Analysis

  • max time kernel
    126s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    05-07-2024 05:59

General

  • Target

    R2登录器制作工具(带更新,反外挂,简约皮肤).exe

  • Size

    2.8MB

  • MD5

    75d53417d21654acbe4565e04a5e3353

  • SHA1

    18f996da80eee26b0fe48da445586f190aa710bd

  • SHA256

    ecbc34e6b5739a37dc046dfecf8e067eff30b4d1a4bf7531147286fbb45e1be5

  • SHA512

    91231190df5e55dd5fc330dd39651998206bdae2de91c0274e9a9c3d1c856aaef4031b3a24356c1a4f41abd6f017714f8e45112025f01a24e421747700223307

  • SSDEEP

    49152:5XWtGqeLA3MUwfOBIDGVV99pM78Q/9tf7D/0aJoYKsaABNTHpSNk50AjOOZALIE:5mreLKyfO24VRM78Q/9hEeobnABNTANF

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Signatures

  • Modifies firewall policy service 3 TTPs 3 IoCs
  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 6 IoCs
  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 28 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 7 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 20 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 31 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
      PID:1040
    • C:\Windows\system32\taskhost.exe
      "taskhost.exe"
      1⤵
        PID:1064
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1116
          • C:\Users\Admin\AppData\Local\Temp\R2登录器制作工具(带更新,反外挂,简约皮肤).exe
            "C:\Users\Admin\AppData\Local\Temp\R2登录器制作工具(带更新,反外挂,简约皮肤).exe"
            2⤵
            • Modifies firewall policy service
            • UAC bypass
            • Windows security bypass
            • Loads dropped DLL
            • Windows security modification
            • Checks whether UAC is enabled
            • Enumerates connected drives
            • Drops autorun.inf file
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:2400
            • C:\Users\Admin\AppData\Local\Temp\plgMeM.exe
              C:\Users\Admin\AppData\Local\Temp\plgMeM.exe
              3⤵
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Suspicious use of WriteProcessMemory
              PID:2728
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c ""C:\Users\Admin\AppData\Local\Temp\6f7063d7.bat" "
                4⤵
                  PID:2164
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
            1⤵
              PID:1540
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
              1⤵
                PID:784

              Network

              MITRE ATT&CK Matrix ATT&CK v13

              Initial Access

              Replication Through Removable Media

              1
              T1091

              Persistence

              Create or Modify System Process

              1
              T1543

              Windows Service

              1
              T1543.003

              Privilege Escalation

              Create or Modify System Process

              1
              T1543

              Windows Service

              1
              T1543.003

              Abuse Elevation Control Mechanism

              1
              T1548

              Bypass User Account Control

              1
              T1548.002

              Defense Evasion

              Modify Registry

              5
              T1112

              Impair Defenses

              4
              T1562

              Disable or Modify Tools

              3
              T1562.001

              Disable or Modify System Firewall

              1
              T1562.004

              Abuse Elevation Control Mechanism

              1
              T1548

              Bypass User Account Control

              1
              T1548.002

              Discovery

              System Information Discovery

              3
              T1082

              Query Registry

              1
              T1012

              Peripheral Device Discovery

              1
              T1120

              Lateral Movement

              Replication Through Removable Media

              1
              T1091

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\PROGRAM FILES\7-ZIP\Uninstall.exe
                Filesize

                1.1MB

                MD5

                14d1ed17d89c5a8e91bfc212aa30e782

                SHA1

                d456ebcee734eadd3c64001f70c475e2e36c53ad

                SHA256

                3df7fab54dbf2184eabcfb3d4a147c47b5dc4bc3adc1dd58fedb98fbed806c74

                SHA512

                d90a4c85c29a02ff0ddaa8b3265753f0908264eb0e028539f8cd60a13ad2151c66e881f9f4daf74f2248c4fd25eb80e53abadc353de48d4f5c7abfb2cdd6fbb8

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\69P6875H\k2[1].rar
                Filesize

                4B

                MD5

                d3b07384d113edec49eaa6238ad5ff00

                SHA1

                f1d2d2f924e986ac86fdf7b36c94bcdf32beec15

                SHA256

                b5bb9d8014a0f9b1d61e21e796d78dccdf1352f23cd32812f4850b878ae4944c

                SHA512

                0cf9180a764aba863a67b6d72f0918bc131c6772642cb2dce5a34f0a702f9470ddc2bf125c12198b1995c233c34b4afd346c54a2334c350a948a51b6e8b4e6b6

              • C:\Users\Admin\AppData\Local\Temp\6f7063d7.bat
                Filesize

                187B

                MD5

                9b05637659c7c50a9bbffcbdf5c09f64

                SHA1

                51f4fd2f8da1044450ee3dc5bece3757250fceb7

                SHA256

                2dbee693c4e522e8311e28022468bddba44695153e6fcf232d8dd492713df83c

                SHA512

                9ce459767f22eb7285e4e558ca89d15ee37e0d4ffd3c3bb149b1fa5363ea026d9f704344d29d5204a3a535719ed377a49fb35548b106b96045a11091fb2c5b8d

              • C:\Users\Admin\AppData\Local\Temp\plgMeM.exe
                Filesize

                15KB

                MD5

                56b2c3810dba2e939a8bb9fa36d3cf96

                SHA1

                99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

                SHA256

                4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

                SHA512

                27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

              • C:\wowrqj.exe
                Filesize

                100KB

                MD5

                b81c293757c84509d5156f87ca985784

                SHA1

                35f27b90885b12ad785ca54b72e280729d20a707

                SHA256

                f16992d2265329f587572185224ee9a94ef7375bb167d52f06061490e89f6d90

                SHA512

                cf9f3c9d1505e4ed823369549406310f25c92774f7657cb21547cb3a96e193138c32a3f20c6eaa36ad493e23724213ce9e55f497e2024d1b2363c25e8f3edc6c

