Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
28s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22/12/2024, 22:56
Static task
static1
Behavioral task
behavioral1
Sample
5f12d96a700da406b98aa81af3a49b840d4b7b4f5c22927cc5f1d09f84e0eabb.dll
Resource
win7-20241010-en
General
-
Target
5f12d96a700da406b98aa81af3a49b840d4b7b4f5c22927cc5f1d09f84e0eabb.dll
-
Size
120KB
-
MD5
6dd34b6774b2ad47ba939b0a54519978
-
SHA1
1bbe5ed956778c909c6ab5310251e9cfd1112922
-
SHA256
5f12d96a700da406b98aa81af3a49b840d4b7b4f5c22927cc5f1d09f84e0eabb
-
SHA512
5720da0d6d13419f3af162518ba112b325990253676af24371dfa1c7cfd60014c282338dbd49647a7789d78491a78fbba4c8515a8e667a68cf057683b63cf582
-
SSDEEP
1536:cX/Fm6fj72EcUFcBFYMddI8eXRKdEyadXPqXUV9gKJ4v2yNIwKdWKn3w:w/F5it2cBOaI/RKbitgfKdd
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f77f788.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f77dcf7.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f77dcf7.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f77dcf7.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f77f788.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f77f788.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f77dcf7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f77f788.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f77dcf7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f77dcf7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f77f788.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f77f788.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f77f788.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f77f788.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f77dcf7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f77dcf7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f77dcf7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f77f788.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f77f788.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f77dcf7.exe -
Executes dropped EXE 3 IoCs
pid Process 1480 f77dcf7.exe 3004 f77dfa5.exe 2456 f77f788.exe -
Loads dropped DLL 6 IoCs
pid Process 2568 rundll32.exe 2568 rundll32.exe 2568 rundll32.exe 2568 rundll32.exe 2568 rundll32.exe 2568 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f77dcf7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f77dcf7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f77f788.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f77dcf7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f77dcf7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f77f788.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f77f788.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f77f788.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f77f788.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f77dcf7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f77f788.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f77f788.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f77dcf7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f77dcf7.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f77dcf7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f77f788.exe -
Enumerates connected drives 3 TTPs 6 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: f77dcf7.exe File opened (read-only) \??\H: f77dcf7.exe File opened (read-only) \??\I: f77dcf7.exe File opened (read-only) \??\J: f77dcf7.exe File opened (read-only) \??\K: f77dcf7.exe File opened (read-only) \??\E: f77dcf7.exe -
resource yara_rule behavioral1/memory/1480-17-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/1480-13-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/1480-20-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/1480-16-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/1480-11-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/1480-14-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/1480-19-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/1480-18-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/1480-15-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/1480-21-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/1480-59-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/1480-60-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/1480-74-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/1480-78-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/1480-77-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/1480-80-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/1480-81-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/1480-101-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/1480-102-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/1480-104-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/1480-114-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/1480-140-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/2456-146-0x0000000000A60000-0x0000000001B1A000-memory.dmp upx behavioral1/memory/2456-189-0x0000000000A60000-0x0000000001B1A000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\f77dd83 f77dcf7.exe File opened for modification C:\Windows\SYSTEM.INI f77dcf7.exe File created C:\Windows\f7838ad f77f788.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f77dcf7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f77f788.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1480 f77dcf7.exe 1480 f77dcf7.exe 2456 f77f788.