Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 20:26
Static task
static1
Behavioral task
behavioral1
Sample
363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe
Resource
win7-20240419-en
General
-
Target
363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe
-
Size
6.3MB
-
MD5
b0bd17e3c1447a1f1ad35fddc5007f26
-
SHA1
7ceb51392d32f113f07300c636112bc311330e38
-
SHA256
363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7
-
SHA512
707afbec914a32c6285db891f78ae47ded8d24befc72ca71b994b3fb2dce2e31efa002a3c24d904a526040a76c77cb19448e06694c2b54c4cefa206a7c5da95c
-
SSDEEP
196608:EYub1Ls+UIUwgT4Ot8DS2Dpcbw7lgssa4B:Tub1avPF8JYGlgsjI
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
Processes:
363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe -
Processes:
363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe -
Processes:
363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe -
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 11 IoCs
Processes:
resource yara_rule behavioral1/memory/2204-9-0x0000000001DD0000-0x0000000002E8A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2204-11-0x0000000001DD0000-0x0000000002E8A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2204-12-0x0000000001DD0000-0x0000000002E8A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2204-15-0x0000000001DD0000-0x0000000002E8A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2204-16-0x0000000001DD0000-0x0000000002E8A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2204-19-0x0000000001DD0000-0x0000000002E8A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2204-17-0x0000000001DD0000-0x0000000002E8A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2204-14-0x0000000001DD0000-0x0000000002E8A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2204-13-0x0000000001DD0000-0x0000000002E8A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2204-18-0x0000000001DD0000-0x0000000002E8A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2204-43-0x0000000001DD0000-0x0000000002E8A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine -
UPX dump on OEP (original entry point) 12 IoCs
Processes:
resource yara_rule behavioral1/memory/2204-9-0x0000000001DD0000-0x0000000002E8A000-memory.dmp UPX behavioral1/memory/2204-11-0x0000000001DD0000-0x0000000002E8A000-memory.dmp UPX behavioral1/memory/2204-12-0x0000000001DD0000-0x0000000002E8A000-memory.dmp UPX behavioral1/memory/2204-15-0x0000000001DD0000-0x0000000002E8A000-memory.dmp UPX behavioral1/memory/2204-16-0x0000000001DD0000-0x0000000002E8A000-memory.dmp UPX behavioral1/memory/2204-19-0x0000000001DD0000-0x0000000002E8A000-memory.dmp UPX behavioral1/memory/2204-17-0x0000000001DD0000-0x0000000002E8A000-memory.dmp UPX behavioral1/memory/2204-14-0x0000000001DD0000-0x0000000002E8A000-memory.dmp UPX behavioral1/memory/2204-13-0x0000000001DD0000-0x0000000002E8A000-memory.dmp UPX behavioral1/memory/2204-18-0x0000000001DD0000-0x0000000002E8A000-memory.dmp UPX behavioral1/memory/2204-43-0x0000000001DD0000-0x0000000002E8A000-memory.dmp UPX behavioral1/memory/2204-55-0x0000000000400000-0x000000000046F000-memory.dmp UPX -
Processes:
resource yara_rule behavioral1/memory/2204-9-0x0000000001DD0000-0x0000000002E8A000-memory.dmp upx behavioral1/memory/2204-11-0x0000000001DD0000-0x0000000002E8A000-memory.dmp upx behavioral1/memory/2204-12-0x0000000001DD0000-0x0000000002E8A000-memory.dmp upx behavioral1/memory/2204-15-0x0000000001DD0000-0x0000000002E8A000-memory.dmp upx behavioral1/memory/2204-16-0x0000000001DD0000-0x0000000002E8A000-memory.dmp upx behavioral1/memory/2204-19-0x0000000001DD0000-0x0000000002E8A000-memory.dmp upx behavioral1/memory/2204-17-0x0000000001DD0000-0x0000000002E8A000-memory.dmp upx behavioral1/memory/2204-14-0x0000000001DD0000-0x0000000002E8A000-memory.dmp upx behavioral1/memory/2204-13-0x0000000001DD0000-0x0000000002E8A000-memory.dmp upx behavioral1/memory/2204-18-0x0000000001DD0000-0x0000000002E8A000-memory.dmp upx behavioral1/memory/2204-43-0x0000000001DD0000-0x0000000002E8A000-memory.dmp upx -
Processes:
363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe -
Processes:
363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe -
Drops file in Windows directory 2 IoCs
Processes:
