Analysis
-
max time kernel
94s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 05:06
Static task
static1
Behavioral task
behavioral1
Sample
fefea8e1a6ecc5da4a6d5b866d6d76f980057024a14839535bdfbfa4037af146.exe
Resource
win7-20240903-en
General
-
Target
fefea8e1a6ecc5da4a6d5b866d6d76f980057024a14839535bdfbfa4037af146.exe
-
Size
233KB
-
MD5
17ee3c2250938b2fb46312d789b08d62
-
SHA1
3bbf0e1f52089271177d551106ec8005ddca691f
-
SHA256
fefea8e1a6ecc5da4a6d5b866d6d76f980057024a14839535bdfbfa4037af146
-
SHA512
14e0ac92b2045d41e9fe30a0949d6aff523c400fcc2c068d93e95970ac7baed68418ba53e74038560b3d778969c62b1bf81f6899e9400825a4d4f5a538a59d7d
-
SSDEEP
3072:WIBB9unXkWF+JlsEh9bgVrWcQA0b+tLtRW81Cmaevxrc2hc1oIUXtT:WIB20hJlsEbbgNtCwCmZxrc2W2T
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" fefea8e1a6ecc5da4a6d5b866d6d76f980057024a14839535bdfbfa4037af146.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" fefea8e1a6ecc5da4a6d5b866d6d76f980057024a14839535bdfbfa4037af146.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" fefea8e1a6ecc5da4a6d5b866d6d76f980057024a14839535bdfbfa4037af146.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" fefea8e1a6ecc5da4a6d5b866d6d76f980057024a14839535bdfbfa4037af146.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" fefea8e1a6ecc5da4a6d5b866d6d76f980057024a14839535bdfbfa4037af146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" fefea8e1a6ecc5da4a6d5b866d6d76f980057024a14839535bdfbfa4037af146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" fefea8e1a6ecc5da4a6d5b866d6d76f980057024a14839535bdfbfa4037af146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" fefea8e1a6ecc5da4a6d5b866d6d76f980057024a14839535bdfbfa4037af146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" fefea8e1a6ecc5da4a6d5b866d6d76f980057024a14839535bdfbfa4037af146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" fefea8e1a6ecc5da4a6d5b866d6d76f980057024a14839535bdfbfa4037af146.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" fefea8e1a6ecc5da4a6d5b866d6d76f980057024a14839535bdfbfa4037af146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" fefea8e1a6ecc5da4a6d5b866d6d76f980057024a14839535bdfbfa4037af146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" fefea8e1a6ecc5da4a6d5b866d6d76f980057024a14839535bdfbfa4037af146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" fefea8e1a6ecc5da4a6d5b866d6d76f980057024a14839535bdfbfa4037af146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" fefea8e1a6ecc5da4a6d5b866d6d76f980057024a14839535bdfbfa4037af146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" fefea8e1a6ecc5da4a6d5b866d6d76f980057024a14839535bdfbfa4037af146.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc fefea8e1a6ecc5da4a6d5b866d6d76f980057024a14839535bdfbfa4037af146.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" fefea8e1a6ecc5da4a6d5b866d6d76f980057024a14839535bdfbfa4037af146.exe -
resource yara_rule behavioral2/memory/4996-3-0x0000000002370000-0x00000000033FE000-memory.dmp upx behavioral2/memory/4996-4-0x0000000002370000-0x00000000033FE000-memory.dmp upx behavioral2/memory/4996-6-0x0000000002370000-0x00000000033FE000-memory.dmp upx behavioral2/memory/4996-10-0x0000000002370000-0x00000000033FE000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI fefea8e1a6ecc5da4a6d5b866d6d76f980057024a14839535bdfbfa4037af146.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fefea8e1a6ecc5da4a6d5b866d6d76f980057024a14839535bdfbfa4037af146.exe -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" fefea8e1a6ecc5da4a6d5b866d6d76f980057024a14839535bdfbfa4037af146.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fefea8e1a6ecc5da4a6d5b866d6d76f980057024a14839535bdfbfa4037af146.exe"C:\Users\Admin\AppData\Local\Temp\fefea8e1a6ecc5da4a6d5b866d6d76f980057024a14839535bdfbfa4037af146.exe"1⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- System policy modification
PID:4996
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5