Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 22:58
Behavioral task
behavioral1
Sample
5f1bdc14ca8d568993c8786c8b259fa57921beee87189ccc016adcf158066305.dll
Resource
win7-20240903-en
General
-
Target
5f1bdc14ca8d568993c8786c8b259fa57921beee87189ccc016adcf158066305.dll
-
Size
80KB
-
MD5
d4fed2e5cebf432b62ea20a76ca31624
-
SHA1
e22ca4f896d0196295f422202bf061c5df817d57
-
SHA256
5f1bdc14ca8d568993c8786c8b259fa57921beee87189ccc016adcf158066305
-
SHA512
0ac0ddde049f9235fdad2c4f32b6750ab377d3b3efb9aa20c705d35ceb8cb9c08872bca312880359da69e33fd1f7e8b250b605ed6e2a8e5f536c7a071bf9f14e
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEz1:5dbwovEVyqgoZmZXWfIdQdRaefPe
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 16 3804 rundll32.exe 19 3804 rundll32.exe 21 3804 rundll32.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: rundll32.exe -
pid Process 2612 arp.exe 3712 arp.exe 3076 arp.exe 3116 arp.exe 4564 arp.exe 2220 arp.exe 2396 arp.exe 1948 arp.exe 3940 arp.exe -
resource yara_rule behavioral2/memory/3804-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/3804-3-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/3804-4-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/3804-7-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/3804-13-0x0000000010000000-0x0000000010033000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3804 rundll32.exe 3804 rundll32.exe 3804 rundll32.exe 3804 rundll32.exe 3804 rundll32.exe 3804 rundll32.exe 3804 rundll32.exe 3804 rundll32.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 656 Process not Found 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3804 rundll32.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1760 wrote to memory of 3804 1760 rundll32.exe 85 PID 1760 wrote to memory of 3804 1760 rundll32.exe 85 PID 1760 wrote to memory of 3804 1760 rundll32.exe 85 PID 3804 wrote to memory of 2612 3804 rundll32.exe 86 PID 3804 wrote to memory of 2612 3804 rundll32.exe 86 PID 3804 wrote to memory of 2612 3804 rundll32.exe 86 PID 3804 wrote to memory of 3116 3804 rundll32.exe 88 PID 3804 wrote to memory of 3116 3804 rundll32.exe 88 PID 3804 wrote to memory of 3116 3804 rundll32.exe 88 PID 3804 wrote to memory of 4564 3804 rundll32.exe 89 PID 3804 wrote to memory of 4564 3804 rundll32.exe 89 PID 3804 wrote to memory of 4564 3804 rundll32.exe 89 PID 3804 wrote to memory of 3076 3804 rundll32.exe 90 PID 3804 wrote to memory of 3076 3804 rundll32.exe 90 PID 3804 wrote to memory of 3076 3804 rundll32.exe 90 PID 3804 wrote to memory of 3940 3804 rundll32.exe 91 PID 3804 wrote to memory of 3940 3804 rundll32.exe 91 PID 3804 wrote to memory of 3940 3804 rundll32.exe 91 PID 3804 wrote to memory of 1948 3804 rundll32.exe 92 PID 3804 wrote to memory of 1948 3804 rundll32.exe 92 PID 3804 wrote to memory of 1948 3804 rundll32.exe 92 PID 3804 wrote to memory of 2396 3804 rundll32.exe 93 PID 3804 wrote to memory of 2396 3804 rundll32.exe 93 PID 3804 wrote to memory of 2396 3804 rundll32.exe 93 PID 3804 wrote to memory of 2220 3804 rundll32.exe 94 PID 3804 wrote to memory of 2220 3804 rundll32.exe 94 PID 3804 wrote to memory of 2220 3804 rundll32.exe 94 PID 3804 wrote to memory of 3712 3804 rundll32.exe 95 PID 3804 wrote to memory of 3712 3804 rundll32.exe 95 PID 3804 wrote to memory of 3712 3804 rundll32.exe 95 PID 3804 wrote to memory of 232 3804 rundll32.exe 105 PID 3804 wrote to memory of 232 3804 rundll32.exe 105 PID 3804 wrote to memory of 232 3804 rundll32.exe 105
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5f1bdc14ca8d568993c8786c8b259fa57921beee87189ccc016adcf158066305.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5f1bdc14ca8d568993c8786c8b259fa57921beee87189ccc016adcf158066305.dll,#12⤵
- Blocklisted process makes network request
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2612
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 78-f5-6e-c3-aa-3a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3116
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 db-b8-25-f7-61-9a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4564
-
-
C:\Windows\SysWOW64\arp.exearp -s 37.27.61.185 d8-fe-1e-0d-25-4a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3076
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 fc-c6-bb-6e-a4-ca3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3940
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 9b-c0-d5-21-e0-c53⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1948
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 bc-77-7f-b5-59-273⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2396
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 9a-ad-14-64-88-d43⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2220
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 12-06-2a-f2-6b-9b3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3712
-
-
C:\Windows\SysWOW64\arp.exearp -d3⤵
- System Location Discovery: System Language Discovery
PID:232
-
-