Analysis

  • max time kernel
    24s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2024 13:13

General

  • Target

    108f4eec35d3b8ee35d7df02792d2ff0b074680a061b2695e672ca5554cfc193N.exe

  • Size

    297KB

  • MD5

    4f717645c687c296b017afbf435403f0

  • SHA1

    afe1afccd46050371da351f9b4bedf467b81219c

  • SHA256

    108f4eec35d3b8ee35d7df02792d2ff0b074680a061b2695e672ca5554cfc193

  • SHA512

    1f35598664a619000ad9109f91bf43f33b70147ffcd6449ea29d9d3375687dd71552c41d4000178ede997c085ffd02ae87eaa31f72e87e7d797fe8ac37459418

  • SSDEEP

    6144:MvEE2U+T6i5LirrllHy4HUcMQY6AyPE8+aES85f/M1:eEEN+T5xYrllrU7QY6Am+aES8tk1

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies firewall policy service 3 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • Sality family
  • UAC bypass 3 TTPs 2 IoCs
  • Windows security bypass 2 TTPs 12 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 5 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 14 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 4 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • UPX packed file 21 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1112
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1164
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1208
          • C:\Users\Admin\AppData\Local\Temp\108f4eec35d3b8ee35d7df02792d2ff0b074680a061b2695e672ca5554cfc193N.exe
            "C:\Users\Admin\AppData\Local\Temp\108f4eec35d3b8ee35d7df02792d2ff0b074680a061b2695e672ca5554cfc193N.exe"
            2⤵
            • Modifies firewall policy service
            • UAC bypass
            • Windows security bypass
            • Loads dropped DLL
            • Windows security modification
            • Checks whether UAC is enabled
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:2668
            • \??\c:\windows\system\explorer.exe
              c:\windows\system\explorer.exe
              3⤵
              • Modifies WinLogon for persistence
              • Modifies firewall policy service
              • Modifies visiblity of hidden/system files in Explorer
              • UAC bypass
              • Windows security bypass
              • Boot or Logon Autostart Execution: Active Setup
              • Deletes itself
              • Executes dropped EXE
              • Loads dropped DLL
              • Windows security modification
              • Adds Run key to start application
              • Checks whether UAC is enabled
              • Enumerates connected drives
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:2604
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                4⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:3008
                • \??\c:\windows\system\svchost.exe
                  c:\windows\system\svchost.exe
                  5⤵
                  • Modifies WinLogon for persistence
                  • Modifies visiblity of hidden/system files in Explorer
                  • Boot or Logon Autostart Execution: Active Setup
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Adds Run key to start application
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: GetForegroundWindowSpam
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:576
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe PR
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:1804
                  • C:\Windows\SysWOW64\at.exe
                    at 13:15 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                    6⤵
                    • System Location Discovery: System Language Discovery
                    PID:2320
                  • C:\Windows\SysWOW64\at.exe
                    at 13:16 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                    6⤵
                      PID:2612
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
            1⤵
              PID:852

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\mrsys.exe

              Filesize

              297KB

              MD5

              a9c8a98d6afca757dafeb08e3dbc8241

              SHA1

              c04361c12ccd36c297a4fdc8f502383838c97d06

              SHA256

              cd3946f27fd0d75dd2ea6f90fa32f1b8da5436490b63e037ce5664353d383948

              SHA512

              96ac3d9ff44051f2817478abf71e46488c824c068f579b0798b4ac402b88bb7693a693f6c5946edd448053aecce980e83f73448faa11d4eaf6df2956ae2ef15c

            • C:\Windows\SYSTEM.INI

              Filesize

              257B

              MD5

              bd79658b941ef9f5ea9ed568eba0c3f8

              SHA1

              57e3ef149e935a525d8d0784cb59ad8e15a91738

              SHA256

              fd7ae7b7e74a1f10e424c7829ed1e9d9411d39bb4465786ed5167755c71c9ebd

              SHA512

              019444eafab13e8f03210a0374621c7db0a4450a222bb55d29fdbdbbd8d240a809cc114eebed685eab924e5ec95af5fbc273f7f69524369c8393ba157c4cd2b8

            • C:\Windows\system\explorer.exe

              Filesize

              296KB

              MD5

              be22c7554a0912496f88175524058c5b

              SHA1

              a18d18bcbcb8f26f35d7f86dc7dd0ccc8bb3ac36

              SHA256

              5a38095b99705874a893e256b403c2d9eaf9e5eb96c8ebe8f503f84a9c5afe2a

              SHA512

              5e15819598cd552d9ef95609775a25eb7ec2d8c8c3b2361ad71688e84720bbfdb74895cf5ac300786aebd572e5c1fc9f5355ca4b90ece0e58bc32e0434642f86

            • C:\Windows\system\spoolsv.exe

              Filesize

              296KB

              MD5

              a49a37e80b67f250b42d4ea0b5685458

              SHA1

              0e983878d652c7282c749f56cfe36a94784ae9f4

              SHA256

              b5a9fd338861f88ff94df1ce717f02d44b5b6a990ccb63dfc37a21e0e5b2d08e

              SHA512

              b8ba0e3c88dba2b6865123dd5c117eed3c8dfa39a6240fdad1b8628476e67cfe1ccd1f28e2ca93225aeb8a79410f6a2204e9c57dcac80e6039f18e484e4bac1a

            • C:\Windows\system\svchost.exe

              Filesize

              296KB

              MD5

              10779095d926538757530d235b08a82f

              SHA1

              29bc534ff309b4c07fe4ecdb880bee321b9abdba

              SHA256

              0c5799bb4bb5429a953a7c8464281adc7157bffbed7be5cbd5448adb61285160

              SHA512

              361dfd21b829dffe39cab30f34ccd212fc38469bd9326382c1172fa1c2e45ee4f399bf8db05b5cb1abb306ce59e4bbbe1a91ac218d89bd4a384e5da6f811fac8

