Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 03:34
Behavioral task
behavioral1
Sample
bb2fea1c7430953077dddf0d67273b029fe37038f2ad81ab7c129fdd13fd302dN.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bb2fea1c7430953077dddf0d67273b029fe37038f2ad81ab7c129fdd13fd302dN.dll
Resource
win10v2004-20241007-en
General
-
Target
bb2fea1c7430953077dddf0d67273b029fe37038f2ad81ab7c129fdd13fd302dN.dll
-
Size
80KB
-
MD5
daf8181b5d3a5422874d8807e3fac980
-
SHA1
acbe13dd414d717e888e4ecd131178cefc3f815e
-
SHA256
bb2fea1c7430953077dddf0d67273b029fe37038f2ad81ab7c129fdd13fd302d
-
SHA512
217d9a4ba0b1fe685c35cd0709d8330182b1640f7bd04eae74ae5e63df201dbccd8f2f47172c547af12fb46558d01b7a07e109dde362caa46425aebb6bada845
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEvMz:5dbwovEVyqgoZmZXWfIdQdRaefPFz
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
pid Process 2704 arp.exe 3140 arp.exe 2256 arp.exe 3864 arp.exe 1916 arp.exe 2728 arp.exe 1320 arp.exe 1508 arp.exe 2828 arp.exe -
resource yara_rule behavioral2/memory/4924-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/4924-1-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1840 4924 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4924 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3556 wrote to memory of 4924 3556 rundll32.exe 83 PID 3556 wrote to memory of 4924 3556 rundll32.exe 83 PID 3556 wrote to memory of 4924 3556 rundll32.exe 83 PID 4924 wrote to memory of 1320 4924 rundll32.exe 85 PID 4924 wrote to memory of 1320 4924 rundll32.exe 85 PID 4924 wrote to memory of 1320 4924 rundll32.exe 85 PID 4924 wrote to memory of 2728 4924 rundll32.exe 88 PID 4924 wrote to memory of 2728 4924 rundll32.exe 88 PID 4924 wrote to memory of 2728 4924 rundll32.exe 88 PID 4924 wrote to memory of 3140 4924 rundll32.exe 89 PID 4924 wrote to memory of 3140 4924 rundll32.exe 89 PID 4924 wrote to memory of 3140 4924 rundll32.exe 89 PID 4924 wrote to memory of 2704 4924 rundll32.exe 90 PID 4924 wrote to memory of 2704 4924 rundll32.exe 90 PID 4924 wrote to memory of 2704 4924 rundll32.exe 90 PID 4924 wrote to memory of 2828 4924 rundll32.exe 91 PID 4924 wrote to memory of 2828 4924 rundll32.exe 91 PID 4924 wrote to memory of 2828 4924 rundll32.exe 91 PID 4924 wrote to memory of 1916 4924 rundll32.exe 92 PID 4924 wrote to memory of 1916 4924 rundll32.exe 92 PID 4924 wrote to memory of 1916 4924 rundll32.exe 92 PID 4924 wrote to memory of 3864 4924 rundll32.exe 93 PID 4924 wrote to memory of 3864 4924 rundll32.exe 93 PID 4924 wrote to memory of 3864 4924 rundll32.exe 93 PID 4924 wrote to memory of 1508 4924 rundll32.exe 94 PID 4924 wrote to memory of 1508 4924 rundll32.exe 94 PID 4924 wrote to memory of 1508 4924 rundll32.exe 94 PID 4924 wrote to memory of 2256 4924 rundll32.exe 95 PID 4924 wrote to memory of 2256 4924 rundll32.exe 95 PID 4924 wrote to memory of 2256 4924 rundll32.exe 95
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb2fea1c7430953077dddf0d67273b029fe37038f2ad81ab7c129fdd13fd302dN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb2fea1c7430953077dddf0d67273b029fe37038f2ad81ab7c129fdd13fd302dN.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1320
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 20-03-9a-08-4c-b83⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2728
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 f4-e8-d8-de-88-ad3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3140
-
-
C:\Windows\SysWOW64\arp.exearp -s 37.27.61.181 18-4f-0b-ad-3c-8d3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2704
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 b6-71-ee-2b-13-ec3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2828
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 10-6b-9d-09-e8-ec3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1916
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 fe-44-c3-0c-41-e63⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3864
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 4d-f9-6a-4d-63-8b3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1508
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 70-bc-0b-01-e4-3a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 7043⤵
- Program crash
PID:1840
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4924 -ip 49241⤵PID:1596