Analysis
-
max time kernel
27s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 14:29
Static task
static1
Behavioral task
behavioral1
Sample
95059c3a41b69fe5e1e9541f9154077f8a6970e92fcd95b538ba750b26e9ecfaN.dll
Resource
win7-20241010-en
General
-
Target
95059c3a41b69fe5e1e9541f9154077f8a6970e92fcd95b538ba750b26e9ecfaN.dll
-
Size
120KB
-
MD5
e6865723ddb66b3526e8f5f882408800
-
SHA1
c9edb8b59fd2586523e1ad74d6c67d8547e2421e
-
SHA256
95059c3a41b69fe5e1e9541f9154077f8a6970e92fcd95b538ba750b26e9ecfa
-
SHA512
a86021be4c79bb4094f12ab3e6350a83d30840f2564b360e95326b538bb5ed072c5d77e3256990cbd6c9b83944c1a5e9eaab732e85101f81d78eafd69705c059
-
SSDEEP
3072:spQG4mKVGceRPNoc3Omks+1c0yM6KKsC4aMayz+LRp:eV4zBe8c3ysOyM6sC4aMayaLj
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f77e041.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f77e32e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f77e32e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f77e32e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f77e041.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f77e041.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f77e041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f77e32e.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f77e32e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f77e32e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f77e041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f77e32e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f77e041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f77e041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f77e041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f77e32e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f77e32e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f77e32e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f77e041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f77e041.exe -
Executes dropped EXE 3 IoCs
pid Process 2240 f77e041.exe 2752 f77e32e.exe 568 f77fbec.exe -
Loads dropped DLL 6 IoCs
pid Process 2596 rundll32.exe 2596 rundll32.exe 2596 rundll32.exe 2596 rundll32.exe 2596 rundll32.exe 2596 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f77e041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f77e041.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f77e041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f77e32e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f77e041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f77e32e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f77e32e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f77e32e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f77e041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f77e041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f77e32e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f77e32e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f77e041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f77e32e.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f77e041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f77e32e.exe -
Enumerates connected drives 3 TTPs 14 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: f77e041.exe File opened (read-only) \??\P: f77e041.exe File opened (read-only) \??\E: f77e041.exe File opened (read-only) \??\G: f77e041.exe File opened (read-only) \??\L: f77e041.exe File opened (read-only) \??\H: f77e041.exe File opened (read-only) \??\J: f77e041.exe File opened (read-only) \??\S: f77e041.exe File opened (read-only) \??\I: f77e041.exe File opened (read-only) \??\K: f77e041.exe File opened (read-only) \??\M: f77e041.exe File opened (read-only) \??\N: f77e041.exe File opened (read-only) \??\Q: f77e041.exe File opened (read-only) \??\R: f77e041.exe -
resource yara_rule behavioral1/memory/2240-20-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2240-18-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2240-25-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2240-15-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2240-23-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2240-22-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2240-21-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2240-19-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2240-17-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2240-24-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2240-63-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2240-62-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2240-64-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2240-65-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2240-66-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2240-68-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2240-69-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2240-82-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2240-83-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2240-86-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2240-87-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2240-156-0x0000000000630000-0x00000000016EA000-memory.dmp upx behavioral1/memory/2752-174-0x0000000000930000-0x00000000019EA000-memory.dmp upx behavioral1/memory/2752-179-0x0000000000930000-0x00000000019EA000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\f77e0ed f77e041.exe File opened for modification C:\Windows\SYSTEM.INI f77e041.exe File created C:\Windows\f78317c f77e32e.