9b3.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76e9b3.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f770609.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f770609.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76e9b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f770609.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76e9b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76e9b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f770609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76e9b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76e9b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76e9b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76e9b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f770609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f770609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f770609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f770609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f770609.exe -
Executes dropped EXE 3 IoCs
pid Process 1532 f76e9b3.exe 2896 f76eba6.exe 2300 f770609.exe -
Loads dropped DLL 6 IoCs
pid Process 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f770609.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f770609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76e9b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76e9b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76e9b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76e9b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f770609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f770609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f770609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f770609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f770609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76e9b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76e9b3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76e9b3.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76e9b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f770609.exe -
Enumerates connected drives 3 TTPs 16 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: f76e9b3.exe File opened (read-only) \??\I: f76e9b3.exe File opened (read-only) \??\K: f76e9b3.exe File opened (read-only) \??\L: f76e9b3.exe File opened (read-only) \??\Q: f76e9b3.exe File opened (read-only) \??\E: f76e9b3.exe File opened (read-only) \??\J: f76e9b3.exe File opened (read-only) \??\O: f76e9b3.exe File opened (read-only) \??\P: f76e9b3.exe File opened (read-only) \??\S: f76e9b3.exe File opened (read-only) \??\G: f76e9b3.exe File opened (read-only) \??\N: f76e9b3.exe File opened (read-only) \??\R: f76e9b3.exe File opened (read-only) \??\M: f76e9b3.exe File opened (read-only) \??\E: f770609.exe File opened (read-only) \??\G: f770609.exe -
resource yara_rule behavioral1/memory/1532-13-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1532-11-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1532-16-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1532-17-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1532-14-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1532-39-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1532-15-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1532-36-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1532-38-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1532-35-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1532-40-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1532-60-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1532-61-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1532-62-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1532-63-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1532-64-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1532-66-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1532-67-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1532-83-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1532-85-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1532-87-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1532-108-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1532-156-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/2300-164-0x0000000000920000-0x00000000019DA000-memory.dmp upx behavioral1/memory/2300-213-0x0000000000920000-0x00000000019DA000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\f76ea30 f76e9b3.exe File opened for modification C:\Windows\SYSTEM.INI f76e9b3.exe File created C:\Windows\f773b7a f770609.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76e9b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f770609.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1532 f76e9b3.exe 1532 f76e9b3.exe 2300 f770609.