Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 02:13
Static task
static1
Behavioral task
behavioral1
Sample
9af3a06787c32483f0b2bb516df5d3e78de72215efe7a183d512406aa6b26cfc.dll
Resource
win7-20240903-en
General
-
Target
9af3a06787c32483f0b2bb516df5d3e78de72215efe7a183d512406aa6b26cfc.dll
-
Size
120KB
-
MD5
5744aebab236b969abc08da4a88c3745
-
SHA1
340df8644e6bfcec8487f7a91409cb0c3d53cc7e
-
SHA256
9af3a06787c32483f0b2bb516df5d3e78de72215efe7a183d512406aa6b26cfc
-
SHA512
2c179fcc0b4ac126fb42edf9c5c53ff1bddb61a980f5a37d0b460b84b272bf18d2e0d143ead308d339975fce2f76fb039cf41f9470e5be55a586b31efaccd75c
-
SSDEEP
1536:41dVfjrQlgLiV1GLgnhBv9pB8q/JZ/qYK/bBOtR5BGqYlowz6g3tWkhu6DIR9O8:uJQa7gnHrBJ/XqYa1kRKq6o2Xu6cR9R
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f768b7d.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f768b7d.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f768b7d.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f768d03.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f768d03.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f768d03.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f768b7d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f768d03.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f768d03.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f768d03.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f768b7d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f768d03.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f768d03.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f768b7d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f768b7d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f768d03.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f768d03.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f768b7d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f768b7d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f768b7d.exe -
Executes dropped EXE 3 IoCs
pid Process 2488 f768b7d.exe 2640 f768d03.exe 2472 f76a728.exe -
Loads dropped DLL 6 IoCs
pid Process 2372 rundll32.exe 2372 rundll32.exe 2372 rundll32.exe 2372 rundll32.exe 2372 rundll32.exe 2372 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f768b7d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f768b7d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f768d03.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f768d03.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f768d03.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f768d03.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f768b7d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f768b7d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f768d03.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f768d03.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f768b7d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f768b7d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f768b7d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f768d03.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f768b7d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f768d03.exe -
Enumerates connected drives 3 TTPs 15 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: f768b7d.exe File opened (read-only) \??\R: f768b7d.exe File opened (read-only) \??\L: f768b7d.exe File opened (read-only) \??\M: f768b7d.exe File opened (read-only) \??\I: f768b7d.exe File opened (read-only) \??\P: f768b7d.exe File opened (read-only) \??\T: f768b7d.exe File opened (read-only) \??\J: f768b7d.exe File opened (read-only) \??\O: f768b7d.exe File opened (read-only) \??\H: f768b7d.exe File opened (read-only) \??\K: f768b7d.exe File opened (read-only) \??\Q: f768b7d.exe File opened (read-only) \??\S: f768b7d.exe File opened (read-only) \??\E: f768b7d.exe File opened (read-only) \??\G: f768b7d.exe -
resource yara_rule behavioral1/memory/2488-15-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2488-19-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2488-22-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2488-25-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2488-23-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2488-20-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2488-17-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2488-21-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2488-24-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2488-18-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2488-63-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2488-64-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2488-65-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2488-67-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2488-66-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2488-69-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2488-70-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2488-84-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2488-87-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2488-88-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2488-89-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2488-162-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2640-171-0x0000000000920000-0x00000000019DA000-memory.dmp upx behavioral1/memory/2640-173-0x0000000000920000-0x00000000019DA000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\f76dbfd f768d03.exe File created C:\Windows\f768bcb f768b7d.exe File opened for modification C:\Windows\SYSTEM.INI f768b7d.