Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-12-2024 21:28
Static task
static1
Behavioral task
behavioral1
Sample
8e637b6a9aaf1498626cbb15b66a14dcf6c46abb48d500ff0a21fee9245eb52d.dll
Resource
win7-20240903-en
General
-
Target
8e637b6a9aaf1498626cbb15b66a14dcf6c46abb48d500ff0a21fee9245eb52d.dll
-
Size
120KB
-
MD5
182db204f6a386abacdcd9a26cda860c
-
SHA1
86a6f3baddf63a891937b370adee8359f1412fdf
-
SHA256
8e637b6a9aaf1498626cbb15b66a14dcf6c46abb48d500ff0a21fee9245eb52d
-
SHA512
fca5f2ab615dc6194cbe74e0618e8da5bee550509563a1f87ee71730ebae74cb42448e5363b4084ab8d06ae424c739ebc13c1c4f30ff45227e4ad020fe70f23e
-
SSDEEP
3072:shTeRa1aq0mP4Laf1I3pXrzYjYE3wr1JIyp:shTqOavfZbcTk1JIA
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76db90.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76db90.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76db90.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76f882.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76f882.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76f882.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76db90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76f882.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76db90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76f882.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76f882.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76f882.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76db90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76db90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76db90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76db90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76f882.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76f882.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76f882.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76db90.exe -
Executes dropped EXE 3 IoCs
pid Process 1792 f76db90.exe 2076 f76dd35.exe 2604 f76f882.exe -
Loads dropped DLL 6 IoCs
pid Process 2612 rundll32.exe 2612 rundll32.exe 2612 rundll32.exe 2612 rundll32.exe 2612 rundll32.exe 2612 rundll32.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76db90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76f882.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76f882.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76db90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76db90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76f882.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76f882.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76db90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76db90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76f882.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76f882.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76db90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76db90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76f882.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76db90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76f882.exe -
Enumerates connected drives 3 TTPs 12 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: f76db90.exe File opened (read-only) \??\G: f76db90.exe File opened (read-only) \??\K: f76db90.exe File opened (read-only) \??\M: f76db90.exe File opened (read-only) \??\N: f76db90.exe File opened (read-only) \??\H: f76db90.exe File opened (read-only) \??\I: f76db90.exe File opened (read-only) \??\J: f76db90.exe File opened (read-only) \??\L: f76db90.exe File opened (read-only) \??\O: f76db90.exe File opened (read-only) \??\E: f76f882.exe File opened (read-only) \??\G: f76f882.exe -
resource yara_rule behavioral1/memory/1792-13-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/1792-15-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/1792-17-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/1792-18-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/1792-20-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/1792-21-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/1792-22-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/1792-19-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/1792-16-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/1792-14-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/1792-60-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/1792-61-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/1792-62-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/1792-63-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/1792-81-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/1792-82-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/1792-84-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/1792-115-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/1792-161-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2604-182-0x0000000000910000-0x00000000019CA000-memory.dmp upx behavioral1/memory/2604-217-0x0000000000910000-0x00000000019CA000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI f76db90.exe File created C:\Windows\f772bd1 f76f882.exe File created C:\Windows\f76dc0d f76db90.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76db90.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76f882.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1792 f76db90.exe 1792 f76db90.exe 2604 f76f882.