Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
27s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17/12/2024, 03:27
Static task
static1
Behavioral task
behavioral1
Sample
910fda128bb27d348608f63cd96b41169184cc275ce457414a501954fd5fd440N.dll
Resource
win7-20240729-en
General
-
Target
910fda128bb27d348608f63cd96b41169184cc275ce457414a501954fd5fd440N.dll
-
Size
120KB
-
MD5
c0448f2d3b431f8ed94d1fb913c83080
-
SHA1
79e70a54dd9c7a16537df305ecbece35675779c6
-
SHA256
910fda128bb27d348608f63cd96b41169184cc275ce457414a501954fd5fd440
-
SHA512
67a3ff1896d819c3dc225e360dbfe37b57adf159e0da30671c2bbe6f995fac1706105a4681476d9f3b291007ce26bd353c53a63b0bcdd39542b3de16ffb3d81d
-
SSDEEP
3072:f3akmxxh/p2AUkIwtlmOsnrbs9pR60eOngo:fkz9hrtYbs9pSOng
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f774089.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f774089.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f774089.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f77420f.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f77420f.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f77420f.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f77420f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f774089.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f774089.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f774089.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f77420f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f774089.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f77420f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f77420f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f77420f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f77420f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f774089.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f774089.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f774089.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f77420f.exe -
Executes dropped EXE 3 IoCs
pid Process 2744 f774089.exe 2612 f77420f.exe 2312 f775c34.exe -
Loads dropped DLL 6 IoCs
pid Process 2084 rundll32.exe 2084 rundll32.exe 2084 rundll32.exe 2084 rundll32.exe 2084 rundll32.exe 2084 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f77420f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f77420f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f774089.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f774089.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f774089.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f774089.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f77420f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f77420f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f774089.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f77420f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f77420f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f774089.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f774089.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f77420f.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f774089.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f77420f.exe -
Enumerates connected drives 3 TTPs 14 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: f774089.exe File opened (read-only) \??\J: f774089.exe File opened (read-only) \??\K: f774089.exe File opened (read-only) \??\O: f774089.exe File opened (read-only) \??\E: f774089.exe File opened (read-only) \??\H: f774089.exe File opened (read-only) \??\S: f774089.exe File opened (read-only) \??\L: f774089.exe File opened (read-only) \??\R: f774089.exe File opened (read-only) \??\G: f774089.exe File opened (read-only) \??\N: f774089.exe File opened (read-only) \??\Q: f774089.exe File opened (read-only) \??\M: f774089.exe File opened (read-only) \??\P: f774089.exe -
resource yara_rule behavioral1/memory/2744-18-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2744-21-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2744-23-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2744-16-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2744-19-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2744-24-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2744-25-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2744-22-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2744-20-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2744-17-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2744-63-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2744-65-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2744-66-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2744-67-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2744-64-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2744-69-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2744-70-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2744-83-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2744-84-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2744-88-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2744-89-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2744-107-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2744-155-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2612-166-0x0000000000980000-0x0000000001A3A000-memory.dmp upx behavioral1/memory/2612-193-0x0000000000980000-0x0000000001A3A000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\f7740f6 f774089.exe File opened for modification C:\Windows\SYSTEM.INI f774089.exe File created C:\Windows\f7790ab f77420f.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f774089.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f77420f.