Analysis
-
max time kernel
93s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16/12/2024, 22:11
Behavioral task
behavioral1
Sample
334e48668b9eee246cfac830e32e0e8831735b28be9dad19e2d28e5186c72cd8.dll
Resource
win7-20240708-en
10 signatures
150 seconds
General
-
Target
334e48668b9eee246cfac830e32e0e8831735b28be9dad19e2d28e5186c72cd8.dll
-
Size
80KB
-
MD5
048fbbd78662ee508b464b90b1e15851
-
SHA1
3a1c457306c37f5e08ff4bc9a644a2a744382eb4
-
SHA256
334e48668b9eee246cfac830e32e0e8831735b28be9dad19e2d28e5186c72cd8
-
SHA512
e8a51a0533e537238cb714fbe1b6043a49359a50e40b8a42cd548c3600d574415106a04e98d9eaf8f95ed4a91754e3f6519488493a5f4bb062a37801c0e02094
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPExeKIIAd:5dbwovEVyqgoZmZXWfIdQdRaefPFKlAd
Malware Config
Signatures
-
pid Process 4668 arp.exe 4900 arp.exe 4344 arp.exe 1420 arp.exe 4380 arp.exe 1944 arp.exe 3640 arp.exe 2524 arp.exe 2092 arp.exe -
resource yara_rule behavioral2/memory/3488-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/3488-2-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4924 3488 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3488 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 524 wrote to memory of 3488 524 rundll32.exe 83 PID 524 wrote to memory of 3488 524 rundll32.exe 83 PID 524 wrote to memory of 3488 524 rundll32.exe 83 PID 3488 wrote to memory of 4668 3488 rundll32.exe 85 PID 3488 wrote to memory of 4668 3488 rundll32.exe 85 PID 3488 wrote to memory of 4668 3488 rundll32.exe 85 PID 3488 wrote to memory of 1944 3488 rundll32.exe 88 PID 3488 wrote to memory of 1944 3488 rundll32.exe 88 PID 3488 wrote to memory of 1944 3488 rundll32.exe 88 PID 3488 wrote to memory of 4900 3488 rundll32.exe 89 PID 3488 wrote to memory of 4900 3488 rundll32.exe 89 PID 3488 wrote to memory of 4900 3488 rundll32.exe 89 PID 3488 wrote to memory of 2524 3488 rundll32.exe 90 PID 3488 wrote to memory of 2524 3488 rundll32.exe 90 PID 3488 wrote to memory of 2524 3488 rundll32.exe 90 PID 3488 wrote to memory of 3640 3488 rundll32.exe 91 PID 3488 wrote to memory of 3640 3488 rundll32.exe 91 PID 3488 wrote to memory of 3640 3488 rundll32.exe 91 PID 3488 wrote to memory of 4344 3488 rundll32.exe 94 PID 3488 wrote to memory of 4344 3488 rundll32.exe 94 PID 3488 wrote to memory of 4344 3488 rundll32.exe 94 PID 3488 wrote to memory of 1420 3488 rundll32.exe 95 PID 3488 wrote to memory of 1420 3488 rundll32.exe 95 PID 3488 wrote to memory of 1420 3488 rundll32.exe 95 PID 3488 wrote to memory of 2092 3488 rundll32.exe 97 PID 3488 wrote to memory of 2092 3488 rundll32.exe 97 PID 3488 wrote to memory of 2092 3488 rundll32.exe 97 PID 3488 wrote to memory of 4380 3488 rundll32.exe 98 PID 3488 wrote to memory of 4380 3488 rundll32.exe 98 PID 3488 wrote to memory of 4380 3488 rundll32.exe 98
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\334e48668b9eee246cfac830e32e0e8831735b28be9dad19e2d28e5186c72cd8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\334e48668b9eee246cfac830e32e0e8831735b28be9dad19e2d28e5186c72cd8.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4668
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 09-59-c6-45-49-883⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1944
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 e7-f6-de-75-dc-ac3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4900
-
-
C:\Windows\SysWOW64\arp.exearp -s 136.243.76.21 59-1c-51-af-5e-d93⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2524
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 f5-9e-10-ac-8e-b63⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3640
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 c6-19-ce-55-a1-5a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4344
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 fd-35-bf-02-ac-033⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1420
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 61-5b-df-3b-8d-9c3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2092
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 fa-f7-54-66-35-ce3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 7123⤵
- Program crash
PID:4924
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3488 -ip 34881⤵PID:228