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeDebugPrivilege 1480 f77dcf7.exe Token: SeDebugPrivilege 1480 f77dcf7.exe Token: SeDebugPrivilege 1480 f77dcf7.exe Token: SeDebugPrivilege 1480 f77dcf7.exe Token: SeDebugPrivilege 1480 f77dcf7.exe Token: SeDebugPrivilege 1480 f77dcf7.exe Token: SeDebugPrivilege 1480 f77dcf7.exe Token: SeDebugPrivilege 1480 f77dcf7.exe Token: SeDebugPrivilege 1480 f77dcf7.exe Token: SeDebugPrivilege 1480 f77dcf7.exe Token: SeDebugPrivilege 1480 f77dcf7.exe Token: SeDebugPrivilege 1480 f77dcf7.exe Token: SeDebugPrivilege 1480 f77dcf7.exe Token: SeDebugPrivilege 1480 f77dcf7.exe Token: SeDebugPrivilege 1480 f77dcf7.exe Token: SeDebugPrivilege 1480 f77dcf7.exe Token: SeDebugPrivilege 1480 f77dcf7.exe Token: SeDebugPrivilege 1480 f77dcf7.exe Token: SeDebugPrivilege 1480 f77dcf7.exe Token: SeDebugPrivilege 1480 f77dcf7.exe Token: SeDebugPrivilege 1480 f77dcf7.exe Token: SeDebugPrivilege 1480 f77dcf7.exe Token: SeDebugPrivilege 2456 f77f788.exe Token: SeDebugPrivilege 2456 f77f788.exe Token: SeDebugPrivilege 2456 f77f788.exe Token: SeDebugPrivilege 2456 f77f788.exe Token: SeDebugPrivilege 2456 f77f788.exe Token: SeDebugPrivilege 2456 f77f788.exe Token: SeDebugPrivilege 2456 f77f788.exe Token: SeDebugPrivilege 2456 f77f788.exe Token: SeDebugPrivilege 2456 f77f788.exe Token: SeDebugPrivilege 2456 f77f788.exe Token: SeDebugPrivilege 2456 f77f788.exe Token: SeDebugPrivilege 2456 f77f788.exe Token: SeDebugPrivilege 2456 f77f788.exe Token: SeDebugPrivilege 2456 f77f788.exe Token: SeDebugPrivilege 2456 f77f788.exe Token: SeDebugPrivilege 2456 f77f788.exe Token: SeDebugPrivilege 2456 f77f788.exe Token: SeDebugPrivilege 2456 f77f788.exe Token: SeDebugPrivilege 2456 f77f788.exe Token: SeDebugPrivilege 2456 f77f788.exe Token: SeDebugPrivilege 2456 f77f788.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2568 2116 rundll32.exe 30 PID 2116 wrote to memory of 2568 2116 rundll32.exe 30 PID 2116 wrote to memory of 2568 2116 rundll32.exe 30 PID 2116 wrote to memory of 2568 2116 rundll32.exe 30 PID 2116 wrote to memory of 2568 2116 rundll32.exe 30 PID 2116 wrote to memory of 2568 2116 rundll32.exe 30 PID 2116 wrote to memory of 2568 2116 rundll32.exe 30 PID 2568 wrote to memory of 1480 2568 rundll32.exe 31 PID 2568 wrote to memory of 1480 2568 rundll32.exe 31 PID 2568 wrote to memory of 1480 2568 rundll32.exe 31 PID 2568 wrote to memory of 1480 2568 rundll32.exe 31 PID 1480 wrote to memory of 1080 1480 f77dcf7.exe 18 PID 1480 wrote to memory of 1168 1480 f77dcf7.exe 20 PID 1480 wrote to memory of 1196 1480 f77dcf7.exe 21 PID 1480 wrote to memory of 1580 1480 f77dcf7.exe 25 PID 1480 wrote to memory of 2116 1480 f77dcf7.exe 29 PID 1480 wrote to memory of 2568 1480 f77dcf7.exe 30 PID 1480 wrote to memory of 2568 1480 f77dcf7.exe 30 PID 2568 wrote to memory of 3004 2568 rundll32.exe 32 PID 2568 wrote to memory of 3004 2568 rundll32.exe 32 PID 2568 wrote to memory of 3004 2568 rundll32.exe 32 PID 2568 wrote to memory of 3004 2568 rundll32.exe 32 PID 2568 wrote to memory of 2456 2568 rundll32.exe 33 PID 2568 wrote to memory of 2456 2568 rundll32.exe 33 PID 2568 wrote to memory of 2456 2568 rundll32.exe 33 PID 2568 wrote to memory of 2456 2568 rundll32.exe 33 PID 1480 wrote to memory of 1080 1480 f77dcf7.exe 18 PID 1480 wrote to memory of 1168 1480 f77dcf7.exe 20 PID 1480 wrote to memory of 1196 1480 f77dcf7.exe 21 PID 1480 wrote to memory of 1580 1480 f77dcf7.exe 25 PID 1480 wrote to memory of 3004 1480 f77dcf7.exe 32 PID 1480 wrote to memory of 3004 1480 f77dcf7.exe 32 PID 1480 wrote to memory of 2456 1480 f77dcf7.exe 33 PID 1480 wrote to memory of 2456 1480 f77dcf7.exe 33 PID 2456 wrote to memory of 1080 2456 f77f788.exe 18 PID 2456 wrote to memory of 1168 2456 f77f788.exe 20 PID 2456 wrote to memory of 1196 2456 f77f788.exe 21 PID 2456 wrote to memory of 1580 2456 f77f788.exe 25 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f77dcf7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f77f788.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1080
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5f12d96a700da406b98aa81af3a49b840d4b7b4f5c22927cc5f1d09f84e0eabb.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5f12d96a700da406b98aa81af3a49b840d4b7b4f5c22927cc5f1d09f84e0eabb.dll,#13⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\f77dcf7.exeC:\Users\Admin\AppData\Local\Temp\f77dcf7.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1480
-
-
C:\Users\Admin\AppData\Local\Temp\f77dfa5.exeC:\Users\Admin\AppData\Local\Temp\f77dfa5.exe4⤵
- Executes dropped EXE
PID:3004
-
-
C:\Users\Admin\AppData\Local\Temp\f77f788.exeC:\Users\Admin\AppData\Local\Temp\f77f788.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2456
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1580
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD58d85c8d235984020cae11eae9fc789de
SHA13a8e6c654d21c325bf01e650a6f6e52a9ce31bea
SHA2566f026a9a6a58d0182badcf28d8de79c8ccb8a66a28f7042a3367b1030a095db0
SHA5121a78ac7f7fcc05e7fa464afbce3485581cb09853e9af40219ad9694c96b67497506592d912e6a86c2ca5fc37eac3c3279acec5a6f5d0a0251100428ff5115b9d
-
Filesize
97KB
MD58bad2d78015be27e173496ab2031439b
SHA17e2ef9ad8fa1babd9f09b36d04336bb62fd8377b
SHA2562cc4af7da4b47d40ce8b4e0073c94e22c4450eea31e322fbd0485b9980ed6622
SHA5127e55b69c04e111e44f381791bc8dd73d23908f85a167d4f665e5de20e656e8f5e68ec614777699a483c2956608aeec65859bf68417bb53a1b7db1c4451eb8f88