Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 22:53
Behavioral task
behavioral1
Sample
75c77a6605110682bca7169b9af69e01781bda774f3ad11e785d0b8bee9aea76.dll
Resource
win7-20240903-en
General
-
Target
75c77a6605110682bca7169b9af69e01781bda774f3ad11e785d0b8bee9aea76.dll
-
Size
80KB
-
MD5
231338e073ad7739914ed682a4cd5978
-
SHA1
022a52cbd32c7763ab0e7158a2401d9a10562d19
-
SHA256
75c77a6605110682bca7169b9af69e01781bda774f3ad11e785d0b8bee9aea76
-
SHA512
e1cb226a4a7253c2fef5ed3c9bd4d28951a4e79a492f2832dffeb80aceb2bcc89e34e0a911970c559a6aec7e3b972aa76ac6beab10eac81f7ee00b450907a8b3
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEPejP:5dbwovEVyqgoZmZXWfIdQdRaefPr
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 4 3020 rundll32.exe 8 3020 rundll32.exe 9 3020 rundll32.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: rundll32.exe -
pid Process 2708 arp.exe 2824 arp.exe 2904 arp.exe 2984 arp.exe 2664 arp.exe 2768 arp.exe 2796 arp.exe 3056 arp.exe 2704 arp.exe -
resource yara_rule behavioral1/memory/3020-2-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/3020-1-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/3020-5-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/3020-6-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/3020-7-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/3020-14-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/3020-15-0x0000000010000000-0x0000000010033000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3020 rundll32.exe 3020 rundll32.exe 3020 rundll32.exe 3020 rundll32.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 472 Process not Found 472 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3020 rundll32.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3016 wrote to memory of 3020 3016 rundll32.exe 30 PID 3016 wrote to memory of 3020 3016 rundll32.exe 30 PID 3016 wrote to memory of 3020 3016 rundll32.exe 30 PID 3016 wrote to memory of 3020 3016 rundll32.exe 30 PID 3016 wrote to memory of 3020 3016 rundll32.exe 30 PID 3016 wrote to memory of 3020 3016 rundll32.exe 30 PID 3016 wrote to memory of 3020 3016 rundll32.exe 30 PID 3020 wrote to memory of 2984 3020 rundll32.exe 31 PID 3020 wrote to memory of 2984 3020 rundll32.exe 31 PID 3020 wrote to memory of 2984 3020 rundll32.exe 31 PID 3020 wrote to memory of 2984 3020 rundll32.exe 31 PID 3020 wrote to memory of 3056 3020 rundll32.exe 33 PID 3020 wrote to memory of 3056 3020 rundll32.exe 33 PID 3020 wrote to memory of 3056 3020 rundll32.exe 33 PID 3020 wrote to memory of 3056 3020 rundll32.exe 33 PID 3020 wrote to memory of 2664 3020 rundll32.exe 34 PID 3020 wrote to memory of 2664 3020 rundll32.exe 34 PID 3020 wrote to memory of 2664 3020 rundll32.exe 34 PID 3020 wrote to memory of 2664 3020 rundll32.exe 34 PID 3020 wrote to memory of 2704 3020 rundll32.exe 35 PID 3020 wrote to memory of 2704 3020 rundll32.exe 35 PID 3020 wrote to memory of 2704 3020 rundll32.exe 35 PID 3020 wrote to memory of 2704 3020 rundll32.exe 35 PID 3020 wrote to memory of 2708 3020 rundll32.exe 36 PID 3020 wrote to memory of 2708 3020 rundll32.exe 36 PID 3020 wrote to memory of 2708 3020 rundll32.exe 36 PID 3020 wrote to memory of 2708 3020 rundll32.exe 36 PID 3020 wrote to memory of 2768 3020 rundll32.exe 38 PID 3020 wrote to memory of 2768 3020 rundll32.exe 38 PID 3020 wrote to memory of 2768 3020 rundll32.exe 38 PID 3020 wrote to memory of 2768 3020 rundll32.exe 38 PID 3020 wrote to memory of 2796 3020 rundll32.exe 39 PID 3020 wrote to memory of 2796 3020 rundll32.exe 39 PID 3020 wrote to memory of 2796 3020 rundll32.exe 39 PID 3020 wrote to memory of 2796 3020 rundll32.exe 39 PID 3020 wrote to memory of 2824 3020 rundll32.exe 40 PID 3020 wrote to memory of 2824 3020 rundll32.exe 40 PID 3020 wrote to memory of 2824 3020 rundll32.exe 40 PID 3020 wrote to memory of 2824 3020 rundll32.exe 40 PID 3020 wrote to memory of 2904 3020 rundll32.exe 41 PID 3020 wrote to memory of 2904 3020 rundll32.exe 41 PID 3020 wrote to memory of 2904 3020 rundll32.exe 41 PID 3020 wrote to memory of 2904 3020 rundll32.exe 41 PID 3020 wrote to memory of 2728 3020 rundll32.exe 49 PID 3020 wrote to memory of 2728 3020 rundll32.exe 49 PID 3020 wrote to memory of 2728 3020 rundll32.exe 49 PID 3020 wrote to memory of 2728 3020 rundll32.exe 49
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\75c77a6605110682bca7169b9af69e01781bda774f3ad11e785d0b8bee9aea76.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\75c77a6605110682bca7169b9af69e01781bda774f3ad11e785d0b8bee9aea76.dll,#12⤵
- Blocklisted process makes network request
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2984
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 2f-2e-42-3e-f9-3f3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3056
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 3b-c8-01-71-3e-ce3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2664
-
-
C:\Windows\SysWOW64\arp.exearp -s 49.12.169.207 73-07-6a-76-1e-fc3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2704
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 2b-12-e7-c8-55-593⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2708
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 86-be-58-83-49-823⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2768
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 cf-ec-20-d8-59-313⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2796
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 ba-f5-d2-b3-db-be3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2824
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 f5-4d-29-dd-87-d23⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2904
-
-
C:\Windows\SysWOW64\arp.exearp -d3⤵
- System Location Discovery: System Language Discovery
PID:2728
-
-