Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2024, 03:45

General

  • Target

    472e7eceb636ce92e20ecde97caaffa0e9557e37a53908be114c788e8dbef401N.dll

  • Size

    120KB

  • MD5

    9fd003a439786908418c8fce5ea51470

  • SHA1

    d4df1496b2d9ea077fd2008f8090363ba496314e

  • SHA256

    472e7eceb636ce92e20ecde97caaffa0e9557e37a53908be114c788e8dbef401

  • SHA512

    cfa3ce90c25ebee370e2b5b63f603cd84fd024e527211b627308aa34c67640a994e0c19fc3b87e70aea66922ad816d269eb943fde3daffd0fcdcf80239354491

  • SSDEEP

    1536:6v0GWwxXsfqK7LYNLdXl9ef9TiNr1ZJ+EAHW1gXQz3x9U7emjHKD:s0GWw9dKXYNJXlEF2Nr1X+E2A9yeKH

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Signatures

  • Modifies firewall policy service 3 TTPs 6 IoCs
  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • Sality family
  • UAC bypass 3 TTPs 2 IoCs
  • Windows security bypass 2 TTPs 12 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Windows security modification 2 TTPs 14 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 15 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • UPX packed file 23 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1104
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1204
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1240
          • C:\Windows\system32\rundll32.exe
            rundll32.exe C:\Users\Admin\AppData\Local\Temp\472e7eceb636ce92e20ecde97caaffa0e9557e37a53908be114c788e8dbef401N.dll,#1
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2208
            • C:\Windows\SysWOW64\rundll32.exe
              rundll32.exe C:\Users\Admin\AppData\Local\Temp\472e7eceb636ce92e20ecde97caaffa0e9557e37a53908be114c788e8dbef401N.dll,#1
              3⤵
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2732
              • C:\Users\Admin\AppData\Local\Temp\f777723.exe
                C:\Users\Admin\AppData\Local\Temp\f777723.exe
                4⤵
                • Modifies firewall policy service
                • UAC bypass
                • Windows security bypass
                • Executes dropped EXE
                • Windows security modification
                • Checks whether UAC is enabled
                • Enumerates connected drives
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                • System policy modification
                PID:2448
              • C:\Users\Admin\AppData\Local\Temp\f777a9c.exe
                C:\Users\Admin\AppData\Local\Temp\f777a9c.exe
                4⤵
                • Executes dropped EXE
                PID:2644
              • C:\Users\Admin\AppData\Local\Temp\f77908c.exe
                C:\Users\Admin\AppData\Local\Temp\f77908c.exe
                4⤵
                • Modifies firewall policy service
                • UAC bypass
                • Windows security bypass
                • Executes dropped EXE
                • Windows security modification
                • Checks whether UAC is enabled
                • Enumerates connected drives
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                • System policy modification
                PID:1780
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1364

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SYSTEM.INI

            Filesize

            257B

            MD5

            6c30fe5094bfc05ad75d5ab444e9b0c7

            SHA1

            8421a3742603f31c92d4a9a5affd9745ce3eb5d4

            SHA256

            a308088763d3e0d9a28df9a06170174edaaecad4b07557059a4e297b22b868ca

            SHA512

            736aa7856bd9c7a76cf65e140561c826cb1a5263b14ef059aac17b9b5d6c4b8bea4a8247c72c383f1c212be0db963574d24860d7e99d8e5b4b6e21370de3762f

          • \Users\Admin\AppData\Local\Temp\f777723.exe

            Filesize

            97KB

            MD5

            4b0b9ce919103425acc2123f6b431d27

            SHA1

            9e981ea26b0d05de64ff6da14475e27101a2f5f7

            SHA256

            8fb21dec3a9fa1724b11a0f2aa18bd9d71c2afb9255dcbe4fe5aa1a0ebd1f14f

            SHA512

            ee61fd0aed5639e58bcd1629d9556be0ffb6e414e5976334dac67c6807f21390aaab4ac74cc190cf991d4605629e7d17bff8d12feccc72072832c67aa298ff0b

