Analysis
-
max time kernel
28s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-12-2024 04:11
Static task
static1
Behavioral task
behavioral1
Sample
16df53c28b78a20c87485f9796cb63fb8e849704afebdcb128574f311a039f2b.dll
Resource
win7-20240903-en
General
-
Target
16df53c28b78a20c87485f9796cb63fb8e849704afebdcb128574f311a039f2b.dll
-
Size
120KB
-
MD5
b6c3a66d700c351a957b2f886a46b5fb
-
SHA1
17ed6ea125b0f77308c64881c9652055e449adcb
-
SHA256
16df53c28b78a20c87485f9796cb63fb8e849704afebdcb128574f311a039f2b
-
SHA512
5c03eaa789770065c2c36c2fae5d824f5a6de18997eb61e01541228570e482d6bf4625e1df8eff78f0683fe8551e9b93235f5011f0ef9e8adca25f320584b925
-
SSDEEP
1536:LUDFIbOBGqjS+WfDLXZtssJswtaJvsOoHPq9Fv33nyIeLy82JFILNqO:L2kOsmS+cptyJvsDHSnnyIaB2JFILJ
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f775909.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f775909.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f775909.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f777761.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f777761.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f777761.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f775909.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f777761.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f777761.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f777761.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f777761.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f775909.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f775909.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f775909.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f775909.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f777761.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f775909.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f775909.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f777761.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f777761.exe -
Executes dropped EXE 3 IoCs
pid Process 2744 f775909.exe 3056 f775acd.exe 2928 f777761.exe -
Loads dropped DLL 6 IoCs
pid Process 2972 rundll32.exe 2972 rundll32.exe 2972 rundll32.exe 2972 rundll32.exe 2972 rundll32.exe 2972 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f777761.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f777761.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f777761.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f775909.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f777761.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f777761.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f777761.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f775909.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f775909.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f775909.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f775909.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f775909.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f775909.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f777761.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f775909.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f777761.exe -
Enumerates connected drives 3 TTPs 17 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: f775909.exe File opened (read-only) \??\L: f775909.exe File opened (read-only) \??\M: f775909.exe File opened (read-only) \??\O: f775909.exe File opened (read-only) \??\P: f775909.exe File opened (read-only) \??\T: f775909.exe File opened (read-only) \??\G: f775909.exe File opened (read-only) \??\H: f775909.exe File opened (read-only) \??\I: f775909.exe File opened (read-only) \??\R: f775909.exe File opened (read-only) \??\S: f775909.exe File opened (read-only) \??\E: f775909.exe File opened (read-only) \??\K: f775909.exe File opened (read-only) \??\N: f775909.exe File opened (read-only) \??\Q: f775909.exe File opened (read-only) \??\E: f777761.exe File opened (read-only) \??\G: f777761.exe -
resource yara_rule behavioral1/memory/2744-15-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2744-18-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2744-14-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2744-20-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2744-17-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2744-13-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2744-21-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2744-22-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2744-19-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2744-16-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2744-58-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2744-59-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2744-60-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2744-61-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2744-63-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2744-64-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2744-65-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2744-66-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2744-67-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2744-84-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2744-85-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2744-105-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2744-106-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2744-153-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2928-167-0x00000000009C0000-0x0000000001A7A000-memory.dmp upx behavioral1/memory/2928-209-0x00000000009C0000-0x0000000001A7A000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI f775909.exe File created C:\Windows\f77a9c7 f777761.exe File created C:\Windows\f775995 f775909.