Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 03:04
Static task
static1
Behavioral task
behavioral1
Sample
2ee0ab6fc50b00936e7cb2c7ae1abcf4aa152fc304b32e33010d98389c4814af.dll
Resource
win7-20241010-en
General
-
Target
2ee0ab6fc50b00936e7cb2c7ae1abcf4aa152fc304b32e33010d98389c4814af.dll
-
Size
120KB
-
MD5
0f858d4df8ad775f22fdb22d7e8cecca
-
SHA1
7b5f3bb9c4809d0e14cede221d87a3a2a2cda685
-
SHA256
2ee0ab6fc50b00936e7cb2c7ae1abcf4aa152fc304b32e33010d98389c4814af
-
SHA512
d4ba91061695230f901abafdb886003a2555158bcec9304c1c02dcae361c75ed259c48f5398f17d43f9667faf5f96bdfc58a2391143eb2ac31f5389220c933c6
-
SSDEEP
1536:R1/ZY5nu2RTjfIQNbx6orpDmzL51pokxu9h7aTCFUv2rQ4str3c5E5bYLcpik6e1:5wuq8Qn54HXuWuA2rDstIilp+W
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76a65d.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76a65d.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76a65d.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76c217.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76c217.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76c217.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76a65d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76c217.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76c217.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76a65d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76a65d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76a65d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76a65d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76a65d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76c217.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76c217.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76c217.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76a65d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76c217.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76c217.exe -
Executes dropped EXE 3 IoCs
pid Process 2368 f76a65d.exe 2812 f76a841.exe 2720 f76c217.exe -
Loads dropped DLL 6 IoCs
pid Process 2116 rundll32.exe 2116 rundll32.exe 2116 rundll32.exe 2116 rundll32.exe 2116 rundll32.exe 2116 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76a65d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76a65d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76c217.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76c217.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76c217.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76c217.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76a65d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76c217.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76a65d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76a65d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76a65d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76a65d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76c217.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76c217.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76c217.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76a65d.exe -
Enumerates connected drives 3 TTPs 16 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: f76a65d.exe File opened (read-only) \??\H: f76a65d.exe File opened (read-only) \??\K: f76a65d.exe File opened (read-only) \??\N: f76a65d.exe File opened (read-only) \??\R: f76a65d.exe File opened (read-only) \??\I: f76a65d.exe File opened (read-only) \??\J: f76a65d.exe File opened (read-only) \??\O: f76a65d.exe File opened (read-only) \??\P: f76a65d.exe File opened (read-only) \??\S: f76a65d.exe File opened (read-only) \??\E: f76a65d.exe File opened (read-only) \??\M: f76a65d.exe File opened (read-only) \??\L: f76a65d.exe File opened (read-only) \??\Q: f76a65d.exe File opened (read-only) \??\E: f76c217.exe File opened (read-only) \??\G: f76c217.exe -
resource yara_rule behavioral1/memory/2368-12-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2368-15-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2368-18-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2368-22-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2368-20-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2368-19-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2368-17-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2368-16-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2368-14-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2368-21-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2368-61-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2368-60-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2368-62-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2368-63-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2368-64-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2368-66-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2368-67-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2368-81-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2368-82-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2368-86-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2368-105-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2368-106-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2368-152-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2720-164-0x0000000000930000-0x00000000019EA000-memory.dmp upx behavioral1/memory/2720-204-0x0000000000930000-0x00000000019EA000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\f76a6ab f76a65d.exe File opened for modification C:\Windows\SYSTEM.INI f76a65d.exe File created C:\Windows\f76f670 f76c217.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76a65d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76c217.