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeDebugPrivilege 1792 f76db90.exe Token: SeDebugPrivilege 1792 f76db90.exe Token: SeDebugPrivilege 1792 f76db90.exe Token: SeDebugPrivilege 1792 f76db90.exe Token: SeDebugPrivilege 1792 f76db90.exe Token: SeDebugPrivilege 1792 f76db90.exe Token: SeDebugPrivilege 1792 f76db90.exe Token: SeDebugPrivilege 1792 f76db90.exe Token: SeDebugPrivilege 1792 f76db90.exe Token: SeDebugPrivilege 1792 f76db90.exe Token: SeDebugPrivilege 1792 f76db90.exe Token: SeDebugPrivilege 1792 f76db90.exe Token: SeDebugPrivilege 1792 f76db90.exe Token: SeDebugPrivilege 1792 f76db90.exe Token: SeDebugPrivilege 1792 f76db90.exe Token: SeDebugPrivilege 1792 f76db90.exe Token: SeDebugPrivilege 1792 f76db90.exe Token: SeDebugPrivilege 1792 f76db90.exe Token: SeDebugPrivilege 1792 f76db90.exe Token: SeDebugPrivilege 1792 f76db90.exe Token: SeDebugPrivilege 1792 f76db90.exe Token: SeDebugPrivilege 1792 f76db90.exe Token: SeDebugPrivilege 1792 f76db90.exe Token: SeDebugPrivilege 1792 f76db90.exe Token: SeDebugPrivilege 2604 f76f882.exe Token: SeDebugPrivilege 2604 f76f882.exe Token: SeDebugPrivilege 2604 f76f882.exe Token: SeDebugPrivilege 2604 f76f882.exe Token: SeDebugPrivilege 2604 f76f882.exe Token: SeDebugPrivilege 2604 f76f882.exe Token: SeDebugPrivilege 2604 f76f882.exe Token: SeDebugPrivilege 2604 f76f882.exe Token: SeDebugPrivilege 2604 f76f882.exe Token: SeDebugPrivilege 2604 f76f882.exe Token: SeDebugPrivilege 2604 f76f882.exe Token: SeDebugPrivilege 2604 f76f882.exe Token: SeDebugPrivilege 2604 f76f882.exe Token: SeDebugPrivilege 2604 f76f882.exe Token: SeDebugPrivilege 2604 f76f882.exe Token: SeDebugPrivilege 2604 f76f882.exe Token: SeDebugPrivilege 2604 f76f882.exe Token: SeDebugPrivilege 2604 f76f882.exe Token: SeDebugPrivilege 2604 f76f882.exe Token: SeDebugPrivilege 2604 f76f882.exe Token: SeDebugPrivilege 2604 f76f882.exe Token: SeDebugPrivilege 2604 f76f882.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2612 2024 rundll32.exe 31 PID 2024 wrote to memory of 2612 2024 rundll32.exe 31 PID 2024 wrote to memory of 2612 2024 rundll32.exe 31 PID 2024 wrote to memory of 2612 2024 rundll32.exe 31 PID 2024 wrote to memory of 2612 2024 rundll32.exe 31 PID 2024 wrote to memory of 2612 2024 rundll32.exe 31 PID 2024 wrote to memory of 2612 2024 rundll32.exe 31 PID 2612 wrote to memory of 1792 2612 rundll32.exe 32 PID 2612 wrote to memory of 1792 2612 rundll32.exe 32 PID 2612 wrote to memory of 1792 2612 rundll32.exe 32 PID 2612 wrote to memory of 1792 2612 rundll32.exe 32 PID 1792 wrote to memory of 1120 1792 f76db90.exe 19 PID 1792 wrote to memory of 1168 1792 f76db90.exe 20 PID 1792 wrote to memory of 1212 1792 f76db90.exe 21 PID 1792 wrote to memory of 1540 1792 f76db90.exe 23 PID 1792 wrote to memory of 2024 1792 f76db90.exe 30 PID 1792 wrote to memory of 2612 1792 f76db90.exe 31 PID 1792 wrote to memory of 2612 1792 f76db90.exe 31 PID 2612 wrote to memory of 2076 2612 rundll32.exe 33 PID 2612 wrote to memory of 2076 2612 rundll32.exe 33 PID 2612 wrote to memory of 2076 2612 rundll32.exe 33 PID 2612 wrote to memory of 2076 2612 rundll32.exe 33 PID 2612 wrote to memory of 2604 2612 rundll32.exe 34 PID 2612 wrote to memory of 2604 2612 rundll32.exe 34 PID 2612 wrote to memory of 2604 2612 rundll32.exe 34 PID 2612 wrote to memory of 2604 2612 rundll32.exe 34 PID 1792 wrote to memory of 1120 1792 f76db90.exe 19 PID 1792 wrote to memory of 1168 1792 f76db90.exe 20 PID 1792 wrote to memory of 1212 1792 f76db90.exe 21 PID 1792 wrote to memory of 1540 1792 f76db90.exe 23 PID 1792 wrote to memory of 2076 1792 f76db90.exe 33 PID 1792 wrote to memory of 2076 1792 f76db90.exe 33 PID 1792 wrote to memory of 2604 1792 f76db90.exe 34 PID 1792 wrote to memory of 2604 1792 f76db90.exe 34 PID 2604 wrote to memory of 1120 2604 f76f882.exe 19 PID 2604 wrote to memory of 1168 2604 f76f882.exe 20 PID 2604 wrote to memory of 1212 2604 f76f882.exe 21 PID 2604 wrote to memory of 1540 2604 f76f882.exe 23 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76db90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76f882.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8e637b6a9aaf1498626cbb15b66a14dcf6c46abb48d500ff0a21fee9245eb52d.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8e637b6a9aaf1498626cbb15b66a14dcf6c46abb48d500ff0a21fee9245eb52d.dll,#13⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\f76db90.exeC:\Users\Admin\AppData\Local\Temp\f76db90.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1792
-
-
C:\Users\Admin\AppData\Local\Temp\f76dd35.exeC:\Users\Admin\AppData\Local\Temp\f76dd35.exe4⤵
- Executes dropped EXE
PID:2076
-
-
C:\Users\Admin\AppData\Local\Temp\f76f882.exeC:\Users\Admin\AppData\Local\Temp\f76f882.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2604
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1540
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD5011d3cc969d96e7e6d300703c25eb480
SHA1aede2a3f349d7b3be10260e7643ab895b8f02e60
SHA256a84e0787261dac0f4609691d55c309d71f34fa7a31966ee5892410a94422b21a
SHA512fec5bb95e46ad2ad18e4be1b9f7011b9b104cf2337b6a987f5de774a31194addfb22d581c22de6910802e6f1be36a4724f616f7bbb35215d801f7e088ebb335c
-
Filesize
97KB
MD5e7913e106e0eb68257bafcffe4038960
SHA14db431107c9f1c7e7d9a3d008aaf307989502ae6
SHA25609966d9328e2e0d0e663f9a7a29c9a6cd436277ed27835a33c37a2f9ec699670
SHA512eb4dc30529c5576ff75d2ad6f0db115ec9c0c3cbc168c0901f311b3521061a0fb8510db94c1b767e42463a94a13324636aaf745153480c0d7ab67d9df90664b2