Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 02:23
Behavioral task
behavioral1
Sample
babf307f55dc4140a94f20b381c3a4d6898aa32da5f0b534863b61a3ac6990fa.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
babf307f55dc4140a94f20b381c3a4d6898aa32da5f0b534863b61a3ac6990fa.dll
Resource
win10v2004-20240426-en
General
-
Target
babf307f55dc4140a94f20b381c3a4d6898aa32da5f0b534863b61a3ac6990fa.dll
-
Size
80KB
-
MD5
2ba098f5e421c6fa0fafcc4614166730
-
SHA1
d9c561597563c94b74deb864b454fc9bdff1beb8
-
SHA256
babf307f55dc4140a94f20b381c3a4d6898aa32da5f0b534863b61a3ac6990fa
-
SHA512
4818bad60a1915f01d6c140f72980ef86d6303b83c2837e8ac5bd2f30403a3c9873458fcdcb836970c8673d1fb0b37bc5a2637322570583c16e155175d98d675
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEpqr:5dbwovEVyqgoZmZXWfIdQdRaefP7
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2952-0-0x0000000010000000-0x0000000010033000-memory.dmp UPX behavioral1/memory/2820-1-0x0000000010000000-0x0000000010033000-memory.dmp UPX behavioral1/memory/2820-2-0x0000000010000000-0x0000000010033000-memory.dmp UPX behavioral1/memory/2952-3-0x0000000010000000-0x0000000010033000-memory.dmp UPX -
Modifies AppInit DLL entries 2 TTPs
-
Processes:
resource yara_rule behavioral1/memory/2952-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2820-1-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2820-2-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2952-3-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2768 2952 WerFault.exe rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
rundll32.exearp.exedescription pid process Token: SeDebugPrivilege 2952 rundll32.exe Token: SeDebugPrivilege 2820 arp.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2884 wrote to memory of 2952 2884 rundll32.exe rundll32.exe PID 2884 wrote to memory of 2952 2884 rundll32.exe rundll32.exe PID 2884 wrote to memory of 2952 2884 rundll32.exe rundll32.exe PID 2884 wrote to memory of 2952 2884 rundll32.exe rundll32.exe PID 2884 wrote to memory of 2952 2884 rundll32.exe rundll32.exe PID 2884 wrote to memory of 2952 2884 rundll32.exe rundll32.exe PID 2884 wrote to memory of 2952 2884 rundll32.exe rundll32.exe PID 2952 wrote to memory of 2820 2952 rundll32.exe arp.exe PID 2952 wrote to memory of 2820 2952 rundll32.exe arp.exe PID 2952 wrote to memory of 2820 2952 rundll32.exe arp.exe PID 2952 wrote to memory of 2820 2952 rundll32.exe arp.exe PID 2952 wrote to memory of 2768 2952 rundll32.exe WerFault.exe PID 2952 wrote to memory of 2768 2952 rundll32.exe WerFault.exe PID 2952 wrote to memory of 2768 2952 rundll32.exe WerFault.exe PID 2952 wrote to memory of 2768 2952 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\babf307f55dc4140a94f20b381c3a4d6898aa32da5f0b534863b61a3ac6990fa.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\babf307f55dc4140a94f20b381c3a4d6898aa32da5f0b534863b61a3ac6990fa.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 3043⤵
- Program crash
PID:2768
-
-
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-