Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
20-12-2024 06:50
Static task
static1
Behavioral task
behavioral1
Sample
c0a3403aeaca1740145b6a573807b17f1ff45c4d9df42ce273ea10322a905b57.dll
Resource
win7-20241023-en
General
-
Target
c0a3403aeaca1740145b6a573807b17f1ff45c4d9df42ce273ea10322a905b57.dll
-
Size
120KB
-
MD5
91b196049ed55dd8e17b32469a448e27
-
SHA1
af0dae0840801ccf94e871967d3226c81bb9e18b
-
SHA256
c0a3403aeaca1740145b6a573807b17f1ff45c4d9df42ce273ea10322a905b57
-
SHA512
46f27067cca33b7f01e2e11127c5e11249ecb882675616e0b229a97a8641ac2ba0001b6bef84688518a3f34309ea9a6d8b41a2226d4779ade7f1a01964cc1d7d
-
SSDEEP
3072:xxn7I805Vidm9JghTwJ5KX9emMY2IIipb:xxn7tS0MKQIIi
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76d826.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76ba4a.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76ba4a.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76ba4a.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76d826.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76d826.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76ba4a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76d826.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76d826.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76d826.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76d826.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76ba4a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76ba4a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76ba4a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76ba4a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76d826.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76ba4a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76ba4a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76d826.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76d826.exe -
Executes dropped EXE 3 IoCs
pid Process 2296 f76ba4a.exe 2856 f76bc2e.exe 2872 f76d826.exe -
Loads dropped DLL 6 IoCs
pid Process 2136 rundll32.exe 2136 rundll32.exe 2136 rundll32.exe 2136 rundll32.exe 2136 rundll32.exe 2136 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76ba4a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76d826.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76d826.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76ba4a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76ba4a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76d826.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76d826.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76ba4a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76ba4a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76ba4a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76d826.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76d826.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76d826.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76ba4a.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76d826.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76ba4a.exe -
Enumerates connected drives 3 TTPs 17 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: f76ba4a.exe File opened (read-only) \??\I: f76ba4a.exe File opened (read-only) \??\L: f76ba4a.exe File opened (read-only) \??\R: f76ba4a.exe File opened (read-only) \??\T: f76ba4a.exe File opened (read-only) \??\E: f76ba4a.exe File opened (read-only) \??\J: f76ba4a.exe File opened (read-only) \??\E: f76d826.exe File opened (read-only) \??\K: f76ba4a.exe File opened (read-only) \??\N: f76ba4a.exe File opened (read-only) \??\Q: f76ba4a.exe File opened (read-only) \??\G: f76d826.exe File opened (read-only) \??\H: f76ba4a.exe File opened (read-only) \??\M: f76ba4a.exe File opened (read-only) \??\O: f76ba4a.exe File opened (read-only) \??\P: f76ba4a.exe File opened (read-only) \??\S: f76ba4a.exe -
resource yara_rule behavioral1/memory/2296-14-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2296-19-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2296-16-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2296-22-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2296-24-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2296-23-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2296-20-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2296-18-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2296-17-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2296-25-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2296-62-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2296-63-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2296-64-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2296-65-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2296-66-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2296-68-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2296-69-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2296-71-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2296-70-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2296-89-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2296-90-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2296-92-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2296-161-0x00000000005D0000-0x000000000168A000-memory.dmp upx behavioral1/memory/2872-177-0x0000000000A10000-0x0000000001ACA000-memory.dmp upx behavioral1/memory/2872-217-0x0000000000A10000-0x0000000001ACA000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\f76ba98 f76ba4a.exe File opened for modification C:\Windows\SYSTEM.INI f76ba4a.exe File created C:\Windows\f770b56 f76d826.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76ba4a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76d826.