            • C:\ebiyx.pif

              Filesize

              100KB

              MD5

              d9f334ef9b6550a09555b0b1584e81c3

              SHA1

              5d2ec61122548ab8cadda90d7761b03e27dabae1

              SHA256

              6aa4309b52929712e41570b4b383b9c600d84156949ea4e5883c8f038701b90d

              SHA512

              178c53258975b3f84c20d6863384e46053a8ae2c93fa7fec44ac12b435d458aa9b90da5268bba28a16ef58953d894ef9733d15a1e9957783f51a847e088362cf

            • memory/576-123-0x0000000002510000-0x0000000002511000-memory.dmp

              Filesize

              4KB

            • memory/576-124-0x0000000002500000-0x0000000002502000-memory.dmp

              Filesize

              8KB

            • memory/576-66-0x0000000000400000-0x0000000000443000-memory.dmp

              Filesize

              268KB

            • memory/576-75-0x0000000002480000-0x00000000024C3000-memory.dmp

              Filesize

              268KB

            • memory/1112-11-0x0000000001FF0000-0x0000000001FF2000-memory.dmp

              Filesize

              8KB

            • memory/1804-81-0x0000000000400000-0x0000000000443000-memory.dmp

              Filesize

              268KB

            • memory/1804-76-0x0000000000400000-0x0000000000443000-memory.dmp

              Filesize

              268KB

            • memory/2604-101-0x00000000032C0000-0x000000000434E000-memory.dmp

              Filesize

              16.6MB

            • memory/2604-100-0x00000000032C0000-0x000000000434E000-memory.dmp

              Filesize

              16.6MB

            • memory/2604-130-0x00000000032C0000-0x000000000434E000-memory.dmp

              Filesize

              16.6MB

            • memory/2604-128-0x00000000003E0000-0x00000000003E2000-memory.dmp

              Filesize

              8KB

            • memory/2604-125-0x00000000032C0000-0x000000000434E000-memory.dmp

              Filesize

              16.6MB

            • memory/2604-127-0x00000000032C0000-0x000000000434E000-memory.dmp

              Filesize

              16.6MB

            • memory/2604-129-0x00000000032C0000-0x000000000434E000-memory.dmp

              Filesize

              16.6MB

            • memory/2604-126-0x00000000032C0000-0x000000000434E000-memory.dmp

              Filesize

              16.6MB

            • memory/2604-51-0x0000000002C60000-0x0000000002CA3000-memory.dmp

              Filesize

              268KB

            • memory/2604-117-0x0000000000520000-0x0000000000521000-memory.dmp

              Filesize

              4KB

            • memory/2604-98-0x00000000032C0000-0x000000000434E000-memory.dmp

              Filesize

              16.6MB

            • memory/2604-103-0x00000000032C0000-0x000000000434E000-memory.dmp

              Filesize

              16.6MB

            • memory/2604-102-0x00000000032C0000-0x000000000434E000-memory.dmp

              Filesize

              16.6MB

            • memory/2668-96-0x0000000000400000-0x0000000000443000-memory.dmp

              Filesize

              268KB

            • memory/2668-77-0x0000000000250000-0x0000000000252000-memory.dmp

              Filesize

              8KB

            • memory/2668-23-0x0000000000250000-0x0000000000252000-memory.dmp

              Filesize

              8KB

            • memory/2668-1-0x0000000002680000-0x000000000370E000-memory.dmp

              Filesize

              16.6MB

            • memory/2668-5-0x0000000002680000-0x000000000370E000-memory.dmp

              Filesize

              16.6MB

            • memory/2668-8-0x0000000002680000-0x000000000370E000-memory.dmp

              Filesize

              16.6MB

            • memory/2668-3-0x0000000002680000-0x000000000370E000-memory.dmp

              Filesize

              16.6MB

            • memory/2668-74-0x0000000002680000-0x000000000370E000-memory.dmp

              Filesize

              16.6MB

            • memory/2668-37-0x0000000005510000-0x0000000005553000-memory.dmp

              Filesize

              268KB

            • memory/2668-36-0x0000000005510000-0x0000000005553000-memory.dmp

              Filesize

              268KB

            • memory/2668-0-0x0000000000400000-0x0000000000443000-memory.dmp

              Filesize

              268KB

            • memory/2668-7-0x0000000002680000-0x000000000370E000-memory.dmp

              Filesize

              16.6MB

            • memory/2668-22-0x0000000000250000-0x0000000000252000-memory.dmp

              Filesize

              8KB

            • memory/2668-10-0x0000000002680000-0x000000000370E000-memory.dmp

              Filesize

              16.6MB

            • memory/2668-6-0x0000000002680000-0x000000000370E000-memory.dmp

              Filesize

              16.6MB

            • memory/2668-4-0x0000000002680000-0x000000000370E000-memory.dmp

              Filesize

              16.6MB

            • memory/2668-9-0x0000000002680000-0x000000000370E000-memory.dmp

              Filesize

              16.6MB

            • memory/2668-18-0x0000000000250000-0x0000000000252000-memory.dmp

              Filesize

              8KB

            • memory/2668-19-0x0000000000260000-0x0000000000261000-memory.dmp

              Filesize

              4KB

            • memory/2668-21-0x0000000000260000-0x0000000000261000-memory.dmp

              Filesize

              4KB

            • memory/3008-52-0x0000000000400000-0x0000000000443000-memory.dmp

              Filesize

              268KB

            • memory/3008-82-0x0000000000400000-0x0000000000443000-memory.dmp

              Filesize

              268KB