Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 07:28
Static task
static1
Behavioral task
behavioral1
Sample
9ac52c0e2f3f2cb522378d6bdd1bce7b80bc1997794f14c2a74fe0604b3a169eN.dll
Resource
win7-20241023-en
General
-
Target
9ac52c0e2f3f2cb522378d6bdd1bce7b80bc1997794f14c2a74fe0604b3a169eN.dll
-
Size
120KB
-
MD5
429f6990aea3ac2049b5f28b22ba93b0
-
SHA1
12617c4b7b0b8a85348f0a6aaf2a2263a75c0a3c
-
SHA256
9ac52c0e2f3f2cb522378d6bdd1bce7b80bc1997794f14c2a74fe0604b3a169e
-
SHA512
72a59d460d8c44326ce1d3edfc35b964ce2434aa6a11182976e3c4ff81d271732e25a18b91615403ab40d9a0b1dc3494ae30cd26e587e22d5ee380f5a7798621
-
SSDEEP
3072:xL1WiK8Bhv5dZ59lZNJ2/pLyanOJo7SA:vWczv5LqBbn
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76b193.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76b348.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76b348.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76b348.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76b193.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76b193.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76b193.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76b348.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76b193.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76b193.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76b193.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76b193.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76b348.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76b348.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76b348.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76b193.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76b193.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76b348.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76b348.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76b348.exe -
Executes dropped EXE 3 IoCs
pid Process 2560 f76b193.exe 2776 f76b348.exe 2692 f76cd4d.exe -
Loads dropped DLL 6 IoCs
pid Process 1028 rundll32.exe 1028 rundll32.exe 1028 rundll32.exe 1028 rundll32.exe 1028 rundll32.exe 1028 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76b193.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76b348.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76b193.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76b193.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76b193.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76b348.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76b193.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76b193.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76b193.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76b348.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76b348.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76b348.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76b348.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76b348.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76b193.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76b348.exe -
Enumerates connected drives 3 TTPs 15 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: f76b193.exe File opened (read-only) \??\N: f76b193.exe File opened (read-only) \??\O: f76b193.exe File opened (read-only) \??\Q: f76b193.exe File opened (read-only) \??\R: f76b193.exe File opened (read-only) \??\S: f76b193.exe File opened (read-only) \??\T: f76b193.exe File opened (read-only) \??\G: f76b193.exe File opened (read-only) \??\M: f76b193.exe File opened (read-only) \??\P: f76b193.exe File opened (read-only) \??\E: f76b193.exe File opened (read-only) \??\I: f76b193.exe File opened (read-only) \??\J: f76b193.exe File opened (read-only) \??\K: f76b193.exe File opened (read-only) \??\L: f76b193.exe -
resource yara_rule behavioral1/memory/2560-22-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2560-19-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2560-18-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2560-17-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2560-15-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2560-13-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2560-21-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2560-20-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2560-16-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2560-14-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2560-62-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2560-63-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2560-64-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2560-65-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2560-66-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2560-68-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2560-69-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2560-84-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2560-87-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2560-89-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2560-107-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2560-152-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2776-177-0x0000000000970000-0x0000000001A2A000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\f7701b6 f76b348.exe File created C:\Windows\f76b1f1 f76b193.exe File opened for modification C:\Windows\SYSTEM.INI f76b193.