Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 22:11
Behavioral task
behavioral1
Sample
334e48668b9eee246cfac830e32e0e8831735b28be9dad19e2d28e5186c72cd8.dll
Resource
win7-20240708-en
General
-
Target
334e48668b9eee246cfac830e32e0e8831735b28be9dad19e2d28e5186c72cd8.dll
-
Size
80KB
-
MD5
048fbbd78662ee508b464b90b1e15851
-
SHA1
3a1c457306c37f5e08ff4bc9a644a2a744382eb4
-
SHA256
334e48668b9eee246cfac830e32e0e8831735b28be9dad19e2d28e5186c72cd8
-
SHA512
e8a51a0533e537238cb714fbe1b6043a49359a50e40b8a42cd548c3600d574415106a04e98d9eaf8f95ed4a91754e3f6519488493a5f4bb062a37801c0e02094
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPExeKIIAd:5dbwovEVyqgoZmZXWfIdQdRaefPFKlAd
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 5 2552 rundll32.exe 8 2552 rundll32.exe 9 2552 rundll32.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: rundll32.exe -
pid Process 2532 arp.exe 2408 arp.exe 2884 arp.exe 1728 arp.exe 2528 arp.exe 1844 arp.exe 1552 arp.exe 872 arp.exe 2356 arp.exe -
resource yara_rule behavioral1/memory/2552-3-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2552-2-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2552-1-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1728-4-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1728-6-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2884-7-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2532-14-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1552-13-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2408-12-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2356-11-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/872-10-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1844-9-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2528-8-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/872-15-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1552-29-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2356-27-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2408-25-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2532-23-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2528-21-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1844-19-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2884-18-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2552-31-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2552-32-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2948-34-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2948-36-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2552-37-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2552-43-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2552-45-0x0000000010000000-0x0000000010033000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 472 Process not Found 472 Process not Found -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 2552 rundll32.exe Token: SeDebugPrivilege 1728 arp.exe Token: SeDebugPrivilege 2884 arp.exe Token: SeDebugPrivilege 1844 arp.exe Token: SeDebugPrivilege 872 arp.exe Token: SeDebugPrivilege 2356 arp.exe Token: SeDebugPrivilege 1552 arp.exe Token: SeDebugPrivilege 2528 arp.exe Token: SeDebugPrivilege 2408 arp.exe Token: SeDebugPrivilege 2532 arp.exe Token: SeDebugPrivilege 2948 arp.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2552 1700 rundll32.exe 30 PID 1700 wrote to memory of 2552 1700 rundll32.exe 30 PID 1700 wrote to memory of 2552 1700 rundll32.exe 30 PID 1700 wrote to memory of 2552 1700 rundll32.exe 30 PID 1700 wrote to memory of 2552 1700 rundll32.exe 30 PID 1700 wrote to memory of 2552 1700 rundll32.exe 30 PID 1700 wrote to memory of 2552 1700 rundll32.exe 30 PID 2552 wrote to memory of 1728 2552 rundll32.exe 31 PID 2552 wrote to memory of 1728 2552 rundll32.exe 31 PID 2552 wrote to memory of 1728 2552 rundll32.exe 31 PID 2552 wrote to memory of 1728 2552 rundll32.exe 31 PID 2552 wrote to memory of 2532 2552 rundll32.exe 33 PID 2552 wrote to memory of 2532 2552 rundll32.exe 33 PID 2552 wrote to memory of 2532 2552 rundll32.exe 33 PID 2552 wrote to memory of 2532 2552 rundll32.exe 33 PID 2552 wrote to memory of 2356 2552 rundll32.exe 34 PID 2552 wrote to memory of 2356 2552 rundll32.exe 34 PID 2552 wrote to memory of 2356 2552 rundll32.exe 34 PID 2552 wrote to memory of 2356 2552 rundll32.exe 34 PID 2552 wrote to memory of 2528 2552 rundll32.exe 35 PID 2552 wrote to memory of 2528 2552 rundll32.exe 35 PID 2552 wrote to memory of 2528 2552 rundll32.exe 35 PID 2552 wrote to memory of 2528 2552 rundll32.exe 35 PID 2552 wrote to memory of 872 2552 rundll32.exe 36 PID 2552 wrote to memory of 872 2552 rundll32.exe 36 PID 2552 wrote to memory of 872 2552 rundll32.exe 36 PID 2552 wrote to memory of 872 2552 rundll32.exe 36 PID 2552 wrote to memory of 1844 2552 rundll32.exe 38 PID 2552 wrote to memory of 1844 2552 rundll32.exe 38 PID 2552 wrote to memory of 1844 2552 rundll32.exe 38 PID 2552 wrote to memory of 1844 2552 rundll32.exe 38 PID 2552 wrote to memory of 2408 2552 rundll32.exe 39 PID 2552 wrote to memory of 2408 2552 rundll32.exe 39 PID 2552 wrote to memory of 2408 2552 rundll32.exe 39 PID 2552 wrote to memory of 2408 2552 rundll32.exe 39 PID 2552 wrote to memory of 2884 2552 rundll32.exe 40 PID 2552 wrote to memory of 2884 2552 rundll32.exe 40 PID 2552 wrote to memory of 2884 2552 rundll32.exe 40 PID 2552 wrote to memory of 2884 2552 rundll32.exe 40 PID 2552 wrote to memory of 1552 2552 rundll32.exe 46 PID 2552 wrote to memory of 1552 2552 rundll32.exe 46 PID 2552 wrote to memory of 1552 2552 rundll32.exe 46 PID 2552 wrote to memory of 1552 2552 rundll32.exe 46 PID 2552 wrote to memory of 2948 2552 rundll32.exe 50 PID 2552 wrote to memory of 2948 2552 rundll32.exe 50 PID 2552 wrote to memory of 2948 2552 rundll32.exe 50 PID 2552 wrote to memory of 2948 2552 rundll32.exe 50
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\334e48668b9eee246cfac830e32e0e8831735b28be9dad19e2d28e5186c72cd8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\334e48668b9eee246cfac830e32e0e8831735b28be9dad19e2d28e5186c72cd8.dll,#12⤵
- Blocklisted process makes network request
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 09-59-c6-45-49-883⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2532
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 e7-f6-de-75-dc-ac3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
C:\Windows\SysWOW64\arp.exearp -s 37.27.61.185 59-1c-51-af-5e-d93⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 f5-9e-10-ac-8e-b63⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:872
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 c6-19-ce-55-a1-5a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1844
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 fd-35-bf-02-ac-033⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 61-5b-df-3b-8d-9c3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 fa-f7-54-66-35-ce3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
-
C:\Windows\SysWOW64\arp.exearp -d3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-