Analysis
-
max time kernel
96s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 05:59
Behavioral task
behavioral1
Sample
bd8c6b416be85eb15fe41400211ab6884f2a9481e270f3610c2b4d058eadfe68.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bd8c6b416be85eb15fe41400211ab6884f2a9481e270f3610c2b4d058eadfe68.dll
Resource
win10v2004-20241007-en
General
-
Target
bd8c6b416be85eb15fe41400211ab6884f2a9481e270f3610c2b4d058eadfe68.dll
-
Size
80KB
-
MD5
fbf77a7949c96770cf99b80e186c20ed
-
SHA1
272a23a6f9c0f2475a03a3f49fb4f38667d7f9ef
-
SHA256
bd8c6b416be85eb15fe41400211ab6884f2a9481e270f3610c2b4d058eadfe68
-
SHA512
5424ac6cc5ed545231da5f72f476595d287de6f3b17429e1ed31fd3a6c651088ec6ba1504dab0a921d2a37c6b251501a016af87ed806e6b2c3639d4fc4c2cd11
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEhR0KXW+OY/j:5dbwovEVyqgoZmZXWfIdQdRaefPCRhVv
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
pid Process 1628 arp.exe 3464 arp.exe 2888 arp.exe 4132 arp.exe 2316 arp.exe 1980 arp.exe 396 arp.exe 2192 arp.exe 4528 arp.exe -
resource yara_rule behavioral2/memory/3640-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/3640-1-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 220 3640 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3640 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3500 wrote to memory of 3640 3500 rundll32.exe 84 PID 3500 wrote to memory of 3640 3500 rundll32.exe 84 PID 3500 wrote to memory of 3640 3500 rundll32.exe 84 PID 3640 wrote to memory of 4132 3640 rundll32.exe 86 PID 3640 wrote to memory of 4132 3640 rundll32.exe 86 PID 3640 wrote to memory of 4132 3640 rundll32.exe 86 PID 3640 wrote to memory of 396 3640 rundll32.exe 89 PID 3640 wrote to memory of 396 3640 rundll32.exe 89 PID 3640 wrote to memory of 396 3640 rundll32.exe 89 PID 3640 wrote to memory of 2888 3640 rundll32.exe 90 PID 3640 wrote to memory of 2888 3640 rundll32.exe 90 PID 3640 wrote to memory of 2888 3640 rundll32.exe 90 PID 3640 wrote to memory of 3464 3640 rundll32.exe 91 PID 3640 wrote to memory of 3464 3640 rundll32.exe 91 PID 3640 wrote to memory of 3464 3640 rundll32.exe 91 PID 3640 wrote to memory of 1980 3640 rundll32.exe 92 PID 3640 wrote to memory of 1980 3640 rundll32.exe 92 PID 3640 wrote to memory of 1980 3640 rundll32.exe 92 PID 3640 wrote to memory of 4528 3640 rundll32.exe 93 PID 3640 wrote to memory of 4528 3640 rundll32.exe 93 PID 3640 wrote to memory of 4528 3640 rundll32.exe 93 PID 3640 wrote to memory of 1628 3640 rundll32.exe 94 PID 3640 wrote to memory of 1628 3640 rundll32.exe 94 PID 3640 wrote to memory of 1628 3640 rundll32.exe 94 PID 3640 wrote to memory of 2316 3640 rundll32.exe 95 PID 3640 wrote to memory of 2316 3640 rundll32.exe 95 PID 3640 wrote to memory of 2316 3640 rundll32.exe 95 PID 3640 wrote to memory of 2192 3640 rundll32.exe 96 PID 3640 wrote to memory of 2192 3640 rundll32.exe 96 PID 3640 wrote to memory of 2192 3640 rundll32.exe 96
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bd8c6b416be85eb15fe41400211ab6884f2a9481e270f3610c2b4d058eadfe68.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bd8c6b416be85eb15fe41400211ab6884f2a9481e270f3610c2b4d058eadfe68.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4132
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 03-8f-fa-5e-5f-713⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:396
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 c6-ee-30-57-22-c23⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2888
-
-
C:\Windows\SysWOW64\arp.exearp -s 37.27.61.180 e6-bb-67-d0-72-353⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3464
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 a4-cd-42-f1-b1-a03⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1980
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 53-a4-f1-37-17-ed3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4528
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 0e-5a-0a-00-a7-9e3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1628
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 3c-4a-d3-4d-76-333⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2316
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 a1-88-f0-05-66-173⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 7163⤵
- Program crash
PID:220
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3640 -ip 36401⤵PID:3232