Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 21:32
Static task
static1
Behavioral task
behavioral1
Sample
1e26c64211c7a6c4d2fd8d3a9934115fc10b5104c916146315bdae6bf78fcf0f.dll
Resource
win7-20240903-en
General
-
Target
1e26c64211c7a6c4d2fd8d3a9934115fc10b5104c916146315bdae6bf78fcf0f.dll
-
Size
120KB
-
MD5
3a85b0a6a73fe8f30a74fe9ec95e45d2
-
SHA1
bcc0d4168415a7ea3876296c4dd6b92940787789
-
SHA256
1e26c64211c7a6c4d2fd8d3a9934115fc10b5104c916146315bdae6bf78fcf0f
-
SHA512
fff6107b82c681809774349e1d50b5e7830348c30059aa5b98152d822d43202cba26a5d8db277d09e201ffbd03dc601c669f2d8a38f3d1428ed5aac9a9a3b2f8
-
SSDEEP
1536:Zli4eRmp5EZWckVk3eN0ml3PM8SLaR0BcbDKkyOmWV7YO80ozxRp2rSmsf:ZlxeRSENm0md1mhgD+RWV7d80ExRcrc
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76d920.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76d920.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76d920.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76f93d.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76f93d.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76f93d.exe -
Sality family
-
UAC bypass 3 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76d920.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76f93d.exe -
Windows security bypass 2 TTPs 12 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76d920.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76d920.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76d920.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76d920.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76f93d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76f93d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76f93d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76f93d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76d920.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76d920.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76f93d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76f93d.exe -
Executes dropped EXE 3 IoCs
pid Process 1592 f76d920.exe 2664 f76da87.exe 2400 f76f93d.exe -
Loads dropped DLL 6 IoCs
pid Process 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe -
Windows security modification 2 TTPs 14 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76f93d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76f93d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76f93d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76d920.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76d920.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76f93d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76f93d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76f93d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76f93d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76d920.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76d920.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76d920.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76d920.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76d920.exe -
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76d920.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76f93d.exe -
Enumerates connected drives 3 TTPs 17 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: f76d920.exe File opened (read-only) \??\P: f76d920.exe File opened (read-only) \??\E: f76f93d.exe File opened (read-only) \??\H: f76f93d.exe File opened (read-only) \??\K: f76d920.exe File opened (read-only) \??\Q: f76d920.exe File opened (read-only) \??\R: f76d920.exe File opened (read-only) \??\J: f76d920.exe File opened (read-only) \??\N: f76d920.exe File opened (read-only) \??\G: f76f93d.exe File opened (read-only) \??\E: f76d920.exe File opened (read-only) \??\G: f76d920.exe File opened (read-only) \??\I: f76d920.exe File opened (read-only) \??\M: f76d920.exe File opened (read-only) \??\S: f76d920.exe File opened (read-only) \??\H: f76d920.exe File opened (read-only) \??\L: f76d920.exe -
resource yara_rule behavioral1/memory/1592-13-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1592-14-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1592-19-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1592-15-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1592-16-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1592-18-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1592-17-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1592-21-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1592-22-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1592-20-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1592-62-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1592-61-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1592-63-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1592-64-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1592-65-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1592-67-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1592-68-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1592-69-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1592-85-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1592-88-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1592-87-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1592-151-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/2400-168-0x0000000000910000-0x00000000019CA000-memory.dmp upx behavioral1/memory/2400-210-0x0000000000910000-0x00000000019CA000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\f76d96e f76d920.exe File opened for modification C:\Windows\SYSTEM.INI f76d920.exe File created C:\Windows\f772961 f76f93d.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76d920.