Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 22:52
Behavioral task
behavioral1
Sample
5f1bdc14ca8d568993c8786c8b259fa57921beee87189ccc016adcf158066305.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5f1bdc14ca8d568993c8786c8b259fa57921beee87189ccc016adcf158066305.dll
Resource
win10v2004-20241007-en
General
-
Target
5f1bdc14ca8d568993c8786c8b259fa57921beee87189ccc016adcf158066305.dll
-
Size
80KB
-
MD5
d4fed2e5cebf432b62ea20a76ca31624
-
SHA1
e22ca4f896d0196295f422202bf061c5df817d57
-
SHA256
5f1bdc14ca8d568993c8786c8b259fa57921beee87189ccc016adcf158066305
-
SHA512
0ac0ddde049f9235fdad2c4f32b6750ab377d3b3efb9aa20c705d35ceb8cb9c08872bca312880359da69e33fd1f7e8b250b605ed6e2a8e5f536c7a071bf9f14e
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEz1:5dbwovEVyqgoZmZXWfIdQdRaefPe
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
pid Process 1600 arp.exe 3892 arp.exe 4904 arp.exe 116 arp.exe 3592 arp.exe 1584 arp.exe 1884 arp.exe 1872 arp.exe 4552 arp.exe -
resource yara_rule behavioral2/memory/5104-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/5104-2-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1012 5104 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5104 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4856 wrote to memory of 5104 4856 rundll32.exe 82 PID 4856 wrote to memory of 5104 4856 rundll32.exe 82 PID 4856 wrote to memory of 5104 4856 rundll32.exe 82 PID 5104 wrote to memory of 1884 5104 rundll32.exe 84 PID 5104 wrote to memory of 1884 5104 rundll32.exe 84 PID 5104 wrote to memory of 1884 5104 rundll32.exe 84 PID 5104 wrote to memory of 116 5104 rundll32.exe 87 PID 5104 wrote to memory of 116 5104 rundll32.exe 87 PID 5104 wrote to memory of 116 5104 rundll32.exe 87 PID 5104 wrote to memory of 3592 5104 rundll32.exe 88 PID 5104 wrote to memory of 3592 5104 rundll32.exe 88 PID 5104 wrote to memory of 3592 5104 rundll32.exe 88 PID 5104 wrote to memory of 1584 5104 rundll32.exe 89 PID 5104 wrote to memory of 1584 5104 rundll32.exe 89 PID 5104 wrote to memory of 1584 5104 rundll32.exe 89 PID 5104 wrote to memory of 1600 5104 rundll32.exe 90 PID 5104 wrote to memory of 1600 5104 rundll32.exe 90 PID 5104 wrote to memory of 1600 5104 rundll32.exe 90 PID 5104 wrote to memory of 4552 5104 rundll32.exe 92 PID 5104 wrote to memory of 4552 5104 rundll32.exe 92 PID 5104 wrote to memory of 4552 5104 rundll32.exe 92 PID 5104 wrote to memory of 4904 5104 rundll32.exe 93 PID 5104 wrote to memory of 4904 5104 rundll32.exe 93 PID 5104 wrote to memory of 4904 5104 rundll32.exe 93 PID 5104 wrote to memory of 3892 5104 rundll32.exe 94 PID 5104 wrote to memory of 3892 5104 rundll32.exe 94 PID 5104 wrote to memory of 3892 5104 rundll32.exe 94 PID 5104 wrote to memory of 1872 5104 rundll32.exe 98 PID 5104 wrote to memory of 1872 5104 rundll32.exe 98 PID 5104 wrote to memory of 1872 5104 rundll32.exe 98
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5f1bdc14ca8d568993c8786c8b259fa57921beee87189ccc016adcf158066305.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5f1bdc14ca8d568993c8786c8b259fa57921beee87189ccc016adcf158066305.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1884
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 2b-d1-02-a6-d9-e03⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:116
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 fb-c5-62-3a-68-7a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3592
-
-
C:\Windows\SysWOW64\arp.exearp -s 136.243.69.123 c7-c1-4a-71-5f-693⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1584
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 cc-1f-07-10-c0-213⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1600
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 7a-7f-3e-95-96-1c3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4552
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 b7-e3-0e-b5-f5-013⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4904
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 a3-3b-60-b8-02-743⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3892
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 bd-8c-5d-2e-3f-2c3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5104 -s 7123⤵
- Program crash
PID:1012
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 5104 -ip 51041⤵PID:5092