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeDebugPrivilege 1532 f76e9b3.exe Token: SeDebugPrivilege 1532 f76e9b3.exe Token: SeDebugPrivilege 1532 f76e9b3.exe Token: SeDebugPrivilege 1532 f76e9b3.exe Token: SeDebugPrivilege 1532 f76e9b3.exe Token: SeDebugPrivilege 1532 f76e9b3.exe Token: SeDebugPrivilege 1532 f76e9b3.exe Token: SeDebugPrivilege 1532 f76e9b3.exe Token: SeDebugPrivilege 1532 f76e9b3.exe Token: SeDebugPrivilege 1532 f76e9b3.exe Token: SeDebugPrivilege 1532 f76e9b3.exe Token: SeDebugPrivilege 1532 f76e9b3.exe Token: SeDebugPrivilege 1532 f76e9b3.exe Token: SeDebugPrivilege 1532 f76e9b3.exe Token: SeDebugPrivilege 1532 f76e9b3.exe Token: SeDebugPrivilege 1532 f76e9b3.exe Token: SeDebugPrivilege 1532 f76e9b3.exe Token: SeDebugPrivilege 1532 f76e9b3.exe Token: SeDebugPrivilege 1532 f76e9b3.exe Token: SeDebugPrivilege 1532 f76e9b3.exe Token: SeDebugPrivilege 1532 f76e9b3.exe Token: SeDebugPrivilege 1532 f76e9b3.exe Token: SeDebugPrivilege 1532 f76e9b3.exe Token: SeDebugPrivilege 1532 f76e9b3.exe Token: SeDebugPrivilege 2300 f770609.exe Token: SeDebugPrivilege 2300 f770609.exe Token: SeDebugPrivilege 2300 f770609.exe Token: SeDebugPrivilege 2300 f770609.exe Token: SeDebugPrivilege 2300 f770609.exe Token: SeDebugPrivilege 2300 f770609.exe Token: SeDebugPrivilege 2300 f770609.exe Token: SeDebugPrivilege 2300 f770609.exe Token: SeDebugPrivilege 2300 f770609.exe Token: SeDebugPrivilege 2300 f770609.exe Token: SeDebugPrivilege 2300 f770609.exe Token: SeDebugPrivilege 2300 f770609.exe Token: SeDebugPrivilege 2300 f770609.exe Token: SeDebugPrivilege 2300 f770609.exe Token: SeDebugPrivilege 2300 f770609.exe Token: SeDebugPrivilege 2300 f770609.exe Token: SeDebugPrivilege 2300 f770609.exe Token: SeDebugPrivilege 2300 f770609.exe Token: SeDebugPrivilege 2300 f770609.exe Token: SeDebugPrivilege 2300 f770609.exe Token: SeDebugPrivilege 2300 f770609.exe Token: SeDebugPrivilege 2300 f770609.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1780 wrote to memory of 2188 1780 rundll32.exe 31 PID 1780 wrote to memory of 2188 1780 rundll32.exe 31 PID 1780 wrote to memory of 2188 1780 rundll32.exe 31 PID 1780 wrote to memory of 2188 1780 rundll32.exe 31 PID 1780 wrote to memory of 2188 1780 rundll32.exe 31 PID 1780 wrote to memory of 2188 1780 rundll32.exe 31 PID 1780 wrote to memory of 2188 1780 rundll32.exe 31 PID 2188 wrote to memory of 1532 2188 rundll32.exe 32 PID 2188 wrote to memory of 1532 2188 rundll32.exe 32 PID 2188 wrote to memory of 1532 2188 rundll32.exe 32 PID 2188 wrote to memory of 1532 2188 rundll32.exe 32 PID 1532 wrote to memory of 1116 1532 f76e9b3.exe 19 PID 1532 wrote to memory of 1160 1532 f76e9b3.exe 20 PID 1532 wrote to memory of 1208 1532 f76e9b3.exe 21 PID 1532 wrote to memory of 2040 1532 f76e9b3.exe 23 PID 1532 wrote to memory of 1780 1532 f76e9b3.exe 30 PID 1532 wrote to memory of 2188 1532 f76e9b3.exe 31 PID 1532 wrote to memory of 2188 1532 f76e9b3.exe 31 PID 2188 wrote to memory of 2896 2188 rundll32.exe 33 PID 2188 wrote to memory of 2896 2188 rundll32.exe 33 PID 2188 wrote to memory of 2896 2188 rundll32.exe 33 PID 2188 wrote to memory of 2896 2188 rundll32.exe 33 PID 2188 wrote to memory of 2300 2188 rundll32.exe 34 PID 2188 wrote to memory of 2300 2188 rundll32.exe 34 PID 2188 wrote to memory of 2300 2188 rundll32.exe 34 PID 2188 wrote to memory of 2300 2188 rundll32.exe 34 PID 1532 wrote to memory of 1116 1532 f76e9b3.exe 19 PID 1532 wrote to memory of 1160 1532 f76e9b3.exe 20 PID 1532 wrote to memory of 1208 1532 f76e9b3.exe 21 PID 1532 wrote to memory of 2040 1532 f76e9b3.exe 23 PID 1532 wrote to memory of 2896 1532 f76e9b3.exe 33 PID 1532 wrote to memory of 2896 1532 f76e9b3.exe 33 PID 1532 wrote to memory of 2300 1532 f76e9b3.exe 34 PID 1532 wrote to memory of 2300 1532 f76e9b3.exe 34 PID 2300 wrote to memory of 1116 2300 f770609.exe 19 PID 2300 wrote to memory of 1160 2300 f770609.exe 20 PID 2300 wrote to memory of 1208 2300 f770609.exe 21 PID 2300 wrote to memory of 2040 2300 f770609.exe 23 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f770609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76e9b3.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1160
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e089f803a0c4e085b25e73d57ed46244268ad1fb250ef22f546043db69e6eebf.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e089f803a0c4e085b25e73d57ed46244268ad1fb250ef22f546043db69e6eebf.dll,#13⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\f76e9b3.exeC:\Users\Admin\AppData\Local\Temp\f76e9b3.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1532
-
-
C:\Users\Admin\AppData\Local\Temp\f76eba6.exeC:\Users\Admin\AppData\Local\Temp\f76eba6.exe4⤵
- Executes dropped EXE
PID:2896
-
-
C:\Users\Admin\AppData\Local\Temp\f770609.exeC:\Users\Admin\AppData\Local\Temp\f770609.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2300
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2040
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD55af2c9c4c26864108fb16e001e7b961b
SHA16fbf2044de4ecaebfeb9d7142c2709e1813bb033
SHA2562b50de50fc4601b197f8ba6e66aefd88b83c77279a64f7c2fb9fcaf7141a96f6
SHA5122893ecca69329afd68e4dc6d2776d4451deb320865fe67e1454765ac962917bda098a18c6fca10428b45e49f0e4a46882c493089fdeab75f8d23ea29f378c090
-
Filesize
97KB
MD5a2b8825f95e3a5b3171cd84b367669fc
SHA1014e9a89d60fb3bb919f8c29f99f5345dc4de260
SHA256a70aa6aaa27b3a3657e5fc570c79b90af6d4d3437bc4e22e497074a323d35261
SHA512216ef9d975022a0a9fbeea4ceb45f61bb8a233686560a63ff5e32dda7609b4d5bac55ad57f572773c4b9573aa94eaab6adaee38afbac347feeafbf087b3139a7