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f768b7d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2488 f768b7d.exe 2488 f768b7d.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 2488 f768b7d.exe Token: SeDebugPrivilege 2488 f768b7d.exe Token: SeDebugPrivilege 2488 f768b7d.exe Token: SeDebugPrivilege 2488 f768b7d.exe Token: SeDebugPrivilege 2488 f768b7d.exe Token: SeDebugPrivilege 2488 f768b7d.exe Token: SeDebugPrivilege 2488 f768b7d.exe Token: SeDebugPrivilege 2488 f768b7d.exe Token: SeDebugPrivilege 2488 f768b7d.exe Token: SeDebugPrivilege 2488 f768b7d.exe Token: SeDebugPrivilege 2488 f768b7d.exe Token: SeDebugPrivilege 2488 f768b7d.exe Token: SeDebugPrivilege 2488 f768b7d.exe Token: SeDebugPrivilege 2488 f768b7d.exe Token: SeDebugPrivilege 2488 f768b7d.exe Token: SeDebugPrivilege 2488 f768b7d.exe Token: SeDebugPrivilege 2488 f768b7d.exe Token: SeDebugPrivilege 2488 f768b7d.exe Token: SeDebugPrivilege 2488 f768b7d.exe Token: SeDebugPrivilege 2488 f768b7d.exe Token: SeDebugPrivilege 2488 f768b7d.exe Token: SeDebugPrivilege 2488 f768b7d.exe Token: SeDebugPrivilege 2488 f768b7d.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 1588 wrote to memory of 2372 1588 rundll32.exe 30 PID 1588 wrote to memory of 2372 1588 rundll32.exe 30 PID 1588 wrote to memory of 2372 1588 rundll32.exe 30 PID 1588 wrote to memory of 2372 1588 rundll32.exe 30 PID 1588 wrote to memory of 2372 1588 rundll32.exe 30 PID 1588 wrote to memory of 2372 1588 rundll32.exe 30 PID 1588 wrote to memory of 2372 1588 rundll32.exe 30 PID 2372 wrote to memory of 2488 2372 rundll32.exe 31 PID 2372 wrote to memory of 2488 2372 rundll32.exe 31 PID 2372 wrote to memory of 2488 2372 rundll32.exe 31 PID 2372 wrote to memory of 2488 2372 rundll32.exe 31 PID 2488 wrote to memory of 1112 2488 f768b7d.exe 19 PID 2488 wrote to memory of 1160 2488 f768b7d.exe 20 PID 2488 wrote to memory of 1200 2488 f768b7d.exe 21 PID 2488 wrote to memory of 836 2488 f768b7d.exe 25 PID 2488 wrote to memory of 1588 2488 f768b7d.exe 29 PID 2488 wrote to memory of 2372 2488 f768b7d.exe 30 PID 2488 wrote to memory of 2372 2488 f768b7d.exe 30 PID 2372 wrote to memory of 2640 2372 rundll32.exe 32 PID 2372 wrote to memory of 2640 2372 rundll32.exe 32 PID 2372 wrote to memory of 2640 2372 rundll32.exe 32 PID 2372 wrote to memory of 2640 2372 rundll32.exe 32 PID 2372 wrote to memory of 2472 2372 rundll32.exe 33 PID 2372 wrote to memory of 2472 2372 rundll32.exe 33 PID 2372 wrote to memory of 2472 2372 rundll32.exe 33 PID 2372 wrote to memory of 2472 2372 rundll32.exe 33 PID 2488 wrote to memory of 1112 2488 f768b7d.exe 19 PID 2488 wrote to memory of 1160 2488 f768b7d.exe 20 PID 2488 wrote to memory of 1200 2488 f768b7d.exe 21 PID 2488 wrote to memory of 836 2488 f768b7d.exe 25 PID 2488 wrote to memory of 2640 2488 f768b7d.exe 32 PID 2488 wrote to memory of 2640 2488 f768b7d.exe 32 PID 2488 wrote to memory of 2472 2488 f768b7d.exe 33 PID 2488 wrote to memory of 2472 2488 f768b7d.exe 33 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f768b7d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f768d03.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1160
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9af3a06787c32483f0b2bb516df5d3e78de72215efe7a183d512406aa6b26cfc.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9af3a06787c32483f0b2bb516df5d3e78de72215efe7a183d512406aa6b26cfc.dll,#13⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\f768b7d.exeC:\Users\Admin\AppData\Local\Temp\f768b7d.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2488
-
-
C:\Users\Admin\AppData\Local\Temp\f768d03.exeC:\Users\Admin\AppData\Local\Temp\f768d03.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System policy modification
PID:2640
-
-
C:\Users\Admin\AppData\Local\Temp\f76a728.exeC:\Users\Admin\AppData\Local\Temp\f76a728.exe4⤵
- Executes dropped EXE
PID:2472
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:836
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD5da491f0c21a3b378485ebdff915fbe14
SHA1962aedd8e0ced2a205e5d9365fb4d8ecafa90c37
SHA256c4679db85f9188eb4db5f5167ed48e4458a54b584759d0007ed783d898921cfe
SHA5127d5b6cf3a7518cf19b2765f5b9b3d424f82f856f43b001b721d8bd808ac922816d4a9ee13ae281177d4d84c2ad3a1db37a34684a737d8fab8bc6b93991766740
-
Filesize
97KB
MD561dfc27d99cac37b1852708e16aad96c
SHA1c307de2d9fa9c6e9228ca11b0cd9c7de0aed25ab
SHA25685df0ddba90caa8cabffccf5a7eb0cb7e37e2d4e638f721f82d369dd67bb5474
SHA512c167acac4b08b4109aed90d1879ea3cc022d399b09beed64d020747e3a21d0af22da877a585901d99c90b8f34c9d5a7fab076fc5ee1f308c709d38564561c4ae