Analysis
-
max time kernel
28s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 06:19
Static task
static1
Behavioral task
behavioral1
Sample
3361fd892cf06af1e3637de2ce648e4e16b63e9dfe0a09c7a7e662f7cd16a451N.dll
Resource
win7-20240729-en
General
-
Target
3361fd892cf06af1e3637de2ce648e4e16b63e9dfe0a09c7a7e662f7cd16a451N.dll
-
Size
120KB
-
MD5
fe6bbb5f85656ad1950ebb48f8741850
-
SHA1
5f3cb0db6bfe7540619529dd6d5a46196f17fe60
-
SHA256
3361fd892cf06af1e3637de2ce648e4e16b63e9dfe0a09c7a7e662f7cd16a451
-
SHA512
63277cd3d889458646ad7d493a1fb93dcb68c5f102a47c4116ec629761c2cde25c7fcc1148148b1de6558110b21fc715b510594339f0efa3ee97770122225853
-
SSDEEP
1536:vZDGkT7gCWeMEr+T/cH5FayktsSv3P9RydafYcqq2MrokM6a846eLGqDOM:JGkRPMESbwFDSX9oMfYnkrXeyqDOM
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f77e4a4.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f77e4a4.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f77e4a4.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f77e659.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f77e659.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f77e659.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f77e4a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f77e659.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f77e4a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f77e659.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f77e659.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f77e659.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f77e659.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f77e659.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f77e659.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f77e4a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f77e4a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f77e4a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f77e4a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f77e4a4.exe -
Executes dropped EXE 3 IoCs
pid Process 2432 f77e4a4.exe 2716 f77e659.exe 1700 f7802fd.exe -
Loads dropped DLL 6 IoCs
pid Process 2340 rundll32.exe 2340 rundll32.exe 2340 rundll32.exe 2340 rundll32.exe 2340 rundll32.exe 2340 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f77e4a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f77e4a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f77e4a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f77e659.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f77e659.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f77e4a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f77e659.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f77e659.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f77e659.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f77e4a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f77e659.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f77e659.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f77e4a4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f77e4a4.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f77e4a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f77e659.exe -
Enumerates connected drives 3 TTPs 15 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: f77e4a4.exe File opened (read-only) \??\T: f77e4a4.exe File opened (read-only) \??\I: f77e4a4.exe File opened (read-only) \??\P: f77e4a4.exe File opened (read-only) \??\R: f77e4a4.exe File opened (read-only) \??\E: f77e4a4.exe File opened (read-only) \??\G: f77e4a4.exe File opened (read-only) \??\H: f77e4a4.exe File opened (read-only) \??\K: f77e4a4.exe File opened (read-only) \??\S: f77e4a4.exe File opened (read-only) \??\J: f77e4a4.exe File opened (read-only) \??\L: f77e4a4.exe File opened (read-only) \??\N: f77e4a4.exe File opened (read-only) \??\O: f77e4a4.exe File opened (read-only) \??\Q: f77e4a4.exe -
