Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 02:23
Behavioral task
behavioral1
Sample
babf307f55dc4140a94f20b381c3a4d6898aa32da5f0b534863b61a3ac6990fa.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
babf307f55dc4140a94f20b381c3a4d6898aa32da5f0b534863b61a3ac6990fa.dll
Resource
win10v2004-20240426-en
General
-
Target
babf307f55dc4140a94f20b381c3a4d6898aa32da5f0b534863b61a3ac6990fa.dll
-
Size
80KB
-
MD5
2ba098f5e421c6fa0fafcc4614166730
-
SHA1
d9c561597563c94b74deb864b454fc9bdff1beb8
-
SHA256
babf307f55dc4140a94f20b381c3a4d6898aa32da5f0b534863b61a3ac6990fa
-
SHA512
4818bad60a1915f01d6c140f72980ef86d6303b83c2837e8ac5bd2f30403a3c9873458fcdcb836970c8673d1fb0b37bc5a2637322570583c16e155175d98d675
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEpqr:5dbwovEVyqgoZmZXWfIdQdRaefP7
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1636-0-0x0000000010000000-0x0000000010033000-memory.dmp UPX behavioral2/memory/1636-1-0x0000000010000000-0x0000000010033000-memory.dmp UPX -
Modifies AppInit DLL entries 2 TTPs
-
Processes:
resource yara_rule behavioral2/memory/1636-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/1636-1-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4920 1636 WerFault.exe rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
rundll32.exedescription pid process Token: SeDebugPrivilege 1636 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1448 wrote to memory of 1636 1448 rundll32.exe rundll32.exe PID 1448 wrote to memory of 1636 1448 rundll32.exe rundll32.exe PID 1448 wrote to memory of 1636 1448 rundll32.exe rundll32.exe PID 1636 wrote to memory of 3808 1636 rundll32.exe arp.exe PID 1636 wrote to memory of 3808 1636 rundll32.exe arp.exe PID 1636 wrote to memory of 3808 1636 rundll32.exe arp.exe PID 1636 wrote to memory of 3056 1636 rundll32.exe arp.exe PID 1636 wrote to memory of 3056 1636 rundll32.exe arp.exe PID 1636 wrote to memory of 3056 1636 rundll32.exe arp.exe PID 1636 wrote to memory of 3880 1636 rundll32.exe arp.exe PID 1636 wrote to memory of 3880 1636 rundll32.exe arp.exe PID 1636 wrote to memory of 3880 1636 rundll32.exe arp.exe PID 1636 wrote to memory of 4908 1636 rundll32.exe arp.exe PID 1636 wrote to memory of 4908 1636 rundll32.exe arp.exe PID 1636 wrote to memory of 4908 1636 rundll32.exe arp.exe PID 1636 wrote to memory of 2036 1636 rundll32.exe arp.exe PID 1636 wrote to memory of 2036 1636 rundll32.exe arp.exe PID 1636 wrote to memory of 2036 1636 rundll32.exe arp.exe PID 1636 wrote to memory of 2436 1636 rundll32.exe arp.exe PID 1636 wrote to memory of 2436 1636 rundll32.exe arp.exe PID 1636 wrote to memory of 2436 1636 rundll32.exe arp.exe PID 1636 wrote to memory of 3288 1636 rundll32.exe arp.exe PID 1636 wrote to memory of 3288 1636 rundll32.exe arp.exe PID 1636 wrote to memory of 3288 1636 rundll32.exe arp.exe PID 1636 wrote to memory of 2248 1636 rundll32.exe arp.exe PID 1636 wrote to memory of 2248 1636 rundll32.exe arp.exe PID 1636 wrote to memory of 2248 1636 rundll32.exe arp.exe PID 1636 wrote to memory of 4896 1636 rundll32.exe arp.exe PID 1636 wrote to memory of 4896 1636 rundll32.exe arp.exe PID 1636 wrote to memory of 4896 1636 rundll32.exe arp.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\babf307f55dc4140a94f20b381c3a4d6898aa32da5f0b534863b61a3ac6990fa.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\babf307f55dc4140a94f20b381c3a4d6898aa32da5f0b534863b61a3ac6990fa.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\arp.exearp -a3⤵PID:3808
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 46-87-b1-65-e3-7d3⤵PID:3056
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 f7-e6-cc-a8-05-f73⤵PID:3880
-
-
C:\Windows\SysWOW64\arp.exearp -s 37.27.61.181 b6-75-1b-19-58-db3⤵PID:4908
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 45-a0-24-fc-4a-b93⤵PID:2036
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 24-99-9a-0e-11-3d3⤵PID:2436
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 ae-79-80-a0-cc-9e3⤵PID:3288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1636 -s 7003⤵
- Program crash
PID:4920
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 5c-ff-10-ca-47-e13⤵PID:2248
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 04-fc-6e-08-9d-723⤵PID:4896
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1636 -ip 16361⤵PID:4036