363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exedescription ioc process File created C:\Windows\f76122a 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe File opened for modification C:\Windows\SYSTEM.INI 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exepid process 2204 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
Processes:
363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exedescription pid process Token: SeDebugPrivilege 2204 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Token: SeDebugPrivilege 2204 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Token: SeDebugPrivilege 2204 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Token: SeDebugPrivilege 2204 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Token: SeDebugPrivilege 2204 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Token: SeDebugPrivilege 2204 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Token: SeDebugPrivilege 2204 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Token: SeDebugPrivilege 2204 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Token: SeDebugPrivilege 2204 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Token: SeDebugPrivilege 2204 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Token: SeDebugPrivilege 2204 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Token: SeDebugPrivilege 2204 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Token: SeDebugPrivilege 2204 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Token: SeDebugPrivilege 2204 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Token: SeDebugPrivilege 2204 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Token: SeDebugPrivilege 2204 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Token: SeDebugPrivilege 2204 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Token: SeDebugPrivilege 2204 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Token: SeDebugPrivilege 2204 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Token: SeDebugPrivilege 2204 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exedescription pid process target process PID 2204 wrote to memory of 1052 2204 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe taskhost.exe PID 2204 wrote to memory of 1136 2204 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Dwm.exe PID 2204 wrote to memory of 1192 2204 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe Explorer.EXE PID 2204 wrote to memory of 2152 2204 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe DllHost.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe"C:\Users\Admin\AppData\Local\Temp\363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\0F7611BC_Rar\363ecffc5be8bafacf76d39495a34e285f9608479e46cc562ea0739cba4dc0c7.exeFilesize
6.2MB
MD5c87127b3715d0cbcf93e9053797aab84
SHA1da9978f5e493b20d9d38e958882f47ff047cf527
SHA256d6b22291baa4a47eaec054c1332c258572c2f7cd9cb961548a46c56aefc0f64c
SHA51235f04cb369b588d28d777041bb09a7807ce4ecfe0b646af9f54ca9a4e8af9237bfd72132ffdba9e5ab90f35572cf8961c12e4c71dd3338931781bc37be2fede2
-
memory/1052-25-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/2204-15-0x0000000001DD0000-0x0000000002E8A000-memory.dmpFilesize
16.7MB
-
memory/2204-38-0x0000000000650000-0x0000000000652000-memory.dmpFilesize
8KB
-
memory/2204-12-0x0000000001DD0000-0x0000000002E8A000-memory.dmpFilesize
16.7MB
-
memory/2204-0-0x0000000000400000-0x000000000046F000-memory.dmpFilesize
444KB
-
memory/2204-33-0x0000000000650000-0x0000000000652000-memory.dmpFilesize
8KB
-
memory/2204-16-0x0000000001DD0000-0x0000000002E8A000-memory.dmpFilesize
16.7MB
-
memory/2204-19-0x0000000001DD0000-0x0000000002E8A000-memory.dmpFilesize
16.7MB
-
memory/2204-17-0x0000000001DD0000-0x0000000002E8A000-memory.dmpFilesize
16.7MB
-
memory/2204-14-0x0000000001DD0000-0x0000000002E8A000-memory.dmpFilesize
16.7MB
-
memory/2204-11-0x0000000001DD0000-0x0000000002E8A000-memory.dmpFilesize
16.7MB
-
memory/2204-37-0x0000000000650000-0x0000000000652000-memory.dmpFilesize
8KB
-
memory/2204-36-0x00000000008B0000-0x00000000008B1000-memory.dmpFilesize
4KB
-
memory/2204-34-0x00000000008B0000-0x00000000008B1000-memory.dmpFilesize
4KB
-
memory/2204-9-0x0000000001DD0000-0x0000000002E8A000-memory.dmpFilesize
16.7MB
-
memory/2204-13-0x0000000001DD0000-0x0000000002E8A000-memory.dmpFilesize
16.7MB
-
memory/2204-18-0x0000000001DD0000-0x0000000002E8A000-memory.dmpFilesize
16.7MB
-
memory/2204-43-0x0000000001DD0000-0x0000000002E8A000-memory.dmpFilesize
16.7MB
-
memory/2204-55-0x0000000000400000-0x000000000046F000-memory.dmpFilesize
444KB