              • memory/1040-26-0x0000000001DA0000-0x0000000001DA2000-memory.dmp
                Filesize

                8KB

              • memory/2400-41-0x00000000026D0000-0x000000000375E000-memory.dmp
                Filesize

                16.6MB

              • memory/2400-52-0x00000000026D0000-0x000000000375E000-memory.dmp
                Filesize

                16.6MB

              • memory/2400-10-0x00000000026D0000-0x000000000375E000-memory.dmp
                Filesize

                16.6MB

              • memory/2400-9-0x00000000026D0000-0x000000000375E000-memory.dmp
                Filesize

                16.6MB

              • memory/2400-13-0x00000000026D0000-0x000000000375E000-memory.dmp
                Filesize

                16.6MB

              • memory/2400-7-0x00000000026D0000-0x000000000375E000-memory.dmp
                Filesize

                16.6MB

              • memory/2400-37-0x0000000000280000-0x0000000000282000-memory.dmp
                Filesize

                8KB

              • memory/2400-38-0x0000000000280000-0x0000000000282000-memory.dmp
                Filesize

                8KB

              • memory/2400-36-0x0000000000290000-0x0000000000291000-memory.dmp
                Filesize

                4KB

              • memory/2400-34-0x0000000000290000-0x0000000000291000-memory.dmp
                Filesize

                4KB

              • memory/2400-33-0x0000000000280000-0x0000000000282000-memory.dmp
                Filesize

                8KB

              • memory/2400-0-0x00000000026D0000-0x000000000375E000-memory.dmp
                Filesize

                16.6MB

              • memory/2400-12-0x00000000026D0000-0x000000000375E000-memory.dmp
                Filesize

                16.6MB

              • memory/2400-14-0x00000000026D0000-0x000000000375E000-memory.dmp
                Filesize

                16.6MB

              • memory/2400-22-0x0000000000280000-0x0000000000289000-memory.dmp
                Filesize

                36KB

              • memory/2400-21-0x0000000000280000-0x0000000000289000-memory.dmp
                Filesize

                36KB

              • memory/2400-1-0x0000000000400000-0x0000000000BEA000-memory.dmp
                Filesize

                7.9MB

              • memory/2400-47-0x00000000026D0000-0x000000000375E000-memory.dmp
                Filesize

                16.6MB

              • memory/2400-48-0x00000000026D0000-0x000000000375E000-memory.dmp
                Filesize

                16.6MB

              • memory/2400-50-0x00000000026D0000-0x000000000375E000-memory.dmp
                Filesize

                16.6MB

              • memory/2400-51-0x00000000026D0000-0x000000000375E000-memory.dmp
                Filesize

                16.6MB

              • memory/2400-4-0x00000000026D0000-0x000000000375E000-memory.dmp
                Filesize

                16.6MB

              • memory/2400-55-0x00000000026D0000-0x000000000375E000-memory.dmp
                Filesize

                16.6MB

              • memory/2400-11-0x00000000026D0000-0x000000000375E000-memory.dmp
                Filesize

                16.6MB

              • memory/2400-63-0x00000000026D0000-0x000000000375E000-memory.dmp
                Filesize

                16.6MB

              • memory/2400-64-0x00000000026D0000-0x000000000375E000-memory.dmp
                Filesize

                16.6MB

              • memory/2400-65-0x00000000026D0000-0x000000000375E000-memory.dmp
                Filesize

                16.6MB

              • memory/2400-66-0x0000000000400000-0x0000000000BEA000-memory.dmp
                Filesize

                7.9MB

              • memory/2400-68-0x00000000026D0000-0x000000000375E000-memory.dmp
                Filesize

                16.6MB

              • memory/2400-8-0x00000000026D0000-0x000000000375E000-memory.dmp
                Filesize

                16.6MB

              • memory/2400-120-0x0000000000280000-0x0000000000282000-memory.dmp
                Filesize

                8KB

              • memory/2400-102-0x00000000026D0000-0x000000000375E000-memory.dmp
                Filesize

                16.6MB

              • memory/2400-101-0x00000000026D0000-0x000000000375E000-memory.dmp
                Filesize

                16.6MB

              • memory/2400-83-0x00000000026D0000-0x000000000375E000-memory.dmp
                Filesize

                16.6MB

              • memory/2400-85-0x00000000026D0000-0x000000000375E000-memory.dmp
                Filesize

                16.6MB

              • memory/2400-3-0x00000000026D0000-0x000000000375E000-memory.dmp
                Filesize

                16.6MB

              • memory/2728-81-0x00000000002B0000-0x00000000002B2000-memory.dmp
                Filesize

                8KB

              • memory/2728-77-0x00000000002C0000-0x00000000002C1000-memory.dmp
                Filesize

                4KB

              • memory/2728-79-0x00000000000C0000-0x00000000000C9000-memory.dmp
                Filesize

                36KB

              • memory/2728-80-0x00000000002B0000-0x00000000002B2000-memory.dmp
                Filesize

                8KB

              • memory/2728-25-0x00000000000C0000-0x00000000000C9000-memory.dmp
                Filesize

                36KB