Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-06-2024 01:22

General

  • Target

    179550d8db74726e449f6d3ffc9734b43c88d21d20bb03e554b3009c25b74c5f.exe

  • Size

    1.0MB

  • MD5

    9a1c42042be407c78e3f1ff570a390a7

  • SHA1

    0a44e081d37310cf72f0a86464107a7c402a1b1f

  • SHA256

    179550d8db74726e449f6d3ffc9734b43c88d21d20bb03e554b3009c25b74c5f

  • SHA512

    78b4dbed8490404140dc1dc3e3ef4667e7c81b0dfcd2d82f5e8428788406a924e04ee015928430d7d5c075cae356266cf73628e51063285306bc350e72a58534

  • SSDEEP

    24576:l7H7f78khm7l72B2J797fqZ7f9HCrO0fmbGD4uz/cFDy:l7H7f7857l72BQ797y71HCrc/uzEo

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Signatures

  • Modifies firewall policy service 3 TTPs 3 IoCs
  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 7 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 7 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\fontdrvhost.exe
    "fontdrvhost.exe"
    1⤵
      PID:776
    • C:\Windows\system32\fontdrvhost.exe
      "fontdrvhost.exe"
      1⤵
        PID:784
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        1⤵
          PID:316
        • C:\Windows\system32\sihost.exe
          sihost.exe
          1⤵
            PID:2788
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
            1⤵
              PID:2808
            • C:\Windows\Explorer.EXE
              C:\Windows\Explorer.EXE
              1⤵
                PID:3420
                • C:\Users\Admin\AppData\Local\Temp\179550d8db74726e449f6d3ffc9734b43c88d21d20bb03e554b3009c25b74c5f.exe
                  "C:\Users\Admin\AppData\Local\Temp\179550d8db74726e449f6d3ffc9734b43c88d21d20bb03e554b3009c25b74c5f.exe"
                  2⤵
                  • Drops file in Windows directory
                  • Suspicious use of WriteProcessMemory
                  PID:4592
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a4304.bat
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2404
                    • C:\Users\Admin\AppData\Local\Temp\179550d8db74726e449f6d3ffc9734b43c88d21d20bb03e554b3009c25b74c5f.exe
                      "C:\Users\Admin\AppData\Local\Temp\179550d8db74726e449f6d3ffc9734b43c88d21d20bb03e554b3009c25b74c5f.exe"
                      4⤵
                      • Modifies firewall policy service
                      • UAC bypass
                      • Windows security bypass
                      • Executes dropped EXE
                      • Windows security modification
                      • Checks whether UAC is enabled
                      • Drops file in Windows directory
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      • System policy modification
                      PID:3596
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a44BA.bat
                        5⤵
                        • Suspicious use of WriteProcessMemory
                        PID:1260
                        • C:\Users\Admin\AppData\Local\Temp\179550d8db74726e449f6d3ffc9734b43c88d21d20bb03e554b3009c25b74c5f.exe
                          "C:\Users\Admin\AppData\Local\Temp\179550d8db74726e449f6d3ffc9734b43c88d21d20bb03e554b3009c25b74c5f.exe"
                          6⤵
                          • Executes dropped EXE
                          PID:3024
                  • C:\Windows\Logo1_.exe
                    C:\Windows\Logo1_.exe
                    3⤵
                    • Executes dropped EXE
                    • Enumerates connected drives
                    • Drops file in Program Files directory
                    • Drops file in Windows directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of WriteProcessMemory
                    PID:2116
                    • C:\Windows\SysWOW64\net.exe
                      net stop "Kingsoft AntiVirus Service"
                      4⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2100
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                        5⤵
                          PID:2844

                Network

                MITRE ATT&CK Matrix ATT&CK v13

                Persistence

                Create or Modify System Process

                1
                T1543

                Windows Service

                1
                T1543.003

                Privilege Escalation

                Create or Modify System Process

                1
                T1543

                Windows Service

                1
                T1543.003

                Abuse Elevation Control Mechanism

                1
                T1548

                Bypass User Account Control

                1
                T1548.002

                Defense Evasion

                Modify Registry

                5
                T1112

                Impair Defenses

                4
                T1562

                Disable or Modify Tools

                3
                T1562.001

                Disable or Modify System Firewall

                1
                T1562.004

                Abuse Elevation Control Mechanism

                1
                T1548

                Bypass User Account Control

                1
                T1548.002

                Discovery

                System Information Discovery

                2
                T1082

                Query Registry

                1
                T1012

                Peripheral Device Discovery

                1
                T1120

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe
                  Filesize