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f775909.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f777761.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2744 f775909.exe 2744 f775909.exe 2928 f777761.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 2744 f775909.exe Token: SeDebugPrivilege 2744 f775909.exe Token: SeDebugPrivilege 2744 f775909.exe Token: SeDebugPrivilege 2744 f775909.exe Token: SeDebugPrivilege 2744 f775909.exe Token: SeDebugPrivilege 2744 f775909.exe Token: SeDebugPrivilege 2744 f775909.exe Token: SeDebugPrivilege 2744 f775909.exe Token: SeDebugPrivilege 2744 f775909.exe Token: SeDebugPrivilege 2744 f775909.exe Token: SeDebugPrivilege 2744 f775909.exe Token: SeDebugPrivilege 2744 f775909.exe Token: SeDebugPrivilege 2744 f775909.exe Token: SeDebugPrivilege 2744 f775909.exe Token: SeDebugPrivilege 2744 f775909.exe Token: SeDebugPrivilege 2744 f775909.exe Token: SeDebugPrivilege 2744 f775909.exe Token: SeDebugPrivilege 2744 f775909.exe Token: SeDebugPrivilege 2744 f775909.exe Token: SeDebugPrivilege 2744 f775909.exe Token: SeDebugPrivilege 2744 f775909.exe Token: SeDebugPrivilege 2744 f775909.exe Token: SeDebugPrivilege 2744 f775909.exe Token: SeDebugPrivilege 2928 f777761.exe Token: SeDebugPrivilege 2928 f777761.exe Token: SeDebugPrivilege 2928 f777761.exe Token: SeDebugPrivilege 2928 f777761.exe Token: SeDebugPrivilege 2928 f777761.exe Token: SeDebugPrivilege 2928 f777761.exe Token: SeDebugPrivilege 2928 f777761.exe Token: SeDebugPrivilege 2928 f777761.exe Token: SeDebugPrivilege 2928 f777761.exe Token: SeDebugPrivilege 2928 f777761.exe Token: SeDebugPrivilege 2928 f777761.exe Token: SeDebugPrivilege 2928 f777761.exe Token: SeDebugPrivilege 2928 f777761.exe Token: SeDebugPrivilege 2928 f777761.exe Token: SeDebugPrivilege 2928 f777761.exe Token: SeDebugPrivilege 2928 f777761.exe Token: SeDebugPrivilege 2928 f777761.exe Token: SeDebugPrivilege 2928 f777761.exe Token: SeDebugPrivilege 2928 f777761.exe Token: SeDebugPrivilege 2928 f777761.exe Token: SeDebugPrivilege 2928 f777761.exe Token: SeDebugPrivilege 2928 f777761.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2972 2172 rundll32.exe 30 PID 2172 wrote to memory of 2972 2172 rundll32.exe 30 PID 2172 wrote to memory of 2972 2172 rundll32.exe 30 PID 2172 wrote to memory of 2972 2172 rundll32.exe 30 PID 2172 wrote to memory of 2972 2172 rundll32.exe 30 PID 2172 wrote to memory of 2972 2172 rundll32.exe 30 PID 2172 wrote to memory of 2972 2172 rundll32.exe 30 PID 2972 wrote to memory of 2744 2972 rundll32.exe 31 PID 2972 wrote to memory of 2744 2972 rundll32.exe 31 PID 2972 wrote to memory of 2744 2972 rundll32.exe 31 PID 2972 wrote to memory of 2744 2972 rundll32.exe 31 PID 2744 wrote to memory of 1108 2744 f775909.exe 19 PID 2744 wrote to memory of 1168 2744 f775909.exe 20 PID 2744 wrote to memory of 1204 2744 f775909.exe 21 PID 2744 wrote to memory of 1496 2744 f775909.exe 25 PID 2744 wrote to memory of 2172 2744 f775909.exe 29 PID 2744 wrote to memory of 2972 2744 f775909.exe 30 PID 2744 wrote to memory of 2972 2744 f775909.exe 30 PID 2972 wrote to memory of 3056 2972 rundll32.exe 32 PID 2972 wrote to memory of 3056 2972 rundll32.exe 32 PID 2972 wrote to memory of 3056 2972 rundll32.exe 32 PID 2972 wrote to memory of 3056 2972 rundll32.exe 32 PID 2972 wrote to memory of 2928 2972 rundll32.exe 33 PID 2972 wrote to memory of 2928 2972 rundll32.exe 33 PID 2972 wrote to memory of 2928 2972 rundll32.exe 33 PID 2972 wrote to memory of 2928 2972 rundll32.exe 33 PID 2744 wrote to memory of 1108 2744 f775909.exe 19 PID 2744 wrote to memory of 1168 2744 f775909.exe 20 PID 2744 wrote to memory of 1204 2744 f775909.exe 21 PID 2744 wrote to memory of 1496 2744 f775909.exe 25 PID 2744 wrote to memory of 3056 2744 f775909.exe 32 PID 2744 wrote to memory of 3056 2744 f775909.exe 32 PID 2744 wrote to memory of 2928 2744 f775909.exe 33 PID 2744 wrote to memory of 2928 2744 f775909.exe 33 PID 2928 wrote to memory of 1108 2928 f777761.exe 19 PID 2928 wrote to memory of 1168 2928 f777761.exe 20 PID 2928 wrote to memory of 1204 2928 f777761.exe 21 PID 2928 wrote to memory of 1496 2928 f777761.exe 25 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f775909.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f777761.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\16df53c28b78a20c87485f9796cb63fb8e849704afebdcb128574f311a039f2b.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\16df53c28b78a20c87485f9796cb63fb8e849704afebdcb128574f311a039f2b.dll,#13⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\f775909.exeC:\Users\Admin\AppData\Local\Temp\f775909.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2744
-
-
C:\Users\Admin\AppData\Local\Temp\f775acd.exeC:\Users\Admin\AppData\Local\Temp\f775acd.exe4⤵
- Executes dropped EXE
PID:3056
-
-
C:\Users\Admin\AppData\Local\Temp\f777761.exeC:\Users\Admin\AppData\Local\Temp\f777761.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2928
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1496
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD56ab412365fdc21eb85ddbb462d03aaf3
SHA1026d603885b7f0edc69cc9d0e41581ea27a74769
SHA2563420129a7d9c145999d98f8d49c80b2ae5541e68167b0ce2e753e529b0e98027
SHA5120cb62251405891306d0b0cc9ff36b67de599847eb4cde907d33b4b57640ce05dae19bba42cfb3da8139a5a7f1f258e1ae0fc4f44fd8d4099103c648f286034a6
-
Filesize
97KB
MD585aa00d62f9c2a341fab876f7ef877a4
SHA1e8419e48f3c8da91550967285f6be13b67f30f68
SHA2565ca6c252a4eea84682423a51ae4f0878b884f0f6c86dc72ca244b1277e7e9e06
SHA5121fcfca3edcc6a9f9fed1ab592e03ccff006f9f838a2fa523a7b6d1230ecc035f36c75b31c53d25ceee43dfe80497f4cb92d22d6bfda1cb10b1cece2891eb350e