Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 22:07
Behavioral task
behavioral1
Sample
334e48668b9eee246cfac830e32e0e8831735b28be9dad19e2d28e5186c72cd8.dll
Resource
win7-20240903-en
windows7-x64
9 signatures
120 seconds
General
-
Target
334e48668b9eee246cfac830e32e0e8831735b28be9dad19e2d28e5186c72cd8.dll
-
Size
80KB
-
MD5
048fbbd78662ee508b464b90b1e15851
-
SHA1
3a1c457306c37f5e08ff4bc9a644a2a744382eb4
-
SHA256
334e48668b9eee246cfac830e32e0e8831735b28be9dad19e2d28e5186c72cd8
-
SHA512
e8a51a0533e537238cb714fbe1b6043a49359a50e40b8a42cd548c3600d574415106a04e98d9eaf8f95ed4a91754e3f6519488493a5f4bb062a37801c0e02094
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPExeKIIAd:5dbwovEVyqgoZmZXWfIdQdRaefPFKlAd
Malware Config
Signatures
-
pid Process 804 arp.exe 1788 arp.exe 4768 arp.exe 4400 arp.exe 3968 arp.exe 3436 arp.exe 3704 arp.exe 832 arp.exe 3160 arp.exe -
resource yara_rule behavioral2/memory/408-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/408-1-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4420 408 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 408 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3692 wrote to memory of 408 3692 rundll32.exe 83 PID 3692 wrote to memory of 408 3692 rundll32.exe 83 PID 3692 wrote to memory of 408 3692 rundll32.exe 83 PID 408 wrote to memory of 4768 408 rundll32.exe 84 PID 408 wrote to memory of 4768 408 rundll32.exe 84 PID 408 wrote to memory of 4768 408 rundll32.exe 84 PID 408 wrote to memory of 1788 408 rundll32.exe 88 PID 408 wrote to memory of 1788 408 rundll32.exe 88 PID 408 wrote to memory of 1788 408 rundll32.exe 88 PID 408 wrote to memory of 3160 408 rundll32.exe 89 PID 408 wrote to memory of 3160 408 rundll32.exe 89 PID 408 wrote to memory of 3160 408 rundll32.exe 89 PID 408 wrote to memory of 832 408 rundll32.exe 90 PID 408 wrote to memory of 832 408 rundll32.exe 90 PID 408 wrote to memory of 832 408 rundll32.exe 90 PID 408 wrote to memory of 3704 408 rundll32.exe 91 PID 408 wrote to memory of 3704 408 rundll32.exe 91 PID 408 wrote to memory of 3704 408 rundll32.exe 91 PID 408 wrote to memory of 804 408 rundll32.exe 92 PID 408 wrote to memory of 804 408 rundll32.exe 92 PID 408 wrote to memory of 804 408 rundll32.exe 92 PID 408 wrote to memory of 3436 408 rundll32.exe 93 PID 408 wrote to memory of 3436 408 rundll32.exe 93 PID 408 wrote to memory of 3436 408 rundll32.exe 93 PID 408 wrote to memory of 3968 408 rundll32.exe 94 PID 408 wrote to memory of 3968 408 rundll32.exe 94 PID 408 wrote to memory of 3968 408 rundll32.exe 94 PID 408 wrote to memory of 4400 408 rundll32.exe 95 PID 408 wrote to memory of 4400 408 rundll32.exe 95 PID 408 wrote to memory of 4400 408 rundll32.exe 95
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\334e48668b9eee246cfac830e32e0e8831735b28be9dad19e2d28e5186c72cd8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\334e48668b9eee246cfac830e32e0e8831735b28be9dad19e2d28e5186c72cd8.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4768
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 1d-0a-dc-e9-a0-e73⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1788
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 b5-aa-88-45-3e-fe3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3160
-
-
C:\Windows\SysWOW64\arp.exearp -s 37.27.61.184 0d-76-73-39-37-ab3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:832
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 ab-6f-a9-4b-85-553⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3704
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 63-19-67-61-de-bf3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:804
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 b9-d8-cc-59-54-513⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3436
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 4e-f5-5e-63-b9-7a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3968
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 be-80-e3-86-9e-da3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 408 -s 7163⤵
- Program crash
PID:4420
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 408 -ip 4081⤵PID:4504