Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 06:58
Static task
static1
Behavioral task
behavioral1
Sample
25e4e59bd0710490476036ae1e06afa9a56b3a59895f763c9aa311c984ba227dN.exe
Resource
win7-20240903-en
General
-
Target
25e4e59bd0710490476036ae1e06afa9a56b3a59895f763c9aa311c984ba227dN.exe
-
Size
83KB
-
MD5
e4e85898155af8260ac4c9864a5c4b60
-
SHA1
9d674527834dfb53002a9ee0ddf98492e11dc142
-
SHA256
25e4e59bd0710490476036ae1e06afa9a56b3a59895f763c9aa311c984ba227d
-
SHA512
b306ec0f8f5b0331e9a4ab69323153c439ac2bba00928157bd7bb4d9a2e389ed5b1650c0a3bd83e94825bdc185314d7a651922c887af1706fc26ea57085ea9e3
-
SSDEEP
1536:tPS0oVQ+T0hUeKZqsgwZkTlMwtkioLRwEhCY2xDuSpTAyGL5cHSCfd:5doVpT0OeKklJOFRj4x/pkyufCfd
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 25e4e59bd0710490476036ae1e06afa9a56b3a59895f763c9aa311c984ba227dN.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 25e4e59bd0710490476036ae1e06afa9a56b3a59895f763c9aa311c984ba227dN.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 25e4e59bd0710490476036ae1e06afa9a56b3a59895f763c9aa311c984ba227dN.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 25e4e59bd0710490476036ae1e06afa9a56b3a59895f763c9aa311c984ba227dN.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 25e4e59bd0710490476036ae1e06afa9a56b3a59895f763c9aa311c984ba227dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 25e4e59bd0710490476036ae1e06afa9a56b3a59895f763c9aa311c984ba227dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 25e4e59bd0710490476036ae1e06afa9a56b3a59895f763c9aa311c984ba227dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 25e4e59bd0710490476036ae1e06afa9a56b3a59895f763c9aa311c984ba227dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 25e4e59bd0710490476036ae1e06afa9a56b3a59895f763c9aa311c984ba227dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 25e4e59bd0710490476036ae1e06afa9a56b3a59895f763c9aa311c984ba227dN.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" 25e4e59bd0710490476036ae1e06afa9a56b3a59895f763c9aa311c984ba227dN.exe -
Disables Task Manager via registry modification
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 25e4e59bd0710490476036ae1e06afa9a56b3a59895f763c9aa311c984ba227dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 25e4e59bd0710490476036ae1e06afa9a56b3a59895f763c9aa311c984ba227dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 25e4e59bd0710490476036ae1e06afa9a56b3a59895f763c9aa311c984ba227dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 25e4e59bd0710490476036ae1e06afa9a56b3a59895f763c9aa311c984ba227dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 25e4e59bd0710490476036ae1e06afa9a56b3a59895f763c9aa311c984ba227dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 25e4e59bd0710490476036ae1e06afa9a56b3a59895f763c9aa311c984ba227dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc 25e4e59bd0710490476036ae1e06afa9a56b3a59895f763c9aa311c984ba227dN.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 25e4e59bd0710490476036ae1e06afa9a56b3a59895f763c9aa311c984ba227dN.exe -
resource yara_rule behavioral2/memory/4572-4-0x00000000022F0000-0x000000000337E000-memory.dmp upx behavioral2/memory/4572-1-0x00000000022F0000-0x000000000337E000-memory.dmp upx behavioral2/memory/4572-6-0x00000000022F0000-0x000000000337E000-memory.dmp upx behavioral2/memory/4572-3-0x00000000022F0000-0x000000000337E000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI 25e4e59bd0710490476036ae1e06afa9a56b3a59895f763c9aa311c984ba227dN.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25e4e59bd0710490476036ae1e06afa9a56b3a59895f763c9aa311c984ba227dN.exe -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 25e4e59bd0710490476036ae1e06afa9a56b3a59895f763c9aa311c984ba227dN.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\25e4e59bd0710490476036ae1e06afa9a56b3a59895f763c9aa311c984ba227dN.exe"C:\Users\Admin\AppData\Local\Temp\25e4e59bd0710490476036ae1e06afa9a56b3a59895f763c9aa311c984ba227dN.exe"1⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- System policy modification
PID:4572
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5