          • memory/1104-30-0x0000000001C60000-0x0000000001C62000-memory.dmp

            Filesize

            8KB

          • memory/1780-207-0x0000000000400000-0x0000000000412000-memory.dmp

            Filesize

            72KB

          • memory/1780-208-0x0000000000910000-0x00000000019CA000-memory.dmp

            Filesize

            16.7MB

          • memory/1780-162-0x0000000000910000-0x00000000019CA000-memory.dmp

            Filesize

            16.7MB

          • memory/1780-155-0x0000000000270000-0x0000000000272000-memory.dmp

            Filesize

            8KB

          • memory/1780-111-0x0000000000270000-0x0000000000272000-memory.dmp

            Filesize

            8KB

          • memory/1780-110-0x0000000000280000-0x0000000000281000-memory.dmp

            Filesize

            4KB

          • memory/1780-85-0x0000000000400000-0x0000000000412000-memory.dmp

            Filesize

            72KB

          • memory/2448-65-0x0000000000710000-0x00000000017CA000-memory.dmp

            Filesize

            16.7MB

          • memory/2448-59-0x00000000003F0000-0x00000000003F2000-memory.dmp

            Filesize

            8KB

          • memory/2448-91-0x0000000000710000-0x00000000017CA000-memory.dmp

            Filesize

            16.7MB

          • memory/2448-24-0x0000000000710000-0x00000000017CA000-memory.dmp

            Filesize

            16.7MB

          • memory/2448-23-0x0000000000710000-0x00000000017CA000-memory.dmp

            Filesize

            16.7MB

          • memory/2448-51-0x00000000003F0000-0x00000000003F2000-memory.dmp

            Filesize

            8KB

          • memory/2448-20-0x0000000000710000-0x00000000017CA000-memory.dmp

            Filesize

            16.7MB

          • memory/2448-18-0x0000000000710000-0x00000000017CA000-memory.dmp

            Filesize

            16.7MB

          • memory/2448-49-0x00000000004E0000-0x00000000004E1000-memory.dmp

            Filesize

            4KB

          • memory/2448-13-0x0000000000400000-0x0000000000412000-memory.dmp

            Filesize

            72KB

          • memory/2448-17-0x0000000000710000-0x00000000017CA000-memory.dmp

            Filesize

            16.7MB

          • memory/2448-22-0x0000000000710000-0x00000000017CA000-memory.dmp

            Filesize

            16.7MB

          • memory/2448-14-0x0000000000710000-0x00000000017CA000-memory.dmp

            Filesize

            16.7MB

          • memory/2448-90-0x0000000000710000-0x00000000017CA000-memory.dmp

            Filesize

            16.7MB

          • memory/2448-19-0x0000000000710000-0x00000000017CA000-memory.dmp

            Filesize

            16.7MB

          • memory/2448-16-0x0000000000710000-0x00000000017CA000-memory.dmp

            Filesize

            16.7MB

          • memory/2448-154-0x0000000000710000-0x00000000017CA000-memory.dmp

            Filesize

            16.7MB

          • memory/2448-88-0x0000000000710000-0x00000000017CA000-memory.dmp

            Filesize

            16.7MB

          • memory/2448-153-0x0000000000400000-0x0000000000412000-memory.dmp

            Filesize

            72KB

          • memory/2448-64-0x0000000000710000-0x00000000017CA000-memory.dmp

            Filesize

            16.7MB

          • memory/2448-66-0x0000000000710000-0x00000000017CA000-memory.dmp

            Filesize

            16.7MB

          • memory/2448-68-0x0000000000710000-0x00000000017CA000-memory.dmp

            Filesize

            16.7MB

          • memory/2448-67-0x0000000000710000-0x00000000017CA000-memory.dmp

            Filesize

            16.7MB

          • memory/2448-70-0x0000000000710000-0x00000000017CA000-memory.dmp

            Filesize

            16.7MB

          • memory/2448-86-0x0000000000710000-0x00000000017CA000-memory.dmp

            Filesize

            16.7MB

          • memory/2448-84-0x00000000003F0000-0x00000000003F2000-memory.dmp

            Filesize

            8KB

          • memory/2448-21-0x0000000000710000-0x00000000017CA000-memory.dmp

            Filesize

            16.7MB

          • memory/2644-102-0x0000000000220000-0x0000000000222000-memory.dmp

            Filesize

            8KB

          • memory/2644-101-0x0000000000230000-0x0000000000231000-memory.dmp

            Filesize

            4KB

          • memory/2644-130-0x0000000000220000-0x0000000000222000-memory.dmp

            Filesize

            8KB

          • memory/2644-103-0x0000000000220000-0x0000000000222000-memory.dmp

            Filesize

            8KB

          • memory/2644-184-0x0000000000400000-0x0000000000412000-memory.dmp

            Filesize

            72KB

          • memory/2644-63-0x0000000000400000-0x0000000000412000-memory.dmp

            Filesize

            72KB

          • memory/2732-40-0x0000000000230000-0x0000000000231000-memory.dmp

            Filesize

            4KB

          • memory/2732-2-0x0000000010000000-0x0000000010020000-memory.dmp

            Filesize

            128KB

          • memory/2732-78-0x00000000001A0000-0x00000000001A2000-memory.dmp

            Filesize

            8KB

          • memory/2732-80-0x00000000002E0000-0x00000000002F2000-memory.dmp

            Filesize

            72KB

          • memory/2732-83-0x00000000000B0000-0x00000000000B6000-memory.dmp

            Filesize

            24KB

          • memory/2732-4-0x0000000010000000-0x0000000010020000-memory.dmp

            Filesize

            128KB

          • memory/2732-0-0x0000000010000000-0x0000000010020000-memory.dmp

            Filesize

            128KB

          • memory/2732-1-0x0000000010000000-0x0000000010020000-memory.dmp

            Filesize

            128KB

          • memory/2732-60-0x00000000002C0000-0x00000000002D2000-memory.dmp

            Filesize

            72KB

          • memory/2732-61-0x00000000001A0000-0x00000000001A2000-memory.dmp

            Filesize

            8KB

          • memory/2732-8-0x00000000000B0000-0x00000000000C2000-memory.dmp

            Filesize

            72KB

          • memory/2732-39-0x00000000001A0000-0x00000000001A2000-memory.dmp

            Filesize

            8KB

          • memory/2732-58-0x00000000001A0000-0x00000000001A2000-memory.dmp

            Filesize

            8KB

          • memory/2732-48-0x0000000000230000-0x0000000000231000-memory.dmp

            Filesize

            4KB