Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 09:55
Behavioral task
behavioral1
Sample
ff9219cf3805f3c779117abcfa19e1a85b71a7e30bf363c7831b0dd11bc59efdN.dll
Resource
win7-20240903-en
6 signatures
120 seconds
General
-
Target
ff9219cf3805f3c779117abcfa19e1a85b71a7e30bf363c7831b0dd11bc59efdN.dll
-
Size
80KB
-
MD5
78b72a6243e4e9985929f6dab26b7770
-
SHA1
8f0eb2269bd0b9fe74af559279e5064b37bf647d
-
SHA256
ff9219cf3805f3c779117abcfa19e1a85b71a7e30bf363c7831b0dd11bc59efd
-
SHA512
47077047883fd033324ddd0be07dae8c2b8d9e5f04895e73ef7b1b80a29808f6b5f2a2a0517530b65f07f5bc47cb25eb945ff8baf77ceff07ef191237c2c92d4
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEgAaC/1:5dbwovEVyqgoZmZXWfIdQdRaefPCfd
Malware Config
Signatures
-
pid Process 3048 arp.exe 3812 arp.exe 2192 arp.exe 404 arp.exe 3752 arp.exe 3880 arp.exe 3440 arp.exe 2972 arp.exe 1772 arp.exe -
resource yara_rule behavioral2/memory/1708-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/1708-1-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1172 1708 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1708 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4352 wrote to memory of 1708 4352 rundll32.exe 85 PID 4352 wrote to memory of 1708 4352 rundll32.exe 85 PID 4352 wrote to memory of 1708 4352 rundll32.exe 85 PID 1708 wrote to memory of 3440 1708 rundll32.exe 86 PID 1708 wrote to memory of 3440 1708 rundll32.exe 86 PID 1708 wrote to memory of 3440 1708 rundll32.exe 86 PID 1708 wrote to memory of 3880 1708 rundll32.exe 90 PID 1708 wrote to memory of 3880 1708 rundll32.exe 90 PID 1708 wrote to memory of 3880 1708 rundll32.exe 90 PID 1708 wrote to memory of 1772 1708 rundll32.exe 91 PID 1708 wrote to memory of 1772 1708 rundll32.exe 91 PID 1708 wrote to memory of 1772 1708 rundll32.exe 91 PID 1708 wrote to memory of 3752 1708 rundll32.exe 92 PID 1708 wrote to memory of 3752 1708 rundll32.exe 92 PID 1708 wrote to memory of 3752 1708 rundll32.exe 92 PID 1708 wrote to memory of 404 1708 rundll32.exe 93 PID 1708 wrote to memory of 404 1708 rundll32.exe 93 PID 1708 wrote to memory of 404 1708 rundll32.exe 93 PID 1708 wrote to memory of 2192 1708 rundll32.exe 94 PID 1708 wrote to memory of 2192 1708 rundll32.exe 94 PID 1708 wrote to memory of 2192 1708 rundll32.exe 94 PID 1708 wrote to memory of 3812 1708 rundll32.exe 95 PID 1708 wrote to memory of 3812 1708 rundll32.exe 95 PID 1708 wrote to memory of 3812 1708 rundll32.exe 95 PID 1708 wrote to memory of 3048 1708 rundll32.exe 96 PID 1708 wrote to memory of 3048 1708 rundll32.exe 96 PID 1708 wrote to memory of 3048 1708 rundll32.exe 96 PID 1708 wrote to memory of 2972 1708 rundll32.exe 97 PID 1708 wrote to memory of 2972 1708 rundll32.exe 97 PID 1708 wrote to memory of 2972 1708 rundll32.exe 97
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ff9219cf3805f3c779117abcfa19e1a85b71a7e30bf363c7831b0dd11bc59efdN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ff9219cf3805f3c779117abcfa19e1a85b71a7e30bf363c7831b0dd11bc59efdN.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3440
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 85-e0-19-32-6b-0b3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3880
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 64-16-2e-29-88-593⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1772
-
-
C:\Windows\SysWOW64\arp.exearp -s 37.27.61.183 7b-0f-10-ba-27-943⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3752
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 39-fb-05-95-92-b13⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:404
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 08-c1-83-e1-32-483⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2192
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 ec-ea-67-a4-3d-e03⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3812
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 e3-b4-6c-ce-8f-773⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3048
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 a9-4d-ed-1c-d7-f43⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 7123⤵
- Program crash
PID:1172
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1708 -ip 17081⤵PID:2272