Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 06:47
Static task
static1
Behavioral task
behavioral1
Sample
906112bff82ce544eb488aa538bc50644038d743c75fdc74c5b7eb9281be6b2c.dll
Resource
win7-20240903-en
General
-
Target
906112bff82ce544eb488aa538bc50644038d743c75fdc74c5b7eb9281be6b2c.dll
-
Size
120KB
-
MD5
4e079bea91961cb95b37607a010c8092
-
SHA1
5f9fdd19170ab411176f9eb6ed7e4a7b76a70560
-
SHA256
906112bff82ce544eb488aa538bc50644038d743c75fdc74c5b7eb9281be6b2c
-
SHA512
0c7fd5959c8eedc391c0e194a845df35062df6780392286cd41d270f7a4c3b26bb1ae6cc324a3be88811115ac1d5bad5c4f6cf9d9b026332161d58081061cfef
-
SSDEEP
3072:qeONJ7+0EOpva/JtKhikimqfD7N4FMjLnL5+kfa0y:PObtD18gJqfD6FUL5+kfa0y
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76ad5f.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76af04.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76af04.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76af04.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76ad5f.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76ad5f.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76ad5f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76af04.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76af04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76af04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76ad5f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76ad5f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76ad5f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76ad5f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76ad5f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76af04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76ad5f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76af04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76af04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76af04.exe -
Executes dropped EXE 3 IoCs
pid Process 348 f76ad5f.exe 2740 f76af04.exe 2696 f76c8fa.exe -
Loads dropped DLL 6 IoCs
pid Process 2068 rundll32.exe 2068 rundll32.exe 2068 rundll32.exe 2068 rundll32.exe 2068 rundll32.exe 2068 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76ad5f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76ad5f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76af04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76ad5f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76ad5f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76ad5f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76af04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76af04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76af04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76ad5f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76af04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76af04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76af04.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76ad5f.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76ad5f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76af04.exe -
Enumerates connected drives 3 TTPs 15 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: f76ad5f.exe File opened (read-only) \??\G: f76ad5f.exe File opened (read-only) \??\J: f76ad5f.exe File opened (read-only) \??\L: f76ad5f.exe File opened (read-only) \??\M: f76ad5f.exe File opened (read-only) \??\H: f76ad5f.exe File opened (read-only) \??\I: f76ad5f.exe File opened (read-only) \??\N: f76ad5f.exe File opened (read-only) \??\P: f76ad5f.exe File opened (read-only) \??\Q: f76ad5f.exe File opened (read-only) \??\T: f76ad5f.exe File opened (read-only) \??\E: f76ad5f.exe File opened (read-only) \??\K: f76ad5f.exe File opened (read-only) \??\O: f76ad5f.exe File opened (read-only) \??\S: f76ad5f.exe -
resource yara_rule behavioral1/memory/348-12-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/348-17-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/348-19-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/348-14-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/348-22-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/348-21-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/348-20-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/348-18-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/348-16-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/348-15-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/348-60-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/348-61-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/348-62-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/348-63-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/348-64-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/348-66-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/348-67-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/348-81-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/348-84-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/348-83-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/348-86-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/348-106-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/348-155-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/2740-168-0x0000000000990000-0x0000000001A4A000-memory.dmp upx behavioral1/memory/2740-197-0x0000000000990000-0x0000000001A4A000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI f76ad5f.exe File created C:\Windows\f76fda0 f76af04.exe File created C:\Windows\f76addc f76ad5f.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76ad5f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76af04.