resource yara_rule behavioral1/memory/2432-20-0x0000000000660000-0x000000000171A000-memory.dmp upx behavioral1/memory/2432-17-0x0000000000660000-0x000000000171A000-memory.dmp upx behavioral1/memory/2432-16-0x0000000000660000-0x000000000171A000-memory.dmp upx behavioral1/memory/2432-24-0x0000000000660000-0x000000000171A000-memory.dmp upx behavioral1/memory/2432-14-0x0000000000660000-0x000000000171A000-memory.dmp upx behavioral1/memory/2432-23-0x0000000000660000-0x000000000171A000-memory.dmp upx behavioral1/memory/2432-22-0x0000000000660000-0x000000000171A000-memory.dmp upx behavioral1/memory/2432-21-0x0000000000660000-0x000000000171A000-memory.dmp upx behavioral1/memory/2432-18-0x0000000000660000-0x000000000171A000-memory.dmp upx behavioral1/memory/2432-25-0x0000000000660000-0x000000000171A000-memory.dmp upx behavioral1/memory/2432-60-0x0000000000660000-0x000000000171A000-memory.dmp upx behavioral1/memory/2432-66-0x0000000000660000-0x000000000171A000-memory.dmp upx behavioral1/memory/2432-61-0x0000000000660000-0x000000000171A000-memory.dmp upx behavioral1/memory/2432-67-0x0000000000660000-0x000000000171A000-memory.dmp upx behavioral1/memory/2432-68-0x0000000000660000-0x000000000171A000-memory.dmp upx behavioral1/memory/2432-71-0x0000000000660000-0x000000000171A000-memory.dmp upx behavioral1/memory/2432-72-0x0000000000660000-0x000000000171A000-memory.dmp upx behavioral1/memory/2432-73-0x0000000000660000-0x000000000171A000-memory.dmp upx behavioral1/memory/2432-74-0x0000000000660000-0x000000000171A000-memory.dmp upx behavioral1/memory/2432-88-0x0000000000660000-0x000000000171A000-memory.dmp upx behavioral1/memory/2432-90-0x0000000000660000-0x000000000171A000-memory.dmp upx behavioral1/memory/2432-154-0x0000000000660000-0x000000000171A000-memory.dmp upx behavioral1/memory/2716-176-0x0000000000970000-0x0000000001A2A000-memory.dmp upx behavioral1/memory/2716-190-0x0000000000970000-0x0000000001A2A000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\f783514 f77e659.exe File created C:\Windows\f77e4f2 f77e4a4.exe File opened for modification C:\Windows\SYSTEM.INI f77e4a4.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f77e4a4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f77e659.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2432 f77e4a4.exe 2432 f77e4a4.exe 2716 f77e659.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeDebugPrivilege 2432 f77e4a4.exe Token: SeDebugPrivilege 2432 f77e4a4.exe Token: SeDebugPrivilege 2432 f77e4a4.exe Token: SeDebugPrivilege 2432 f77e4a4.exe Token: SeDebugPrivilege 2432 f77e4a4.exe Token: SeDebugPrivilege 2432 f77e4a4.exe Token: SeDebugPrivilege 2432 f77e4a4.exe Token: SeDebugPrivilege 2432 f77e4a4.exe Token: SeDebugPrivilege 2432 f77e4a4.exe Token: SeDebugPrivilege 2432 f77e4a4.exe Token: SeDebugPrivilege 2432 f77e4a4.exe Token: SeDebugPrivilege 2432 f77e4a4.exe Token: SeDebugPrivilege 2432 f77e4a4.exe Token: SeDebugPrivilege 2432 f77e4a4.exe Token: SeDebugPrivilege 2432 f77e4a4.exe Token: SeDebugPrivilege 2432 f77e4a4.exe Token: SeDebugPrivilege 2432 f77e4a4.exe Token: SeDebugPrivilege 2432 f77e4a4.exe Token: SeDebugPrivilege 2432 f77e4a4.exe Token: SeDebugPrivilege 2432 f77e4a4.exe Token: SeDebugPrivilege 2716 f77e659.exe Token: SeDebugPrivilege 2716 f77e659.exe Token: SeDebugPrivilege 2716 f77e659.exe Token: SeDebugPrivilege 2716 f77e659.exe Token: SeDebugPrivilege 2716 f77e659.exe Token: SeDebugPrivilege 2716 f77e659.exe Token: SeDebugPrivilege 2716 f77e659.exe Token: SeDebugPrivilege 2716 f77e659.exe Token: SeDebugPrivilege 2716 f77e659.exe Token: SeDebugPrivilege 2716 f77e659.exe Token: SeDebugPrivilege 2716 f77e659.exe Token: SeDebugPrivilege 2716 f77e659.exe Token: SeDebugPrivilege 2716 f77e659.exe Token: SeDebugPrivilege 2716 f77e659.exe Token: SeDebugPrivilege 2716 f77e659.exe Token: SeDebugPrivilege 2716 f77e659.exe Token: SeDebugPrivilege 2716 f77e659.exe Token: SeDebugPrivilege 2716 f77e659.exe Token: SeDebugPrivilege 2716 f77e659.exe Token: SeDebugPrivilege 2716 f77e659.