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2744 f774089.exe 2744 f774089.exe 2612 f77420f.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 2744 f774089.exe Token: SeDebugPrivilege 2744 f774089.exe Token: SeDebugPrivilege 2744 f774089.exe Token: SeDebugPrivilege 2744 f774089.exe Token: SeDebugPrivilege 2744 f774089.exe Token: SeDebugPrivilege 2744 f774089.exe Token: SeDebugPrivilege 2744 f774089.exe Token: SeDebugPrivilege 2744 f774089.exe Token: SeDebugPrivilege 2744 f774089.exe Token: SeDebugPrivilege 2744 f774089.exe Token: SeDebugPrivilege 2744 f774089.exe Token: SeDebugPrivilege 2744 f774089.exe Token: SeDebugPrivilege 2744 f774089.exe Token: SeDebugPrivilege 2744 f774089.exe Token: SeDebugPrivilege 2744 f774089.exe Token: SeDebugPrivilege 2744 f774089.exe Token: SeDebugPrivilege 2744 f774089.exe Token: SeDebugPrivilege 2744 f774089.exe Token: SeDebugPrivilege 2744 f774089.exe Token: SeDebugPrivilege 2744 f774089.exe Token: SeDebugPrivilege 2744 f774089.exe Token: SeDebugPrivilege 2744 f774089.exe Token: SeDebugPrivilege 2744 f774089.exe Token: SeDebugPrivilege 2612 f77420f.exe Token: SeDebugPrivilege 2612 f77420f.exe Token: SeDebugPrivilege 2612 f77420f.exe Token: SeDebugPrivilege 2612 f77420f.exe Token: SeDebugPrivilege 2612 f77420f.exe Token: SeDebugPrivilege 2612 f77420f.exe Token: SeDebugPrivilege 2612 f77420f.exe Token: SeDebugPrivilege 2612 f77420f.exe Token: SeDebugPrivilege 2612 f77420f.exe Token: SeDebugPrivilege 2612 f77420f.exe Token: SeDebugPrivilege 2612 f77420f.exe Token: SeDebugPrivilege 2612 f77420f.exe Token: SeDebugPrivilege 2612 f77420f.exe Token: SeDebugPrivilege 2612 f77420f.exe Token: SeDebugPrivilege 2612 f77420f.exe Token: SeDebugPrivilege 2612 f77420f.exe Token: SeDebugPrivilege 2612 f77420f.exe Token: SeDebugPrivilege 2612 f77420f.exe Token: SeDebugPrivilege 2612 f77420f.exe Token: SeDebugPrivilege 2612 f77420f.exe Token: SeDebugPrivilege 2612 f77420f.exe Token: SeDebugPrivilege 2612 f77420f.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1792 wrote to memory of 2084 1792 rundll32.exe 30 PID 1792 wrote to memory of 2084 1792 rundll32.exe 30 PID 1792 wrote to memory of 2084 1792 rundll32.exe 30 PID 1792 wrote to memory of 2084 1792 rundll32.exe 30 PID 1792 wrote to memory of 2084 1792 rundll32.exe 30 PID 1792 wrote to memory of 2084 1792 rundll32.exe 30 PID 1792 wrote to memory of 2084 1792 rundll32.exe 30 PID 2084 wrote to memory of 2744 2084 rundll32.exe 31 PID 2084 wrote to memory of 2744 2084 rundll32.exe 31 PID 2084 wrote to memory of 2744 2084 rundll32.exe 31 PID 2084 wrote to memory of 2744 2084 rundll32.exe 31 PID 2744 wrote to memory of 1100 2744 f774089.exe 19 PID 2744 wrote to memory of 1156 2744 f774089.exe 20 PID 2744 wrote to memory of 1196 2744 f774089.exe 21 PID 2744 wrote to memory of 1684 2744 f774089.exe 25 PID 2744 wrote to memory of 1792 2744 f774089.exe 29 PID 2744 wrote to memory of 2084 2744 f774089.exe 30 PID 2744 wrote to memory of 2084 2744 f774089.exe 30 PID 2084 wrote to memory of 2612 2084 rundll32.exe 32 PID 2084 wrote to memory of 2612 2084 rundll32.exe 32 PID 2084 wrote to memory of 2612 2084 rundll32.exe 32 PID 2084 wrote to memory of 2612 2084 rundll32.exe 32 PID 2084 wrote to memory of 2312 2084 rundll32.exe 33 PID 2084 wrote to memory of 2312 2084 rundll32.exe 33 PID 2084 wrote to memory of 2312 2084 rundll32.exe 33 PID 2084 wrote to memory of 2312 2084 rundll32.exe 33 PID 2744 wrote to memory of 1100 2744 f774089.exe 19 PID 2744 wrote to memory of 1156 2744 f774089.exe 20 PID 2744 wrote to memory of 1196 2744 f774089.exe 21 PID 2744 wrote to memory of 1684 2744 f774089.exe 25 PID 2744 wrote to memory of 2612 2744 f774089.exe 32 PID 2744 wrote to memory of 2612 2744 f774089.exe 32 PID 2744 wrote to memory of 2312 2744 f774089.exe 33 PID 2744 wrote to memory of 2312 2744 f774089.exe 33 PID 2612 wrote to memory of 1100 2612 f77420f.exe 19 PID 2612 wrote to memory of 1156 2612 f77420f.exe 20 PID 2612 wrote to memory of 1196 2612 f77420f.exe 21 PID 2612 wrote to memory of 1684 2612 f77420f.exe 25 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f774089.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f77420f.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1100
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1156
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\910fda128bb27d348608f63cd96b41169184cc275ce457414a501954fd5fd440N.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\910fda128bb27d348608f63cd96b41169184cc275ce457414a501954fd5fd440N.dll,#13⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\f774089.exeC:\Users\Admin\AppData\Local\Temp\f774089.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2744
-
-
C:\Users\Admin\AppData\Local\Temp\f77420f.exeC:\Users\Admin\AppData\Local\Temp\f77420f.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2612
-
-
C:\Users\Admin\AppData\Local\Temp\f775c34.exeC:\Users\Admin\AppData\Local\Temp\f775c34.exe4⤵
- Executes dropped EXE
PID:2312
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1684
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD56a5ca0f66c953bd615753de027f85722
SHA14085128bd4de218e32f6801917079c39e1744ee2
SHA25697ded136302c22c2077bf2920d02ba0a5de699e84c1138716be03307ab608612
SHA5129afb20a084e4d23fc00c420705bdaaa3693ac7f4641461f9480847fe67a8ad853fb64c67fe4be702d0983284912e387a1f07f8d9ac88b5bdde055147fbae6f40
-
Filesize
97KB
MD5be8483eae89723d702bfb6a4e21e2a5d
SHA1cb479a6c150f608114f599b27b8ff0814302adc7
SHA2564aa055087758013f1cfe826188a0cd031546302f82072b64f09a6dce534e527d
SHA51236ade936f7925c8d27d3f54a5c11ac3ca20377929587e35beb88e0ccc0ca5d213d74574e892eeea2dd17da479af6e6e523b51bf68495f9b7d37f82db5945d093