Analysis
-
max time kernel
94s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 00:13
Behavioral task
behavioral1
Sample
7a77dec7a2a6cd2769e82ea0fd053881853c0f7612e605c41758952629740c19.dll
Resource
win7-20240903-en
windows7-x64
10 signatures
150 seconds
General
-
Target
7a77dec7a2a6cd2769e82ea0fd053881853c0f7612e605c41758952629740c19.dll
-
Size
80KB
-
MD5
b07174fc391992f4bd743300a0fe745b
-
SHA1
8abfbd6137e367e13bc1a48210188dfbb7d46604
-
SHA256
7a77dec7a2a6cd2769e82ea0fd053881853c0f7612e605c41758952629740c19
-
SHA512
028cfc33a66ea62cf9c3b7731146e97f7042f20224bed9a922ef97b5546d4a2f6f06a62f184da51c042d462fcaa5085de0defc3dea47e3efda6dd60e83d60ea7
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEMLS:5dbwovEVyqgoZmZXWfIdQdRaefPhLS
Malware Config
Signatures
-
pid Process 1432 arp.exe 1528 arp.exe 3580 arp.exe 532 arp.exe 1100 arp.exe 3516 arp.exe 4260 arp.exe 2772 arp.exe 2840 arp.exe -
resource yara_rule behavioral2/memory/1860-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/1860-2-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4572 1860 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1860 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 5008 wrote to memory of 1860 5008 rundll32.exe 82 PID 5008 wrote to memory of 1860 5008 rundll32.exe 82 PID 5008 wrote to memory of 1860 5008 rundll32.exe 82 PID 1860 wrote to memory of 4260 1860 rundll32.exe 83 PID 1860 wrote to memory of 4260 1860 rundll32.exe 83 PID 1860 wrote to memory of 4260 1860 rundll32.exe 83 PID 1860 wrote to memory of 3516 1860 rundll32.exe 87 PID 1860 wrote to memory of 3516 1860 rundll32.exe 87 PID 1860 wrote to memory of 3516 1860 rundll32.exe 87 PID 1860 wrote to memory of 3580 1860 rundll32.exe 88 PID 1860 wrote to memory of 3580 1860 rundll32.exe 88 PID 1860 wrote to memory of 3580 1860 rundll32.exe 88 PID 1860 wrote to memory of 1100 1860 rundll32.exe 89 PID 1860 wrote to memory of 1100 1860 rundll32.exe 89 PID 1860 wrote to memory of 1100 1860 rundll32.exe 89 PID 1860 wrote to memory of 2772 1860 rundll32.exe 90 PID 1860 wrote to memory of 2772 1860 rundll32.exe 90 PID 1860 wrote to memory of 2772 1860 rundll32.exe 90 PID 1860 wrote to memory of 532 1860 rundll32.exe 91 PID 1860 wrote to memory of 532 1860 rundll32.exe 91 PID 1860 wrote to memory of 532 1860 rundll32.exe 91 PID 1860 wrote to memory of 1528 1860 rundll32.exe 92 PID 1860 wrote to memory of 1528 1860 rundll32.exe 92 PID 1860 wrote to memory of 1528 1860 rundll32.exe 92 PID 1860 wrote to memory of 2840 1860 rundll32.exe 93 PID 1860 wrote to memory of 2840 1860 rundll32.exe 93 PID 1860 wrote to memory of 2840 1860 rundll32.exe 93 PID 1860 wrote to memory of 1432 1860 rundll32.exe 94 PID 1860 wrote to memory of 1432 1860 rundll32.exe 94 PID 1860 wrote to memory of 1432 1860 rundll32.exe 94
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7a77dec7a2a6cd2769e82ea0fd053881853c0f7612e605c41758952629740c19.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7a77dec7a2a6cd2769e82ea0fd053881853c0f7612e605c41758952629740c19.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4260
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 95-5f-f4-fc-1a-b23⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3516
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 15-16-85-04-57-3e3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3580
-
-
C:\Windows\SysWOW64\arp.exearp -s 37.27.61.183 d2-ec-de-bc-08-303⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1100
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 3a-9f-74-4e-ae-9f3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2772
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 23-cd-8d-7c-de-4b3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:532
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 16-b7-7d-05-f3-8e3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1528
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 f4-84-67-97-91-033⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2840
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 46-a7-ed-0b-bf-fe3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 7163⤵
- Program crash
PID:4572
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1860 -ip 18601⤵PID:8