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2340 1820 rundll32.exe 28 PID 1820 wrote to memory of 2340 1820 rundll32.exe 28 PID 1820 wrote to memory of 2340 1820 rundll32.exe 28 PID 1820 wrote to memory of 2340 1820 rundll32.exe 28 PID 1820 wrote to memory of 2340 1820 rundll32.exe 28 PID 1820 wrote to memory of 2340 1820 rundll32.exe 28 PID 1820 wrote to memory of 2340 1820 rundll32.exe 28 PID 2340 wrote to memory of 2432 2340 rundll32.exe 29 PID 2340 wrote to memory of 2432 2340 rundll32.exe 29 PID 2340 wrote to memory of 2432 2340 rundll32.exe 29 PID 2340 wrote to memory of 2432 2340 rundll32.exe 29 PID 2432 wrote to memory of 1116 2432 f77e4a4.exe 18 PID 2432 wrote to memory of 1168 2432 f77e4a4.exe 19 PID 2432 wrote to memory of 1196 2432 f77e4a4.exe 20 PID 2432 wrote to memory of 1192 2432 f77e4a4.exe 22 PID 2432 wrote to memory of 1820 2432 f77e4a4.exe 27 PID 2432 wrote to memory of 2340 2432 f77e4a4.exe 28 PID 2432 wrote to memory of 2340 2432 f77e4a4.exe 28 PID 2340 wrote to memory of 2716 2340 rundll32.exe 30 PID 2340 wrote to memory of 2716 2340 rundll32.exe 30 PID 2340 wrote to memory of 2716 2340 rundll32.exe 30 PID 2340 wrote to memory of 2716 2340 rundll32.exe 30 PID 2340 wrote to memory of 1700 2340 rundll32.exe 31 PID 2340 wrote to memory of 1700 2340 rundll32.exe 31 PID 2340 wrote to memory of 1700 2340 rundll32.exe 31 PID 2340 wrote to memory of 1700 2340 rundll32.exe 31 PID 2432 wrote to memory of 1116 2432 f77e4a4.exe 18 PID 2432 wrote to memory of 1168 2432 f77e4a4.exe 19 PID 2432 wrote to memory of 1196 2432 f77e4a4.exe 20 PID 2432 wrote to memory of 1192 2432 f77e4a4.exe 22 PID 2432 wrote to memory of 2716 2432 f77e4a4.exe 30 PID 2432 wrote to memory of 2716 2432 f77e4a4.exe 30 PID 2432 wrote to memory of 1700 2432 f77e4a4.exe 31 PID 2432 wrote to memory of 1700 2432 f77e4a4.exe 31 PID 2716 wrote to memory of 1116 2716 f77e659.exe 18 PID 2716 wrote to memory of 1168 2716 f77e659.exe 19 PID 2716 wrote to memory of 1196 2716 f77e659.exe 20 PID 2716 wrote to memory of 1192 2716 f77e659.exe 22 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f77e4a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f77e659.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3361fd892cf06af1e3637de2ce648e4e16b63e9dfe0a09c7a7e662f7cd16a451N.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3361fd892cf06af1e3637de2ce648e4e16b63e9dfe0a09c7a7e662f7cd16a451N.dll,#13⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\f77e4a4.exeC:\Users\Admin\AppData\Local\Temp\f77e4a4.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2432
-
-
C:\Users\Admin\AppData\Local\Temp\f77e659.exeC:\Users\Admin\AppData\Local\Temp\f77e659.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2716
-
-
C:\Users\Admin\AppData\Local\Temp\f7802fd.exeC:\Users\Admin\AppData\Local\Temp\f7802fd.exe4⤵
- Executes dropped EXE
PID:1700
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1192
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD52a85a203fca00ebdeb1de642343ac07d
SHA10eb02c9c8bcbda47a3d0821f712ce8058de5fbe8
SHA25673c71cc3c15666c91d686a226ebb63bdc48b46817a98c0246e446ae2135692ef
SHA512e59516d749c64f58f641d86d59de3444d35ebed7e3a60b7d60231513612b2c1a1838efd60510e54d9cd4c82e25ee3ea868e5de08a1a54dba5ac35572ed04879f
-
Filesize
97KB
MD57d07645cd46cc95b1014dd4d72e5668f
SHA14c72570bda19d4b3262b6f2ed0b77403fea7b435
SHA2568beccb3927f6c97abc29599c32e57014f30d6efdc5f5903f53b7a39126dc4708
SHA512ffec58a2029a0dc11f6c8e26f0db81fcd5df027902aad6a891ad0355c774b721807ccbf70825a00289110b2018c6468793e1cf21ed9dc07a5242d63a301d490f