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f77e041.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2240 f77e041.exe 2240 f77e041.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 2240 f77e041.exe Token: SeDebugPrivilege 2240 f77e041.exe Token: SeDebugPrivilege 2240 f77e041.exe Token: SeDebugPrivilege 2240 f77e041.exe Token: SeDebugPrivilege 2240 f77e041.exe Token: SeDebugPrivilege 2240 f77e041.exe Token: SeDebugPrivilege 2240 f77e041.exe Token: SeDebugPrivilege 2240 f77e041.exe Token: SeDebugPrivilege 2240 f77e041.exe Token: SeDebugPrivilege 2240 f77e041.exe Token: SeDebugPrivilege 2240 f77e041.exe Token: SeDebugPrivilege 2240 f77e041.exe Token: SeDebugPrivilege 2240 f77e041.exe Token: SeDebugPrivilege 2240 f77e041.exe Token: SeDebugPrivilege 2240 f77e041.exe Token: SeDebugPrivilege 2240 f77e041.exe Token: SeDebugPrivilege 2240 f77e041.exe Token: SeDebugPrivilege 2240 f77e041.exe Token: SeDebugPrivilege 2240 f77e041.exe Token: SeDebugPrivilege 2240 f77e041.exe Token: SeDebugPrivilege 2240 f77e041.exe Token: SeDebugPrivilege 2240 f77e041.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2592 wrote to memory of 2596 2592 rundll32.exe 30 PID 2592 wrote to memory of 2596 2592 rundll32.exe 30 PID 2592 wrote to memory of 2596 2592 rundll32.exe 30 PID 2592 wrote to memory of 2596 2592 rundll32.exe 30 PID 2592 wrote to memory of 2596 2592 rundll32.exe 30 PID 2592 wrote to memory of 2596 2592 rundll32.exe 30 PID 2592 wrote to memory of 2596 2592 rundll32.exe 30 PID 2596 wrote to memory of 2240 2596 rundll32.exe 31 PID 2596 wrote to memory of 2240 2596 rundll32.exe 31 PID 2596 wrote to memory of 2240 2596 rundll32.exe 31 PID 2596 wrote to memory of 2240 2596 rundll32.exe 31 PID 2240 wrote to memory of 1252 2240 f77e041.exe 19 PID 2240 wrote to memory of 1348 2240 f77e041.exe 20 PID 2240 wrote to memory of 1412 2240 f77e041.exe 21 PID 2240 wrote to memory of 1264 2240 f77e041.exe 23 PID 2240 wrote to memory of 2592 2240 f77e041.exe 29 PID 2240 wrote to memory of 2596 2240 f77e041.exe 30 PID 2240 wrote to memory of 2596 2240 f77e041.exe 30 PID 2596 wrote to memory of 2752 2596 rundll32.exe 32 PID 2596 wrote to memory of 2752 2596 rundll32.exe 32 PID 2596 wrote to memory of 2752 2596 rundll32.exe 32 PID 2596 wrote to memory of 2752 2596 rundll32.exe 32 PID 2596 wrote to memory of 568 2596 rundll32.exe 33 PID 2596 wrote to memory of 568 2596 rundll32.exe 33 PID 2596 wrote to memory of 568 2596 rundll32.exe 33 PID 2596 wrote to memory of 568 2596 rundll32.exe 33 PID 2240 wrote to memory of 1252 2240 f77e041.exe 19 PID 2240 wrote to memory of 1348 2240 f77e041.exe 20 PID 2240 wrote to memory of 1412 2240 f77e041.exe 21 PID 2240 wrote to memory of 1264 2240 f77e041.exe 23 PID 2240 wrote to memory of 2752 2240 f77e041.exe 32 PID 2240 wrote to memory of 2752 2240 f77e041.exe 32 PID 2240 wrote to memory of 568 2240 f77e041.exe 33 PID 2240 wrote to memory of 568 2240 f77e041.exe 33 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f77e32e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f77e041.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1252
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1348
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1412
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\95059c3a41b69fe5e1e9541f9154077f8a6970e92fcd95b538ba750b26e9ecfaN.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\95059c3a41b69fe5e1e9541f9154077f8a6970e92fcd95b538ba750b26e9ecfaN.dll,#13⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\f77e041.exeC:\Users\Admin\AppData\Local\Temp\f77e041.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2240
-
-
C:\Users\Admin\AppData\Local\Temp\f77e32e.exeC:\Users\Admin\AppData\Local\Temp\f77e32e.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System policy modification
PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\f77fbec.exeC:\Users\Admin\AppData\Local\Temp\f77fbec.exe4⤵
- Executes dropped EXE
PID:568
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1264
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD5e550cc15a820193054d47600d07a274a
SHA1abfd07fce647dd97b49b6114cc85e51ad117a8cf
SHA25671ca3ef63e31d3a60dfcb91483ad7cba0031771b8b77f2f279ee1a5f5af0bd95
SHA512a5fe5a10641760dbc9a5b16fbba375092a60f730367b2261307f54d94a9e5a40ce68cdeae422bdd245f26b158d7eafae4ad0469d75bef9f002bea56afa247d43
-
Filesize
97KB
MD5a7a26bad5c2e0c83a6d37c322b126fab
SHA1293c826c00bdb7b6c97591eeeda91a51f1b5476a
SHA2566f4c7c57d57054abd053f6d51fa5301241b5ffa3ec2095722af160713618bdd4
SHA512ed276ee549a6683f92b64c2dc235079fdb293f4f21ed64dd9a11afb5377f7995a5505fdbc979871ddacd2fe7c485ca57f3251574f9af41c6077a59f3928bb1b1