                  251KB

                  MD5

                  0b02dfc1b962c1df256edd0052bc5139

                  SHA1

                  d54d2df2f257aa6d97ad85eec6d7d4220e106fa3

                  SHA256

                  af941ea3805324883d0945a55f06f88a84848281b7e2a032618bd85be6983adb

                  SHA512

                  c420baa3414fce1f4604b636d05bf803d816529cfd78d00f48a7ed875822fc36157bf5bbccef6fd93bab3e98491c7985f3cfdf61985f9e4e407310aa7757e289

                • C:\Program Files\7-Zip\7z.exe
                  Filesize

                  570KB

                  MD5

                  7302c943350f08b7983b56011dfebfff

                  SHA1

                  3fedfd2ebaf04b09635a218f230726e64d258a91

                  SHA256

                  a2e2b505debc071b445ca0cefe611a367a398cdb016f835eceacbd3b01a405e7

                  SHA512

                  a57c8ca91e529bec9d502ef3b204deb6d09f5ecb46ef135d130259d1936618180fe13db55bd5f7bebbec1d477ea9bb9f98455b59f09b4d45c00ecd3a3df70803

                • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
                  Filesize

                  636KB

                  MD5

                  2500f702e2b9632127c14e4eaae5d424

                  SHA1

                  8726fef12958265214eeb58001c995629834b13a

                  SHA256

                  82e5b0001f025ca3b8409c98e4fb06c119c68de1e4ef60a156360cb4ef61d19c

                  SHA512

                  f420c62fa1f6897f51dd7a0f0e910fb54ad14d51973a2d4840eeea0448c860bf83493fb1c07be65f731efc39e19f8a99886c8cfd058cee482fe52d255a33a55c

                • C:\Users\Admin\AppData\Local\Temp\$$a4304.bat
                  Filesize

                  722B

                  MD5

                  254934e1bed74bb5da44b18bcf7f999e

                  SHA1

                  41daca51746bff972e34860693811a27b73809eb

                  SHA256

                  a1a9d4127698e34c09ee0fb5edf3147debfcd65878656823d5ff0d58255cd062

                  SHA512

                  7b56f2eaf8bce03feae8b79081fa0ac7acc125eab5ed6719f9958c4f029c6c8f9a4e3f95d149bbaed080e05fe5c21b72388d9d61a07ff11f802df23d5a6a6b00

                • C:\Users\Admin\AppData\Local\Temp\$$a44BA.bat
                  Filesize

                  722B

                  MD5

                  99eaae8a5b104ff7f04f0bdcf752788a

                  SHA1

                  831fd12201322e3e5bf668b0b88e0ab08b99b738

                  SHA256

                  79f033cad4857faca9830defd3201336a328b5a0ab9bd8d60b317f7356300768

                  SHA512

                  75890fbc2f618c24a1705fc4eb7b953e5ee5546b4c9ac14062a795dc381cd5259ed3d69a6453068c9504607d8b4537c250c6de6f56999678d8a9e397fea35adc

                • C:\Users\Admin\AppData\Local\Temp\179550d8db74726e449f6d3ffc9734b43c88d21d20bb03e554b3009c25b74c5f.exe.exe
                  Filesize

                  1008KB

                  MD5

                  47239e98f567a255ad59a52ece290642

                  SHA1

                  0aae5976179fce9f3a436e7add255aeaeb5df1bc

                  SHA256

                  e78d3ba5ce7661ec118c426e03a5c4447f36779bfa63cad80499bd0b4f2cf0dd

                  SHA512

                  48598e106df1b69a6e7dd282a37640ea1496ae67d7ddd3f89bcab07ec81ddda0cc6f95bc681fdcb502fe7c2e83c86e59f8b5f83bb008cd3fb91d62a0899dea9f

                • C:\Users\Admin\AppData\Local\Temp\179550d8db74726e449f6d3ffc9734b43c88d21d20bb03e554b3009c25b74c5f.exe.exe
                  Filesize

