Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 04:23
Behavioral task
behavioral1
Sample
265145ec07704045927b0892c3f684cfb2b178664e1658e44b713adcecbcc203N.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
265145ec07704045927b0892c3f684cfb2b178664e1658e44b713adcecbcc203N.dll
Resource
win10v2004-20241007-en
General
-
Target
265145ec07704045927b0892c3f684cfb2b178664e1658e44b713adcecbcc203N.dll
-
Size
80KB
-
MD5
4c93692e831a813fb0a330f5b74b7d30
-
SHA1
3b65cd0c1d79c39fdf29fefe7c75bb15e3184f01
-
SHA256
265145ec07704045927b0892c3f684cfb2b178664e1658e44b713adcecbcc203
-
SHA512
ea60a00d665cbefdb00d0ca4fc992868a107ef0349e2ec156d75ceca66b5973fbef8f50bf2687b1fe1f8662ee63bdaa000fccd06fa9aedcb81631b5511a281b6
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEs03u9Xv:5dbwovEVyqgoZmZXWfIdQdRaefPu3yXv
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
pid Process 5084 arp.exe 3864 arp.exe 3140 arp.exe 540 arp.exe 1916 arp.exe 2828 arp.exe 2704 arp.exe 2728 arp.exe 2708 arp.exe -
resource yara_rule behavioral2/memory/2160-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/2160-1-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 208 2160 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2160 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2160 2052 rundll32.exe 85 PID 2052 wrote to memory of 2160 2052 rundll32.exe 85 PID 2052 wrote to memory of 2160 2052 rundll32.exe 85 PID 2160 wrote to memory of 5084 2160 rundll32.exe 86 PID 2160 wrote to memory of 5084 2160 rundll32.exe 86 PID 2160 wrote to memory of 5084 2160 rundll32.exe 86 PID 2160 wrote to memory of 540 2160 rundll32.exe 90 PID 2160 wrote to memory of 540 2160 rundll32.exe 90 PID 2160 wrote to memory of 540 2160 rundll32.exe 90 PID 2160 wrote to memory of 2708 2160 rundll32.exe 91 PID 2160 wrote to memory of 2708 2160 rundll32.exe 91 PID 2160 wrote to memory of 2708 2160 rundll32.exe 91 PID 2160 wrote to memory of 2728 2160 rundll32.exe 92 PID 2160 wrote to memory of 2728 2160 rundll32.exe 92 PID 2160 wrote to memory of 2728 2160 rundll32.exe 92 PID 2160 wrote to memory of 3140 2160 rundll32.exe 93 PID 2160 wrote to memory of 3140 2160 rundll32.exe 93 PID 2160 wrote to memory of 3140 2160 rundll32.exe 93 PID 2160 wrote to memory of 2704 2160 rundll32.exe 94 PID 2160 wrote to memory of 2704 2160 rundll32.exe 94 PID 2160 wrote to memory of 2704 2160 rundll32.exe 94 PID 2160 wrote to memory of 2828 2160 rundll32.exe 95 PID 2160 wrote to memory of 2828 2160 rundll32.exe 95 PID 2160 wrote to memory of 2828 2160 rundll32.exe 95 PID 2160 wrote to memory of 1916 2160 rundll32.exe 96 PID 2160 wrote to memory of 1916 2160 rundll32.exe 96 PID 2160 wrote to memory of 1916 2160 rundll32.exe 96 PID 2160 wrote to memory of 3864 2160 rundll32.exe 97 PID 2160 wrote to memory of 3864 2160 rundll32.exe 97 PID 2160 wrote to memory of 3864 2160 rundll32.exe 97
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\265145ec07704045927b0892c3f684cfb2b178664e1658e44b713adcecbcc203N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\265145ec07704045927b0892c3f684cfb2b178664e1658e44b713adcecbcc203N.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:5084
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 dd-23-0e-cf-84-4d3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:540
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 12-e1-13-dd-5a-723⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2708
-
-
C:\Windows\SysWOW64\arp.exearp -s 37.27.61.181 b7-32-8f-c5-ca-df3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2728
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 b9-5d-a7-d7-d4-8b3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3140
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 12-ac-49-51-c3-5b3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2704
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 b9-99-3f-2b-68-e03⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2828
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 68-b8-be-16-9d-023⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1916
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 f3-6f-4e-03-41-303⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2160 -s 7123⤵
- Program crash
PID:208
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2160 -ip 21601⤵PID:4656