Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 00:13
Behavioral task
behavioral1
Sample
7a77dec7a2a6cd2769e82ea0fd053881853c0f7612e605c41758952629740c19.dll
Resource
win7-20240903-en
General
-
Target
7a77dec7a2a6cd2769e82ea0fd053881853c0f7612e605c41758952629740c19.dll
-
Size
80KB
-
MD5
b07174fc391992f4bd743300a0fe745b
-
SHA1
8abfbd6137e367e13bc1a48210188dfbb7d46604
-
SHA256
7a77dec7a2a6cd2769e82ea0fd053881853c0f7612e605c41758952629740c19
-
SHA512
028cfc33a66ea62cf9c3b7731146e97f7042f20224bed9a922ef97b5546d4a2f6f06a62f184da51c042d462fcaa5085de0defc3dea47e3efda6dd60e83d60ea7
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEMLS:5dbwovEVyqgoZmZXWfIdQdRaefPhLS
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 4 2764 rundll32.exe 8 2764 rundll32.exe 9 2764 rundll32.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: rundll32.exe -
pid Process 2772 arp.exe 2092 arp.exe 2108 arp.exe 2700 arp.exe 2840 arp.exe 2632 arp.exe 2580 arp.exe 2592 arp.exe 2812 arp.exe -
resource yara_rule behavioral1/memory/2764-3-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2764-2-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2764-1-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2700-4-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2700-6-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2840-8-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2632-9-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2592-14-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2812-13-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2108-12-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2580-11-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2772-7-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2092-10-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2592-30-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2580-28-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2812-26-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2632-25-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2108-22-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2840-20-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2772-18-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2092-17-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2764-32-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2776-34-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2776-36-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2764-41-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2764-44-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2764-45-0x0000000010000000-0x0000000010033000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 476 Process not Found 476 Process not Found -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2764 rundll32.exe Token: SeDebugPrivilege 2840 arp.exe Token: SeDebugPrivilege 2632 arp.exe Token: SeDebugPrivilege 2092 arp.exe Token: SeDebugPrivilege 2108 arp.exe Token: SeDebugPrivilege 2592 arp.exe Token: SeDebugPrivilege 2772 arp.exe Token: SeDebugPrivilege 2812 arp.exe Token: SeDebugPrivilege 2580 arp.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2764 2692 rundll32.exe 31 PID 2692 wrote to memory of 2764 2692 rundll32.exe 31 PID 2692 wrote to memory of 2764 2692 rundll32.exe 31 PID 2692 wrote to memory of 2764 2692 rundll32.exe 31 PID 2692 wrote to memory of 2764 2692 rundll32.exe 31 PID 2692 wrote to memory of 2764 2692 rundll32.exe 31 PID 2692 wrote to memory of 2764 2692 rundll32.exe 31 PID 2764 wrote to memory of 2700 2764 rundll32.exe 32 PID 2764 wrote to memory of 2700 2764 rundll32.exe 32 PID 2764 wrote to memory of 2700 2764 rundll32.exe 32 PID 2764 wrote to memory of 2700 2764 rundll32.exe 32 PID 2764 wrote to memory of 2772 2764 rundll32.exe 34 PID 2764 wrote to memory of 2772 2764 rundll32.exe 34 PID 2764 wrote to memory of 2772 2764 rundll32.exe 34 PID 2764 wrote to memory of 2772 2764 rundll32.exe 34 PID 2764 wrote to memory of 2840 2764 rundll32.exe 35 PID 2764 wrote to memory of 2840 2764 rundll32.exe 35 PID 2764 wrote to memory of 2840 2764 rundll32.exe 35 PID 2764 wrote to memory of 2840 2764 rundll32.exe 35 PID 2764 wrote to memory of 2580 2764 rundll32.exe 36 PID 2764 wrote to memory of 2580 2764 rundll32.exe 36 PID 2764 wrote to memory of 2580 2764 rundll32.exe 36 PID 2764 wrote to memory of 2580 2764 rundll32.exe 36 PID 2764 wrote to memory of 2632 2764 rundll32.exe 37 PID 2764 wrote to memory of 2632 2764 rundll32.exe 37 PID 2764 wrote to memory of 2632 2764 rundll32.exe 37 PID 2764 wrote to memory of 2632 2764 rundll32.exe 37 PID 2764 wrote to memory of 2092 2764 rundll32.exe 39 PID 2764 wrote to memory of 2092 2764 rundll32.exe 39 PID 2764 wrote to memory of 2092 2764 rundll32.exe 39 PID 2764 wrote to memory of 2092 2764 rundll32.exe 39 PID 2764 wrote to memory of 2108 2764 rundll32.exe 41 PID 2764 wrote to memory of 2108 2764 rundll32.exe 41 PID 2764 wrote to memory of 2108 2764 rundll32.exe 41 PID 2764 wrote to memory of 2108 2764 rundll32.exe 41 PID 2764 wrote to memory of 2592 2764 rundll32.exe 43 PID 2764 wrote to memory of 2592 2764 rundll32.exe 43 PID 2764 wrote to memory of 2592 2764 rundll32.exe 43 PID 2764 wrote to memory of 2592 2764 rundll32.exe 43 PID 2764 wrote to memory of 2812 2764 rundll32.exe 44 PID 2764 wrote to memory of 2812 2764 rundll32.exe 44 PID 2764 wrote to memory of 2812 2764 rundll32.exe 44 PID 2764 wrote to memory of 2812 2764 rundll32.exe 44 PID 2764 wrote to memory of 2776 2764 rundll32.exe 50 PID 2764 wrote to memory of 2776 2764 rundll32.exe 50 PID 2764 wrote to memory of 2776 2764 rundll32.exe 50 PID 2764 wrote to memory of 2776 2764 rundll32.exe 50
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7a77dec7a2a6cd2769e82ea0fd053881853c0f7612e605c41758952629740c19.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7a77dec7a2a6cd2769e82ea0fd053881853c0f7612e605c41758952629740c19.dll,#12⤵
- Blocklisted process makes network request
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2700
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 44-b2-5f-fe-8a-b93⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 20-be-ad-0c-57-1c3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
C:\Windows\SysWOW64\arp.exearp -s 37.27.61.180 84-fa-5a-47-a7-eb3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 24-d1-27-5c-7f-d53⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 b1-8b-7b-c5-65-e63⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 06-10-f9-17-1d-6d3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 bc-3a-e1-10-cb-213⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 c2-77-0a-6b-87-c13⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
C:\Windows\SysWOW64\arp.exearp -d3⤵
- System Location Discovery: System Language Discovery
PID:2776
-
-