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 348 f76ad5f.exe 348 f76ad5f.exe 2740 f76af04.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeDebugPrivilege 348 f76ad5f.exe Token: SeDebugPrivilege 348 f76ad5f.exe Token: SeDebugPrivilege 348 f76ad5f.exe Token: SeDebugPrivilege 348 f76ad5f.exe Token: SeDebugPrivilege 348 f76ad5f.exe Token: SeDebugPrivilege 348 f76ad5f.exe Token: SeDebugPrivilege 348 f76ad5f.exe Token: SeDebugPrivilege 348 f76ad5f.exe Token: SeDebugPrivilege 348 f76ad5f.exe Token: SeDebugPrivilege 348 f76ad5f.exe Token: SeDebugPrivilege 348 f76ad5f.exe Token: SeDebugPrivilege 348 f76ad5f.exe Token: SeDebugPrivilege 348 f76ad5f.exe Token: SeDebugPrivilege 348 f76ad5f.exe Token: SeDebugPrivilege 348 f76ad5f.exe Token: SeDebugPrivilege 348 f76ad5f.exe Token: SeDebugPrivilege 348 f76ad5f.exe Token: SeDebugPrivilege 348 f76ad5f.exe Token: SeDebugPrivilege 348 f76ad5f.exe Token: SeDebugPrivilege 348 f76ad5f.exe Token: SeDebugPrivilege 348 f76ad5f.exe Token: SeDebugPrivilege 348 f76ad5f.exe Token: SeDebugPrivilege 348 f76ad5f.exe Token: SeDebugPrivilege 348 f76ad5f.exe Token: SeDebugPrivilege 2740 f76af04.exe Token: SeDebugPrivilege 2740 f76af04.exe Token: SeDebugPrivilege 2740 f76af04.exe Token: SeDebugPrivilege 2740 f76af04.exe Token: SeDebugPrivilege 2740 f76af04.exe Token: SeDebugPrivilege 2740 f76af04.exe Token: SeDebugPrivilege 2740 f76af04.exe Token: SeDebugPrivilege 2740 f76af04.exe Token: SeDebugPrivilege 2740 f76af04.exe Token: SeDebugPrivilege 2740 f76af04.exe Token: SeDebugPrivilege 2740 f76af04.exe Token: SeDebugPrivilege 2740 f76af04.exe Token: SeDebugPrivilege 2740 f76af04.exe Token: SeDebugPrivilege 2740 f76af04.exe Token: SeDebugPrivilege 2740 f76af04.exe Token: SeDebugPrivilege 2740 f76af04.exe Token: SeDebugPrivilege 2740 f76af04.exe Token: SeDebugPrivilege 2740 f76af04.exe Token: SeDebugPrivilege 2740 f76af04.exe Token: SeDebugPrivilege 2740 f76af04.exe Token: SeDebugPrivilege 2740 f76af04.exe Token: SeDebugPrivilege 2740 f76af04.exe Token: SeDebugPrivilege 2740 f76af04.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2068 2160 rundll32.exe 30 PID 2160 wrote to memory of 2068 2160 rundll32.exe 30 PID 2160 wrote to memory of 2068 2160 rundll32.exe 30 PID 2160 wrote to memory of 2068 2160 rundll32.exe 30 PID 2160 wrote to memory of 2068 2160 rundll32.exe 30 PID 2160 wrote to memory of 2068 2160 rundll32.exe 30 PID 2160 wrote to memory of 2068 2160 rundll32.exe 30 PID 2068 wrote to memory of 348 2068 rundll32.exe 31 PID 2068 wrote to memory of 348 2068 rundll32.exe 31 PID 2068 wrote to memory of 348 2068 rundll32.exe 31 PID 2068 wrote to memory of 348 2068 rundll32.exe 31 PID 348 wrote to memory of 1124 348 f76ad5f.exe 19 PID 348 wrote to memory of 1192 348 f76ad5f.exe 20 PID 348 wrote to memory of 1216 348 f76ad5f.exe 21 PID 348 wrote to memory of 1664 348 f76ad5f.exe 25 PID 348 wrote to memory of 2160 348 f76ad5f.exe 29 PID 348 wrote to memory of 2068 348 f76ad5f.exe 30 PID 348 wrote to memory of 2068 348 f76ad5f.exe 30 PID 2068 wrote to memory of 2740 2068 rundll32.exe 32 PID 2068 wrote to memory of 2740 2068 rundll32.exe 32 PID 2068 wrote to memory of 2740 2068 rundll32.exe 32 PID 2068 wrote to memory of 2740 2068 rundll32.exe 32 PID 2068 wrote to memory of 2696 2068 rundll32.exe 33 PID 2068 wrote to memory of 2696 2068 rundll32.exe 33 PID 2068 wrote to memory of 2696 2068 rundll32.exe 33 PID 2068 wrote to memory of 2696 2068 rundll32.exe 33 PID 348 wrote to memory of 1124 348 f76ad5f.exe 19 PID 348 wrote to memory of 1192 348 f76ad5f.exe 20 PID 348 wrote to memory of 1216 348 f76ad5f.exe 21 PID 348 wrote to memory of 1664 348 f76ad5f.exe 25 PID 348 wrote to memory of 2740 348 f76ad5f.exe 32 PID 348 wrote to memory of 2740 348 f76ad5f.exe 32 PID 348 wrote to memory of 2696 348 f76ad5f.exe 33 PID 348 wrote to memory of 2696 348 f76ad5f.exe 33 PID 2740 wrote to memory of 1124 2740 f76af04.exe 19 PID 2740 wrote to memory of 1192 2740 f76af04.exe 20 PID 2740 wrote to memory of 1216 2740 f76af04.exe 21 PID 2740 wrote to memory of 1664 2740 f76af04.exe 25 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76af04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76ad5f.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1124
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1192
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\906112bff82ce544eb488aa538bc50644038d743c75fdc74c5b7eb9281be6b2c.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\906112bff82ce544eb488aa538bc50644038d743c75fdc74c5b7eb9281be6b2c.dll,#13⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\f76ad5f.exeC:\Users\Admin\AppData\Local\Temp\f76ad5f.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:348
-
-
C:\Users\Admin\AppData\Local\Temp\f76af04.exeC:\Users\Admin\AppData\Local\Temp\f76af04.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2740
-
-
C:\Users\Admin\AppData\Local\Temp\f76c8fa.exeC:\Users\Admin\AppData\Local\Temp\f76c8fa.exe4⤵
- Executes dropped EXE
PID:2696
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1664
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD520a2b61174d07dad1c61f7d029a20a35
SHA1d7786923df8b6ae035ce226b2cd4c2faffe90e9a
SHA25674a40cc0bd80e1ad4ea47acdfa46ec24c75e210f814078aa61450cf507c14005
SHA5123064cb990110f197d9816cd3cdf4cdb5db2636c315e84c8935aea4926e311bd9f4c294b8f94a691aa0cecadb4b346c00199e49d3989671819b82bd9500e17f3b
-
Filesize
97KB
MD5e824e90442b856fc203994d2989653e2
SHA1019f423ef78b2b1795f6da9404248600429ebac1
SHA2568a3215ee3a3b271bbb00c73ed55695cdd28fdef0fd0e35fa5ccd0b010464e207
SHA512ffbb19c2d9aad51a893571937d4a47891a2e7c0ff6a4e8534f5dce495d365b467c252e616cafc6379137bb40da8c656c6e93eed01f92bbda8c495f7c00e67a69