Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 00:01
Behavioral task
behavioral1
Sample
4268a0cfa5cc6527ae14266dfb4caa774b7de727be770371290025588e880f40N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4268a0cfa5cc6527ae14266dfb4caa774b7de727be770371290025588e880f40N.dll
Resource
win10v2004-20241007-en
General
-
Target
4268a0cfa5cc6527ae14266dfb4caa774b7de727be770371290025588e880f40N.dll
-
Size
80KB
-
MD5
564eab79d7dfe92e81658a0c724e89a0
-
SHA1
3cc7b91a4d8f9fd95890a786a00f516fc466c976
-
SHA256
4268a0cfa5cc6527ae14266dfb4caa774b7de727be770371290025588e880f40
-
SHA512
3aca9ee594dfc105355ccb778017358e33ad3d23b58fac7e4e1761b79b3157ff6d0985a21632e77f6f68bb8f859db9f352672fa2b2d3ffc14cab327139fc0cbf
-
SSDEEP
1536:uIcs6msUvrh8ErMInQ+4cw9NVWfjaRkE4LEl8B60Y2lfxxHZPE9:dcs6v68Erj3w9zWf+SEFuk0/pfPu
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
pid Process 3532 arp.exe 3496 arp.exe 116 arp.exe 232 arp.exe 112 arp.exe 3080 arp.exe 3852 arp.exe 3100 arp.exe 2348 arp.exe -
resource yara_rule behavioral2/memory/4908-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/4908-2-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3484 4908 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4908 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1948 wrote to memory of 4908 1948 rundll32.exe 83 PID 1948 wrote to memory of 4908 1948 rundll32.exe 83 PID 1948 wrote to memory of 4908 1948 rundll32.exe 83 PID 4908 wrote to memory of 3100 4908 rundll32.exe 85 PID 4908 wrote to memory of 3100 4908 rundll32.exe 85 PID 4908 wrote to memory of 3100 4908 rundll32.exe 85 PID 4908 wrote to memory of 3852 4908 rundll32.exe 88 PID 4908 wrote to memory of 3852 4908 rundll32.exe 88 PID 4908 wrote to memory of 3852 4908 rundll32.exe 88 PID 4908 wrote to memory of 3532 4908 rundll32.exe 89 PID 4908 wrote to memory of 3532 4908 rundll32.exe 89 PID 4908 wrote to memory of 3532 4908 rundll32.exe 89 PID 4908 wrote to memory of 3080 4908 rundll32.exe 90 PID 4908 wrote to memory of 3080 4908 rundll32.exe 90 PID 4908 wrote to memory of 3080 4908 rundll32.exe 90 PID 4908 wrote to memory of 112 4908 rundll32.exe 91 PID 4908 wrote to memory of 112 4908 rundll32.exe 91 PID 4908 wrote to memory of 112 4908 rundll32.exe 91 PID 4908 wrote to memory of 116 4908 rundll32.exe 92 PID 4908 wrote to memory of 116 4908 rundll32.exe 92 PID 4908 wrote to memory of 116 4908 rundll32.exe 92 PID 4908 wrote to memory of 232 4908 rundll32.exe 93 PID 4908 wrote to memory of 232 4908 rundll32.exe 93 PID 4908 wrote to memory of 232 4908 rundll32.exe 93 PID 4908 wrote to memory of 2348 4908 rundll32.exe 94 PID 4908 wrote to memory of 2348 4908 rundll32.exe 94 PID 4908 wrote to memory of 2348 4908 rundll32.exe 94 PID 4908 wrote to memory of 3496 4908 rundll32.exe 95 PID 4908 wrote to memory of 3496 4908 rundll32.exe 95 PID 4908 wrote to memory of 3496 4908 rundll32.exe 95
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4268a0cfa5cc6527ae14266dfb4caa774b7de727be770371290025588e880f40N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4268a0cfa5cc6527ae14266dfb4caa774b7de727be770371290025588e880f40N.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3100
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 a8-b2-b6-57-42-2b3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3852
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 d7-5e-d7-d5-bc-733⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3532
-
-
C:\Windows\SysWOW64\arp.exearp -s 136.243.76.21 6c-66-92-1b-12-2e3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3080
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 78-9a-96-9e-a9-463⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:112
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 f7-ea-b2-b7-f5-0d3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:116
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 df-8e-a8-8c-56-223⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:232
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 7f-bb-bc-5a-80-d03⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2348
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 59-da-7d-60-ff-5a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 7123⤵
- Program crash
PID:3484
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4908 -ip 49081⤵PID:4872