Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 06:04
Behavioral task
behavioral1
Sample
fbd743a17a7b357824d27d4a2d225e5592f169f54c299e582c3d976afe413b06.dll
Resource
win7-20241010-en
General
-
Target
fbd743a17a7b357824d27d4a2d225e5592f169f54c299e582c3d976afe413b06.dll
-
Size
80KB
-
MD5
aedfd27750266a64af84e27df66c01b2
-
SHA1
9338667b6262d21c9cb9a7654cd6997267e1eaca
-
SHA256
fbd743a17a7b357824d27d4a2d225e5592f169f54c299e582c3d976afe413b06
-
SHA512
6d54eee4c122dcea1936f1bc524da91ddfe4b8f33d96c51aac8f934be5ea9a80a3e35d062e8e28dec59936aeaf0b8c91c2f3197463dcbfc8fdbe7cf2e9975d22
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEDvME:5dbwovEVyqgoZmZXWfIdQdRaefPM
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 4 2608 rundll32.exe 8 2608 rundll32.exe 9 2608 rundll32.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: rundll32.exe -
pid Process 2236 arp.exe 2780 arp.exe 2848 arp.exe 1848 arp.exe 2928 arp.exe 2804 arp.exe 2756 arp.exe 2988 arp.exe 2160 arp.exe -
resource yara_rule behavioral1/memory/2608-30-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2988-28-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2236-27-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2804-24-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2160-22-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2848-21-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2928-16-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2780-15-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1848-18-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2804-12-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2236-11-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2160-10-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2988-9-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2848-8-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1848-7-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2780-6-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2928-5-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2756-4-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2756-3-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2608-2-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2608-1-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2608-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2828-32-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2828-33-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2608-38-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2608-41-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2608-42-0x0000000010000000-0x0000000010033000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2608 rundll32.exe 2608 rundll32.exe 2608 rundll32.exe 2608 rundll32.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 476 Process not Found 476 Process not Found -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 2608 rundll32.exe Token: SeDebugPrivilege 2756 arp.exe Token: SeDebugPrivilege 2780 arp.exe Token: SeDebugPrivilege 2928 arp.exe Token: SeDebugPrivilege 1848 arp.exe Token: SeDebugPrivilege 2988 arp.exe Token: SeDebugPrivilege 2848 arp.exe Token: SeDebugPrivilege 2160 arp.exe Token: SeDebugPrivilege 2804 arp.exe Token: SeDebugPrivilege 2236 arp.exe Token: SeDebugPrivilege 2828 arp.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2608 2124 rundll32.exe 30 PID 2124 wrote to memory of 2608 2124 rundll32.exe 30 PID 2124 wrote to memory of 2608 2124 rundll32.exe 30 PID 2124 wrote to memory of 2608 2124 rundll32.exe 30 PID 2124 wrote to memory of 2608 2124 rundll32.exe 30 PID 2124 wrote to memory of 2608 2124 rundll32.exe 30 PID 2124 wrote to memory of 2608 2124 rundll32.exe 30 PID 2608 wrote to memory of 2756 2608 rundll32.exe 31 PID 2608 wrote to memory of 2756 2608 rundll32.exe 31 PID 2608 wrote to memory of 2756 2608 rundll32.exe 31 PID 2608 wrote to memory of 2756 2608 rundll32.exe 31 PID 2608 wrote to memory of 2804 2608 rundll32.exe 33 PID 2608 wrote to memory of 2804 2608 rundll32.exe 33 PID 2608 wrote to memory of 2804 2608 rundll32.exe 33 PID 2608 wrote to memory of 2804 2608 rundll32.exe 33 PID 2608 wrote to memory of 2780 2608 rundll32.exe 34 PID 2608 wrote to memory of 2780 2608 rundll32.exe 34 PID 2608 wrote to memory of 2780 2608 rundll32.exe 34 PID 2608 wrote to memory of 2780 2608 rundll32.exe 34 PID 2608 wrote to memory of 2236 2608 rundll32.exe 35 PID 2608 wrote to memory of 2236 2608 rundll32.exe 35 PID 2608 wrote to memory of 2236 2608 rundll32.exe 35 PID 2608 wrote to memory of 2236 2608 rundll32.exe 35 PID 2608 wrote to memory of 2928 2608 rundll32.exe 36 PID 2608 wrote to memory of 2928 2608 rundll32.exe 36 PID 2608 wrote to memory of 2928 2608 rundll32.exe 36 PID 2608 wrote to memory of 2928 2608 rundll32.exe 36 PID 2608 wrote to memory of 2160 2608 rundll32.exe 37 PID 2608 wrote to memory of 2160 2608 rundll32.exe 37 PID 2608 wrote to memory of 2160 2608 rundll32.exe 37 PID 2608 wrote to memory of 2160 2608 rundll32.exe 37 PID 2608 wrote to memory of 1848 2608 rundll32.exe 38 PID 2608 wrote to memory of 1848 2608 rundll32.exe 38 PID 2608 wrote to memory of 1848 2608 rundll32.exe 38 PID 2608 wrote to memory of 1848 2608 rundll32.exe 38 PID 2608 wrote to memory of 2848 2608 rundll32.exe 41 PID 2608 wrote to memory of 2848 2608 rundll32.exe 41 PID 2608 wrote to memory of 2848 2608 rundll32.exe 41 PID 2608 wrote to memory of 2848 2608 rundll32.exe 41 PID 2608 wrote to memory of 2988 2608 rundll32.exe 44 PID 2608 wrote to memory of 2988 2608 rundll32.exe 44 PID 2608 wrote to memory of 2988 2608 rundll32.exe 44 PID 2608 wrote to memory of 2988 2608 rundll32.exe 44 PID 2608 wrote to memory of 2828 2608 rundll32.exe 49 PID 2608 wrote to memory of 2828 2608 rundll32.exe 49 PID 2608 wrote to memory of 2828 2608 rundll32.exe 49 PID 2608 wrote to memory of 2828 2608 rundll32.exe 49
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbd743a17a7b357824d27d4a2d225e5592f169f54c299e582c3d976afe413b06.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbd743a17a7b357824d27d4a2d225e5592f169f54c299e582c3d976afe413b06.dll,#12⤵
- Blocklisted process makes network request
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 ea-6e-c6-e9-03-693⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 d7-13-2c-e5-22-8a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
C:\Windows\SysWOW64\arp.exearp -s 37.27.61.184 05-23-99-7a-12-0e3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 6f-92-a3-f2-3d-523⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 94-9c-a3-98-12-cb3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2160
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 55-4b-5c-5b-4e-6e3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1848
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 f0-a4-c5-5d-a1-a43⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 ca-e4-c6-35-c6-c53⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
C:\Windows\SysWOW64\arp.exearp -d3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-