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2296 f76ba4a.exe 2296 f76ba4a.exe 2872 f76d826.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeDebugPrivilege 2296 f76ba4a.exe Token: SeDebugPrivilege 2296 f76ba4a.exe Token: SeDebugPrivilege 2296 f76ba4a.exe Token: SeDebugPrivilege 2296 f76ba4a.exe Token: SeDebugPrivilege 2296 f76ba4a.exe Token: SeDebugPrivilege 2296 f76ba4a.exe Token: SeDebugPrivilege 2296 f76ba4a.exe Token: SeDebugPrivilege 2296 f76ba4a.exe Token: SeDebugPrivilege 2296 f76ba4a.exe Token: SeDebugPrivilege 2296 f76ba4a.exe Token: SeDebugPrivilege 2296 f76ba4a.exe Token: SeDebugPrivilege 2296 f76ba4a.exe Token: SeDebugPrivilege 2296 f76ba4a.exe Token: SeDebugPrivilege 2296 f76ba4a.exe Token: SeDebugPrivilege 2296 f76ba4a.exe Token: SeDebugPrivilege 2296 f76ba4a.exe Token: SeDebugPrivilege 2296 f76ba4a.exe Token: SeDebugPrivilege 2296 f76ba4a.exe Token: SeDebugPrivilege 2296 f76ba4a.exe Token: SeDebugPrivilege 2296 f76ba4a.exe Token: SeDebugPrivilege 2296 f76ba4a.exe Token: SeDebugPrivilege 2296 f76ba4a.exe Token: SeDebugPrivilege 2296 f76ba4a.exe Token: SeDebugPrivilege 2296 f76ba4a.exe Token: SeDebugPrivilege 2872 f76d826.exe Token: SeDebugPrivilege 2872 f76d826.exe Token: SeDebugPrivilege 2872 f76d826.exe Token: SeDebugPrivilege 2872 f76d826.exe Token: SeDebugPrivilege 2872 f76d826.exe Token: SeDebugPrivilege 2872 f76d826.exe Token: SeDebugPrivilege 2872 f76d826.exe Token: SeDebugPrivilege 2872 f76d826.exe Token: SeDebugPrivilege 2872 f76d826.exe Token: SeDebugPrivilege 2872 f76d826.exe Token: SeDebugPrivilege 2872 f76d826.exe Token: SeDebugPrivilege 2872 f76d826.exe Token: SeDebugPrivilege 2872 f76d826.exe Token: SeDebugPrivilege 2872 f76d826.exe Token: SeDebugPrivilege 2872 f76d826.exe Token: SeDebugPrivilege 2872 f76d826.exe Token: SeDebugPrivilege 2872 f76d826.exe Token: SeDebugPrivilege 2872 f76d826.exe Token: SeDebugPrivilege 2872 f76d826.exe Token: SeDebugPrivilege 2872 f76d826.exe Token: SeDebugPrivilege 2872 f76d826.exe Token: SeDebugPrivilege 2872 f76d826.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2136 3064 rundll32.exe 30 PID 3064 wrote to memory of 2136 3064 rundll32.exe 30 PID 3064 wrote to memory of 2136 3064 rundll32.exe 30 PID 3064 wrote to memory of 2136 3064 rundll32.exe 30 PID 3064 wrote to memory of 2136 3064 rundll32.exe 30 PID 3064 wrote to memory of 2136 3064 rundll32.exe 30 PID 3064 wrote to memory of 2136 3064 rundll32.exe 30 PID 2136 wrote to memory of 2296 2136 rundll32.exe 31 PID 2136 wrote to memory of 2296 2136 rundll32.exe 31 PID 2136 wrote to memory of 2296 2136 rundll32.exe 31 PID 2136 wrote to memory of 2296 2136 rundll32.exe 31 PID 2296 wrote to memory of 1124 2296 f76ba4a.exe 19 PID 2296 wrote to memory of 1176 2296 f76ba4a.exe 20 PID 2296 wrote to memory of 1212 2296 f76ba4a.exe 21 PID 2296 wrote to memory of 828 2296 f76ba4a.exe 25 PID 2296 wrote to memory of 3064 2296 f76ba4a.exe 29 PID 2296 wrote to memory of 2136 2296 f76ba4a.exe 30 PID 2296 wrote to memory of 2136 2296 f76ba4a.exe 30 PID 2136 wrote to memory of 2856 2136 rundll32.exe 32 PID 2136 wrote to memory of 2856 2136 rundll32.exe 32 PID 2136 wrote to memory of 2856 2136 rundll32.exe 32 PID 2136 wrote to memory of 2856 2136 rundll32.exe 32 PID 2136 wrote to memory of 2872 2136 rundll32.exe 34 PID 2136 wrote to memory of 2872 2136 rundll32.exe 34 PID 2136 wrote to memory of 2872 2136 rundll32.exe 34 PID 2136 wrote to memory of 2872 2136 rundll32.exe 34 PID 2296 wrote to memory of 1124 2296 f76ba4a.exe 19 PID 2296 wrote to memory of 1176 2296 f76ba4a.exe 20 PID 2296 wrote to memory of 1212 2296 f76ba4a.exe 21 PID 2296 wrote to memory of 828 2296 f76ba4a.exe 25 PID 2296 wrote to memory of 2856 2296 f76ba4a.exe 32 PID 2296 wrote to memory of 2856 2296 f76ba4a.exe 32 PID 2296 wrote to memory of 2872 2296 f76ba4a.exe 34 PID 2296 wrote to memory of 2872 2296 f76ba4a.exe 34 PID 2872 wrote to memory of 1124 2872 f76d826.exe 19 PID 2872 wrote to memory of 1176 2872 f76d826.exe 20 PID 2872 wrote to memory of 1212 2872 f76d826.exe 21 PID 2872 wrote to memory of 828 2872 f76d826.exe 25 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76ba4a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76d826.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1124
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c0a3403aeaca1740145b6a573807b17f1ff45c4d9df42ce273ea10322a905b57.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c0a3403aeaca1740145b6a573807b17f1ff45c4d9df42ce273ea10322a905b57.dll,#13⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\f76ba4a.exeC:\Users\Admin\AppData\Local\Temp\f76ba4a.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2296
-
-
C:\Users\Admin\AppData\Local\Temp\f76bc2e.exeC:\Users\Admin\AppData\Local\Temp\f76bc2e.exe4⤵
- Executes dropped EXE
PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\f76d826.exeC:\Users\Admin\AppData\Local\Temp\f76d826.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2872
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:828
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD50512fe6438503bf94b5d77e84b30e4fa
SHA1afeab0ec78e755c9f5e031fa7005b2957d3d27c6
SHA256ec8434703c3d1c2575eb799e76e6a9b16011abff9a049b363fd703786952763c
SHA512a372170f743a6cb20be9a93b0e032fc85002ea4c3e54dc8273c474118fc6533f1b0ac055e762c65c2ce7b8f58860f2f2f616b384c0ccfa6a52df93272a06f0a7
-
Filesize
257B
MD528aefc3e4f190bad75bc63add947d7e6
SHA1cb3735ddb5f4cc3dca7344021738c2a0c4fb1185
SHA2560602367ff3311ba6066244e9aef264a676d044d353c88d985ca397b565fab0b4
SHA5129f225247c6bdaabd1a4defcf532f2104e1a1dc3cc8f56289ceeb0bb8b430f48f2dba6e5c6ede925b689be50a051462be5fdcc161ac6e053ca49200ab08b33eef