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76f93d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1592 f76d920.exe 1592 f76d920.exe 2400 f76f93d.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeDebugPrivilege 1592 f76d920.exe Token: SeDebugPrivilege 1592 f76d920.exe Token: SeDebugPrivilege 1592 f76d920.exe Token: SeDebugPrivilege 1592 f76d920.exe Token: SeDebugPrivilege 1592 f76d920.exe Token: SeDebugPrivilege 1592 f76d920.exe Token: SeDebugPrivilege 1592 f76d920.exe Token: SeDebugPrivilege 1592 f76d920.exe Token: SeDebugPrivilege 1592 f76d920.exe Token: SeDebugPrivilege 1592 f76d920.exe Token: SeDebugPrivilege 1592 f76d920.exe Token: SeDebugPrivilege 1592 f76d920.exe Token: SeDebugPrivilege 1592 f76d920.exe Token: SeDebugPrivilege 1592 f76d920.exe Token: SeDebugPrivilege 1592 f76d920.exe Token: SeDebugPrivilege 1592 f76d920.exe Token: SeDebugPrivilege 1592 f76d920.exe Token: SeDebugPrivilege 1592 f76d920.exe Token: SeDebugPrivilege 1592 f76d920.exe Token: SeDebugPrivilege 1592 f76d920.exe Token: SeDebugPrivilege 1592 f76d920.exe Token: SeDebugPrivilege 1592 f76d920.exe Token: SeDebugPrivilege 1592 f76d920.exe Token: SeDebugPrivilege 1592 f76d920.exe Token: SeDebugPrivilege 2400 f76f93d.exe Token: SeDebugPrivilege 2400 f76f93d.exe Token: SeDebugPrivilege 2400 f76f93d.exe Token: SeDebugPrivilege 2400 f76f93d.exe Token: SeDebugPrivilege 2400 f76f93d.exe Token: SeDebugPrivilege 2400 f76f93d.exe Token: SeDebugPrivilege 2400 f76f93d.exe Token: SeDebugPrivilege 2400 f76f93d.exe Token: SeDebugPrivilege 2400 f76f93d.exe Token: SeDebugPrivilege 2400 f76f93d.exe Token: SeDebugPrivilege 2400 f76f93d.exe Token: SeDebugPrivilege 2400 f76f93d.exe Token: SeDebugPrivilege 2400 f76f93d.exe Token: SeDebugPrivilege 2400 f76f93d.exe Token: SeDebugPrivilege 2400 f76f93d.exe Token: SeDebugPrivilege 2400 f76f93d.exe Token: SeDebugPrivilege 2400 f76f93d.exe Token: SeDebugPrivilege 2400 f76f93d.exe Token: SeDebugPrivilege 2400 f76f93d.exe Token: SeDebugPrivilege 2400 f76f93d.exe Token: SeDebugPrivilege 2400 f76f93d.exe Token: SeDebugPrivilege 2400 f76f93d.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2164 wrote to memory of 1840 2164 rundll32.exe 31 PID 2164 wrote to memory of 1840 2164 rundll32.exe 31 PID 2164 wrote to memory of 1840 2164 rundll32.exe 31 PID 2164 wrote to memory of 1840 2164 rundll32.exe 31 PID 2164 wrote to memory of 1840 2164 rundll32.exe 31 PID 2164 wrote to memory of 1840 2164 rundll32.exe 31 PID 2164 wrote to memory of 1840 2164 rundll32.exe 31 PID 1840 wrote to memory of 1592 1840 rundll32.exe 32 PID 1840 wrote to memory of 1592 1840 rundll32.exe 32 PID 1840 wrote to memory of 1592 1840 rundll32.exe 32 PID 1840 wrote to memory of 1592 1840 rundll32.exe 32 PID 1592 wrote to memory of 1080 1592 f76d920.exe 18 PID 1592 wrote to memory of 1088 1592 f76d920.exe 19 PID 1592 wrote to memory of 1156 1592 f76d920.exe 20 PID 1592 wrote to memory of 468 1592 f76d920.exe 25 PID 1592 wrote to memory of 2164 1592 f76d920.exe 30 PID 1592 wrote to memory of 1840 1592 f76d920.exe 31 PID 1592 wrote to memory of 1840 1592 f76d920.exe 31 PID 1840 wrote to memory of 2664 1840 rundll32.exe 33 PID 1840 wrote to memory of 2664 1840 rundll32.exe 33 PID 1840 wrote to memory of 2664 1840 rundll32.exe 33 PID 1840 wrote to memory of 2664 1840 rundll32.exe 33 PID 1840 wrote to memory of 2400 1840 rundll32.exe 34 PID 1840 wrote to memory of 2400 1840 rundll32.exe 34 PID 1840 wrote to memory of 2400 1840 rundll32.exe 34 PID 1840 wrote to memory of 2400 1840 rundll32.exe 34 PID 1592 wrote to memory of 1080 1592 f76d920.exe 18 PID 1592 wrote to memory of 1088 1592 f76d920.exe 19 PID 1592 wrote to memory of 1156 1592 f76d920.exe 20 PID 1592 wrote to memory of 468 1592 f76d920.exe 25 PID 1592 wrote to memory of 2664 1592 f76d920.exe 33 PID 1592 wrote to memory of 2664 1592 f76d920.exe 33 PID 1592 wrote to memory of 2400 1592 f76d920.exe 34 PID 1592 wrote to memory of 2400 1592 f76d920.exe 34 PID 2400 wrote to memory of 1080 2400 f76f93d.exe 18 PID 2400 wrote to memory of 1088 2400 f76f93d.exe 19 PID 2400 wrote to memory of 1156 2400 f76f93d.exe 20 PID 2400 wrote to memory of 468 2400 f76f93d.exe 25 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76f93d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76d920.exe
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1080
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1088
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1156
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1e26c64211c7a6c4d2fd8d3a9934115fc10b5104c916146315bdae6bf78fcf0f.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1e26c64211c7a6c4d2fd8d3a9934115fc10b5104c916146315bdae6bf78fcf0f.dll,#13⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\f76d920.exeC:\Users\Admin\AppData\Local\Temp\f76d920.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1592
-
-
C:\Users\Admin\AppData\Local\Temp\f76da87.exeC:\Users\Admin\AppData\Local\Temp\f76da87.exe4⤵
- Executes dropped EXE
PID:2664
-
-
C:\Users\Admin\AppData\Local\Temp\f76f93d.exeC:\Users\Admin\AppData\Local\Temp\f76f93d.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2400
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:468
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD5ea4921b8b38f7f8333c2ca30af4f7279
SHA1508ab6aebfeeca62b9d453d2ba30d41c99dbb025
SHA256a2204800488b82bdb272908f4ff54af57dad2e68fd427a237e31af9c3dc89ace
SHA5120cd059caa46ba941ca2ba59c9bd966a93b7109755dc75210ec7d5a0001f122e0ee5f1d9674c5dc7735b6ad465c4df97015c9457173678101a4d6503b0e7585e9
-
Filesize
97KB
MD57a502b2a5d7a361809ebc682a0a4f432
SHA1a6a0da079b0b77a0d0577417c80a8dc6958fbf43
SHA2560f1983af77d4b006c2a722a58c9750288a8ffc91f9b51a9bfbea29dd9047042f
SHA5120160971f0828c86ebd3e3688bcd6006b7bd1c979a83deb6712a673437111f915b945f24c245d02883d0adf82addf9c847e2cc11ad38408168ddd38a194d0d69b