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76b348.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76b193.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2560 f76b193.exe 2560 f76b193.exe 2776 f76b348.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 2560 f76b193.exe Token: SeDebugPrivilege 2560 f76b193.exe Token: SeDebugPrivilege 2560 f76b193.exe Token: SeDebugPrivilege 2560 f76b193.exe Token: SeDebugPrivilege 2560 f76b193.exe Token: SeDebugPrivilege 2560 f76b193.exe Token: SeDebugPrivilege 2560 f76b193.exe Token: SeDebugPrivilege 2560 f76b193.exe Token: SeDebugPrivilege 2560 f76b193.exe Token: SeDebugPrivilege 2560 f76b193.exe Token: SeDebugPrivilege 2560 f76b193.exe Token: SeDebugPrivilege 2560 f76b193.exe Token: SeDebugPrivilege 2560 f76b193.exe Token: SeDebugPrivilege 2560 f76b193.exe Token: SeDebugPrivilege 2560 f76b193.exe Token: SeDebugPrivilege 2560 f76b193.exe Token: SeDebugPrivilege 2560 f76b193.exe Token: SeDebugPrivilege 2560 f76b193.exe Token: SeDebugPrivilege 2560 f76b193.exe Token: SeDebugPrivilege 2560 f76b193.exe Token: SeDebugPrivilege 2560 f76b193.exe Token: SeDebugPrivilege 2560 f76b193.exe Token: SeDebugPrivilege 2560 f76b193.exe Token: SeDebugPrivilege 2560 f76b193.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2092 wrote to memory of 1028 2092 rundll32.exe 30 PID 2092 wrote to memory of 1028 2092 rundll32.exe 30 PID 2092 wrote to memory of 1028 2092 rundll32.exe 30 PID 2092 wrote to memory of 1028 2092 rundll32.exe 30 PID 2092 wrote to memory of 1028 2092 rundll32.exe 30 PID 2092 wrote to memory of 1028 2092 rundll32.exe 30 PID 2092 wrote to memory of 1028 2092 rundll32.exe 30 PID 1028 wrote to memory of 2560 1028 rundll32.exe 31 PID 1028 wrote to memory of 2560 1028 rundll32.exe 31 PID 1028 wrote to memory of 2560 1028 rundll32.exe 31 PID 1028 wrote to memory of 2560 1028 rundll32.exe 31 PID 2560 wrote to memory of 1100 2560 f76b193.exe 19 PID 2560 wrote to memory of 1160 2560 f76b193.exe 20 PID 2560 wrote to memory of 1196 2560 f76b193.exe 21 PID 2560 wrote to memory of 1208 2560 f76b193.exe 23 PID 2560 wrote to memory of 2092 2560 f76b193.exe 29 PID 2560 wrote to memory of 1028 2560 f76b193.exe 30 PID 2560 wrote to memory of 1028 2560 f76b193.exe 30 PID 1028 wrote to memory of 2776 1028 rundll32.exe 32 PID 1028 wrote to memory of 2776 1028 rundll32.exe 32 PID 1028 wrote to memory of 2776 1028 rundll32.exe 32 PID 1028 wrote to memory of 2776 1028 rundll32.exe 32 PID 1028 wrote to memory of 2692 1028 rundll32.exe 34 PID 1028 wrote to memory of 2692 1028 rundll32.exe 34 PID 1028 wrote to memory of 2692 1028 rundll32.exe 34 PID 1028 wrote to memory of 2692 1028 rundll32.exe 34 PID 2560 wrote to memory of 1100 2560 f76b193.exe 19 PID 2560 wrote to memory of 1160 2560 f76b193.exe 20 PID 2560 wrote to memory of 1196 2560 f76b193.exe 21 PID 2560 wrote to memory of 1208 2560 f76b193.exe 23 PID 2560 wrote to memory of 2776 2560 f76b193.exe 32 PID 2560 wrote to memory of 2776 2560 f76b193.exe 32 PID 2560 wrote to memory of 2692 2560 f76b193.exe 34 PID 2560 wrote to memory of 2692 2560 f76b193.exe 34 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76b193.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76b348.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1100
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1160
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9ac52c0e2f3f2cb522378d6bdd1bce7b80bc1997794f14c2a74fe0604b3a169eN.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9ac52c0e2f3f2cb522378d6bdd1bce7b80bc1997794f14c2a74fe0604b3a169eN.dll,#13⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\f76b193.exeC:\Users\Admin\AppData\Local\Temp\f76b193.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\f76b348.exeC:\Users\Admin\AppData\Local\Temp\f76b348.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:2776
-
-
C:\Users\Admin\AppData\Local\Temp\f76cd4d.exeC:\Users\Admin\AppData\Local\Temp\f76cd4d.exe4⤵
- Executes dropped EXE
PID:2692
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1208
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD50db24aaf44d4a519be66e7ca14ddd26c
SHA171a439a13893ea1ea135611396bf8feb6cbcd473
SHA25642ac727db5ee4bf251f3137ccab43870b3b15478dcdc3bdee4b2a26662e225cc
SHA512d300e6e66c6a063072393c9e0b7e1928d8a5064363106f5949c0a9b2648b3cbb051235193c39f2ac9cc7cc5d3c06ef4510ed23fdc8c99ff322afaab7d4756db3
-
Filesize
97KB
MD5882b66215632bf9fc1c872bbfae5378c
SHA16b31efe410eb1339fe6a74f88ba0c40ecb249243
SHA256722a2312c385db0eba7f57e6424170026509dd4cf3647fddfa3490f940d71e5a
SHA512a4d07fe8a1361315c72f459073cc58912a85948e2cd289673d898b89036931934370df47e46b7957550f9bd0dc1a854cb784eda50ed6e7cb02c1a9ded0262ce9