Analysis
-
max time kernel
111s -
max time network
71s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 22:07
Behavioral task
behavioral1
Sample
334e48668b9eee246cfac830e32e0e8831735b28be9dad19e2d28e5186c72cd8.dll
Resource
win7-20240903-en
General
-
Target
334e48668b9eee246cfac830e32e0e8831735b28be9dad19e2d28e5186c72cd8.dll
-
Size
80KB
-
MD5
048fbbd78662ee508b464b90b1e15851
-
SHA1
3a1c457306c37f5e08ff4bc9a644a2a744382eb4
-
SHA256
334e48668b9eee246cfac830e32e0e8831735b28be9dad19e2d28e5186c72cd8
-
SHA512
e8a51a0533e537238cb714fbe1b6043a49359a50e40b8a42cd548c3600d574415106a04e98d9eaf8f95ed4a91754e3f6519488493a5f4bb062a37801c0e02094
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPExeKIIAd:5dbwovEVyqgoZmZXWfIdQdRaefPFKlAd
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 4 2720 rundll32.exe 8 2720 rundll32.exe 9 2720 rundll32.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: rundll32.exe -
pid Process 2840 arp.exe 2864 arp.exe 2080 arp.exe 2892 arp.exe 2600 arp.exe 2908 arp.exe 2916 arp.exe 2972 arp.exe 2876 arp.exe -
resource yara_rule behavioral1/memory/2720-1-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2720-2-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2720-5-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2720-6-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2720-7-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2720-14-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2720-15-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2720-21-0x0000000010000000-0x0000000010033000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 480 Process not Found 480 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2720 rundll32.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2720 2704 rundll32.exe 30 PID 2704 wrote to memory of 2720 2704 rundll32.exe 30 PID 2704 wrote to memory of 2720 2704 rundll32.exe 30 PID 2704 wrote to memory of 2720 2704 rundll32.exe 30 PID 2704 wrote to memory of 2720 2704 rundll32.exe 30 PID 2704 wrote to memory of 2720 2704 rundll32.exe 30 PID 2704 wrote to memory of 2720 2704 rundll32.exe 30 PID 2720 wrote to memory of 2840 2720 rundll32.exe 31 PID 2720 wrote to memory of 2840 2720 rundll32.exe 31 PID 2720 wrote to memory of 2840 2720 rundll32.exe 31 PID 2720 wrote to memory of 2840 2720 rundll32.exe 31 PID 2720 wrote to memory of 2080 2720 rundll32.exe 33 PID 2720 wrote to memory of 2080 2720 rundll32.exe 33 PID 2720 wrote to memory of 2080 2720 rundll32.exe 33 PID 2720 wrote to memory of 2080 2720 rundll32.exe 33 PID 2720 wrote to memory of 2876 2720 rundll32.exe 34 PID 2720 wrote to memory of 2876 2720 rundll32.exe 34 PID 2720 wrote to memory of 2876 2720 rundll32.exe 34 PID 2720 wrote to memory of 2876 2720 rundll32.exe 34 PID 2720 wrote to memory of 2864 2720 rundll32.exe 36 PID 2720 wrote to memory of 2864 2720 rundll32.exe 36 PID 2720 wrote to memory of 2864 2720 rundll32.exe 36 PID 2720 wrote to memory of 2864 2720 rundll32.exe 36 PID 2720 wrote to memory of 2972 2720 rundll32.exe 38 PID 2720 wrote to memory of 2972 2720 rundll32.exe 38 PID 2720 wrote to memory of 2972 2720 rundll32.exe 38 PID 2720 wrote to memory of 2972 2720 rundll32.exe 38 PID 2720 wrote to memory of 2892 2720 rundll32.exe 40 PID 2720 wrote to memory of 2892 2720 rundll32.exe 40 PID 2720 wrote to memory of 2892 2720 rundll32.exe 40 PID 2720 wrote to memory of 2892 2720 rundll32.exe 40 PID 2720 wrote to memory of 2600 2720 rundll32.exe 41 PID 2720 wrote to memory of 2600 2720 rundll32.exe 41 PID 2720 wrote to memory of 2600 2720 rundll32.exe 41 PID 2720 wrote to memory of 2600 2720 rundll32.exe 41 PID 2720 wrote to memory of 2908 2720 rundll32.exe 42 PID 2720 wrote to memory of 2908 2720 rundll32.exe 42 PID 2720 wrote to memory of 2908 2720 rundll32.exe 42 PID 2720 wrote to memory of 2908 2720 rundll32.exe 42 PID 2720 wrote to memory of 2916 2720 rundll32.exe 43 PID 2720 wrote to memory of 2916 2720 rundll32.exe 43 PID 2720 wrote to memory of 2916 2720 rundll32.exe 43 PID 2720 wrote to memory of 2916 2720 rundll32.exe 43 PID 2720 wrote to memory of 2028 2720 rundll32.exe 49 PID 2720 wrote to memory of 2028 2720 rundll32.exe 49 PID 2720 wrote to memory of 2028 2720 rundll32.exe 49 PID 2720 wrote to memory of 2028 2720 rundll32.exe 49
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\334e48668b9eee246cfac830e32e0e8831735b28be9dad19e2d28e5186c72cd8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\334e48668b9eee246cfac830e32e0e8831735b28be9dad19e2d28e5186c72cd8.dll,#12⤵
- Blocklisted process makes network request
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2840
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 f5-b3-92-ea-d8-ea3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2080
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 3a-7e-1b-49-bf-6d3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2876
-
-
C:\Windows\SysWOW64\arp.exearp -s 37.27.61.180 e6-7d-b1-7f-87-093⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2864
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 a0-08-02-d2-ee-703⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2972
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 aa-78-5e-05-a1-8c3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2892
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 b1-04-8a-e2-e9-c03⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2600
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 32-d0-9b-20-d6-093⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2908
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 fc-e8-71-b6-02-3b3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2916
-
-
C:\Windows\SysWOW64\arp.exearp -d3⤵
- System Location Discovery: System Language Discovery
PID:2028
-
-