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2368 f76a65d.exe 2368 f76a65d.exe 2720 f76c217.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeDebugPrivilege 2368 f76a65d.exe Token: SeDebugPrivilege 2368 f76a65d.exe Token: SeDebugPrivilege 2368 f76a65d.exe Token: SeDebugPrivilege 2368 f76a65d.exe Token: SeDebugPrivilege 2368 f76a65d.exe Token: SeDebugPrivilege 2368 f76a65d.exe Token: SeDebugPrivilege 2368 f76a65d.exe Token: SeDebugPrivilege 2368 f76a65d.exe Token: SeDebugPrivilege 2368 f76a65d.exe Token: SeDebugPrivilege 2368 f76a65d.exe Token: SeDebugPrivilege 2368 f76a65d.exe Token: SeDebugPrivilege 2368 f76a65d.exe Token: SeDebugPrivilege 2368 f76a65d.exe Token: SeDebugPrivilege 2368 f76a65d.exe Token: SeDebugPrivilege 2368 f76a65d.exe Token: SeDebugPrivilege 2368 f76a65d.exe Token: SeDebugPrivilege 2368 f76a65d.exe Token: SeDebugPrivilege 2368 f76a65d.exe Token: SeDebugPrivilege 2368 f76a65d.exe Token: SeDebugPrivilege 2368 f76a65d.exe Token: SeDebugPrivilege 2368 f76a65d.exe Token: SeDebugPrivilege 2368 f76a65d.exe Token: SeDebugPrivilege 2368 f76a65d.exe Token: SeDebugPrivilege 2368 f76a65d.exe Token: SeDebugPrivilege 2720 f76c217.exe Token: SeDebugPrivilege 2720 f76c217.exe Token: SeDebugPrivilege 2720 f76c217.exe Token: SeDebugPrivilege 2720 f76c217.exe Token: SeDebugPrivilege 2720 f76c217.exe Token: SeDebugPrivilege 2720 f76c217.exe Token: SeDebugPrivilege 2720 f76c217.exe Token: SeDebugPrivilege 2720 f76c217.exe Token: SeDebugPrivilege 2720 f76c217.exe Token: SeDebugPrivilege 2720 f76c217.exe Token: SeDebugPrivilege 2720 f76c217.exe Token: SeDebugPrivilege 2720 f76c217.exe Token: SeDebugPrivilege 2720 f76c217.exe Token: SeDebugPrivilege 2720 f76c217.exe Token: SeDebugPrivilege 2720 f76c217.exe Token: SeDebugPrivilege 2720 f76c217.exe Token: SeDebugPrivilege 2720 f76c217.exe Token: SeDebugPrivilege 2720 f76c217.exe Token: SeDebugPrivilege 2720 f76c217.exe Token: SeDebugPrivilege 2720 f76c217.exe Token: SeDebugPrivilege 2720 f76c217.exe Token: SeDebugPrivilege 2720 f76c217.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1504 wrote to memory of 2116 1504 rundll32.exe 30 PID 1504 wrote to memory of 2116 1504 rundll32.exe 30 PID 1504 wrote to memory of 2116 1504 rundll32.exe 30 PID 1504 wrote to memory of 2116 1504 rundll32.exe 30 PID 1504 wrote to memory of 2116 1504 rundll32.exe 30 PID 1504 wrote to memory of 2116 1504 rundll32.exe 30 PID 1504 wrote to memory of 2116 1504 rundll32.exe 30 PID 2116 wrote to memory of 2368 2116 rundll32.exe 31 PID 2116 wrote to memory of 2368 2116 rundll32.exe 31 PID 2116 wrote to memory of 2368 2116 rundll32.exe 31 PID 2116 wrote to memory of 2368 2116 rundll32.exe 31 PID 2368 wrote to memory of 1100 2368 f76a65d.exe 19 PID 2368 wrote to memory of 1168 2368 f76a65d.exe 20 PID 2368 wrote to memory of 1200 2368 f76a65d.exe 21 PID 2368 wrote to memory of 1544 2368 f76a65d.exe 23 PID 2368 wrote to memory of 1504 2368 f76a65d.exe 29 PID 2368 wrote to memory of 2116 2368 f76a65d.exe 30 PID 2368 wrote to memory of 2116 2368 f76a65d.exe 30 PID 2116 wrote to memory of 2812 2116 rundll32.exe 32 PID 2116 wrote to memory of 2812 2116 rundll32.exe 32 PID 2116 wrote to memory of 2812 2116 rundll32.exe 32 PID 2116 wrote to memory of 2812 2116 rundll32.exe 32 PID 2116 wrote to memory of 2720 2116 rundll32.exe 33 PID 2116 wrote to memory of 2720 2116 rundll32.exe 33 PID 2116 wrote to memory of 2720 2116 rundll32.exe 33 PID 2116 wrote to memory of 2720 2116 rundll32.exe 33 PID 2368 wrote to memory of 1100 2368 f76a65d.exe 19 PID 2368 wrote to memory of 1168 2368 f76a65d.exe 20 PID 2368 wrote to memory of 1200 2368 f76a65d.exe 21 PID 2368 wrote to memory of 1544 2368 f76a65d.exe 23 PID 2368 wrote to memory of 2812 2368 f76a65d.exe 32 PID 2368 wrote to memory of 2812 2368 f76a65d.exe 32 PID 2368 wrote to memory of 2720 2368 f76a65d.exe 33 PID 2368 wrote to memory of 2720 2368 f76a65d.exe 33 PID 2720 wrote to memory of 1100 2720 f76c217.exe 19 PID 2720 wrote to memory of 1168 2720 f76c217.exe 20 PID 2720 wrote to memory of 1200 2720 f76c217.exe 21 PID 2720 wrote to memory of 1544 2720 f76c217.exe 23 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76a65d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76c217.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1100
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2ee0ab6fc50b00936e7cb2c7ae1abcf4aa152fc304b32e33010d98389c4814af.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2ee0ab6fc50b00936e7cb2c7ae1abcf4aa152fc304b32e33010d98389c4814af.dll,#13⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\f76a65d.exeC:\Users\Admin\AppData\Local\Temp\f76a65d.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2368
-
-
C:\Users\Admin\AppData\Local\Temp\f76a841.exeC:\Users\Admin\AppData\Local\Temp\f76a841.exe4⤵
- Executes dropped EXE
PID:2812
-
-
C:\Users\Admin\AppData\Local\Temp\f76c217.exeC:\Users\Admin\AppData\Local\Temp\f76c217.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2720
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1544
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD57f5c6c03acbec5931d31c3e3ab96bc86
SHA1eda55703abd3fe2d073183b20fa40f414a6a4eea
SHA2563d126f19cb14bd4f7e561b95e03516abea4cb74596a8d926f58346d56805478b
SHA5125d8d73684fcf7ac2f9b45b041a8c822fa9508d632c97812c84aab17adcb24f3d4e7cbdaf1e302d62a9fa5bf6031bd88479e21c226c94158b0d3f78bb45ead7c9
-
Filesize
257B
MD572abd50b18e22a5e5ceedac256722028
SHA18a592790de8fd87de8debee5667dcaa94f4e4367
SHA2561d6214c5ae40865d401ed6d397123b0666e82d1043e89bce6b78b60ac5092597
SHA512016969e1c51ceb5aa284a19e836eb5d57bb73a2efed724a771b03927e65621b63617b6a0abc30843d952b7ecff5f920116d1f306a5388ed492ad7742395e9501