                  981KB

                  MD5

                  6f8aac91731edf732fe02b457eded4da

                  SHA1

                  6b1ad7be49671e42c5cb2c2f477260755f3a12e3

                  SHA256

                  69ce9375840715b47d1cfdfa281ce51c5fe5890f980a76ff2d5c1926596486e2

                  SHA512

                  da6dc0e7fab669f7f77b8f5542c6ca25a736bcc1f028136cf1a739c40a744be4b3a746ce623fb27cc7dd13d7220923033597c1687796a4e68d061ca00a939509

                • C:\Windows\Logo1_.exe
                  Filesize

                  26KB

                  MD5

                  cbf2e5f5ea26c76bc9bfaa9f3f3b645c

                  SHA1

                  7a9a99cb59c1f79b2eb5f7c6094dc8e05c7a6ca1

                  SHA256

                  9d8e85c12fc228fc9dff2547d4a61d07ef9ecc13a6d941d9f0bbd275be2df458

                  SHA512

                  92f3da9c690400d880355e186a8595c68a7b541fdd37e4f5683741452827e177fefbc501492d29edf9c82ef6de1ebb6673da962722d56040100a08a56a8a4f63

                • C:\Windows\rundl132.exe
                  MD5

                  d41d8cd98f00b204e9800998ecf8427e

                  SHA1

                  da39a3ee5e6b4b0d3255bfef95601890afd80709

                  SHA256

                  e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                  SHA512

                  cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                • F:\$RECYCLE.BIN\S-1-5-21-3558294865-3673844354-2255444939-1000\_desktop.ini
                  Filesize

                  9B

                  MD5

                  2822854d33e24347f613c750df46b810

                  SHA1

                  c2ea2529c032aa552d5a8301900cf27fc0f6045c

                  SHA256

                  73f2f888bdeaf9427c7aa3355fbe711e6570fb5e9e48c3f64cd229198ce85ad2

                  SHA512

                  21fff5d14e03a0420d9242a095c2e93ac2b7e6b9e49d12da907394ac9725bb746896721ceded88411895e9630a8ffbface168f0c02630b33300647d3d9e3326c

                • memory/2116-59-0x0000000000400000-0x0000000000434000-memory.dmp
                  Filesize

                  208KB

                • memory/2116-793-0x0000000000400000-0x0000000000434000-memory.dmp
                  Filesize

                  208KB

                • memory/2116-5258-0x0000000000400000-0x0000000000434000-memory.dmp
                  Filesize

                  208KB

                • memory/2116-4819-0x0000000000400000-0x0000000000434000-memory.dmp
                  Filesize

                  208KB

                • memory/2116-11-0x0000000000400000-0x0000000000434000-memory.dmp
                  Filesize

                  208KB

                • memory/2116-1310-0x0000000000400000-0x0000000000434000-memory.dmp
                  Filesize

                  208KB

                • memory/2116-1254-0x0000000000400000-0x0000000000434000-memory.dmp
                  Filesize

                  208KB

                • memory/2116-42-0x0000000000400000-0x0000000000434000-memory.dmp
                  Filesize

                  208KB

                • memory/2116-55-0x0000000000400000-0x0000000000434000-memory.dmp
                  Filesize

                  208KB

                • memory/2116-49-0x0000000000400000-0x0000000000434000-memory.dmp
                  Filesize

                  208KB

                • memory/3024-40-0x0000000000400000-0x0000000000447000-memory.dmp
                  Filesize

                  284KB

                • memory/3596-21-0x0000000000760000-0x00000000017EE000-memory.dmp
                  Filesize

                  16.6MB

                • memory/3596-19-0x0000000000400000-0x0000000000445000-memory.dmp
                  Filesize

                  276KB

                • memory/3596-30-0x0000000000760000-0x00000000017EE000-memory.dmp
                  Filesize

                  16.6MB

                • memory/3596-23-0x0000000000760000-0x00000000017EE000-memory.dmp
                  Filesize

                  16.6MB

                • memory/3596-29-0x0000000000760000-0x00000000017EE000-memory.dmp
                  Filesize

                  16.6MB

                • memory/3596-36-0x0000000000400000-0x0000000000445000-memory.dmp
                  Filesize

                  276KB

                • memory/3596-32-0x0000000000760000-0x00000000017EE000-memory.dmp
                  Filesize

                  16.6MB

                • memory/4592-0-0x0000000000400000-0x0000000000434000-memory.dmp
                  Filesize

                  208KB

                • memory/4592-10-0x0000000000400000-0x0000000000434000-memory.dmp
                  Filesize

                  208KB