Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 10:14
Behavioral task
behavioral1
Sample
a032ef3dfbd2fba9aa86854095801c84d641e6019efa8bf80244a32c5308e40d.dll
Resource
win7-20241023-en
General
-
Target
a032ef3dfbd2fba9aa86854095801c84d641e6019efa8bf80244a32c5308e40d.dll
-
Size
80KB
-
MD5
8b0386d1da743cd68938e9bc3ea41877
-
SHA1
370571c3b2e9e26a96f309056d3c14744f65615a
-
SHA256
a032ef3dfbd2fba9aa86854095801c84d641e6019efa8bf80244a32c5308e40d
-
SHA512
b9afa0bad92a2cc89aad615cec88b9a18dd60925a7755e6d94c0120d8f3a8b302db322ff03ba74442725bb760c3700d8d14f2b6499eb79ce1955af8870265969
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEeWpQi:5dbwovEVyqgoZmZXWfIdQdRaefPrEv
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 5 2088 rundll32.exe 8 2088 rundll32.exe 9 2088 rundll32.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: rundll32.exe -
pid Process 2592 arp.exe 2152 arp.exe 3004 arp.exe 2532 arp.exe 2568 arp.exe 2564 arp.exe 580 arp.exe 2232 arp.exe 2324 arp.exe -
resource yara_rule behavioral1/memory/2088-2-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2088-1-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2088-5-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2088-6-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2088-7-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2088-13-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2088-15-0x0000000010000000-0x0000000010033000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2088 rundll32.exe 2088 rundll32.exe 2088 rundll32.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 476 Process not Found 476 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2088 rundll32.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2088 2136 rundll32.exe 30 PID 2136 wrote to memory of 2088 2136 rundll32.exe 30 PID 2136 wrote to memory of 2088 2136 rundll32.exe 30 PID 2136 wrote to memory of 2088 2136 rundll32.exe 30 PID 2136 wrote to memory of 2088 2136 rundll32.exe 30 PID 2136 wrote to memory of 2088 2136 rundll32.exe 30 PID 2136 wrote to memory of 2088 2136 rundll32.exe 30 PID 2088 wrote to memory of 2232 2088 rundll32.exe 31 PID 2088 wrote to memory of 2232 2088 rundll32.exe 31 PID 2088 wrote to memory of 2232 2088 rundll32.exe 31 PID 2088 wrote to memory of 2232 2088 rundll32.exe 31 PID 2088 wrote to memory of 2152 2088 rundll32.exe 33 PID 2088 wrote to memory of 2152 2088 rundll32.exe 33 PID 2088 wrote to memory of 2152 2088 rundll32.exe 33 PID 2088 wrote to memory of 2152 2088 rundll32.exe 33 PID 2088 wrote to memory of 3004 2088 rundll32.exe 34 PID 2088 wrote to memory of 3004 2088 rundll32.exe 34 PID 2088 wrote to memory of 3004 2088 rundll32.exe 34 PID 2088 wrote to memory of 3004 2088 rundll32.exe 34 PID 2088 wrote to memory of 2324 2088 rundll32.exe 35 PID 2088 wrote to memory of 2324 2088 rundll32.exe 35 PID 2088 wrote to memory of 2324 2088 rundll32.exe 35 PID 2088 wrote to memory of 2324 2088 rundll32.exe 35 PID 2088 wrote to memory of 2532 2088 rundll32.exe 36 PID 2088 wrote to memory of 2532 2088 rundll32.exe 36 PID 2088 wrote to memory of 2532 2088 rundll32.exe 36 PID 2088 wrote to memory of 2532 2088 rundll32.exe 36 PID 2088 wrote to memory of 2568 2088 rundll32.exe 38 PID 2088 wrote to memory of 2568 2088 rundll32.exe 38 PID 2088 wrote to memory of 2568 2088 rundll32.exe 38 PID 2088 wrote to memory of 2568 2088 rundll32.exe 38 PID 2088 wrote to memory of 2564 2088 rundll32.exe 39 PID 2088 wrote to memory of 2564 2088 rundll32.exe 39 PID 2088 wrote to memory of 2564 2088 rundll32.exe 39 PID 2088 wrote to memory of 2564 2088 rundll32.exe 39 PID 2088 wrote to memory of 2592 2088 rundll32.exe 40 PID 2088 wrote to memory of 2592 2088 rundll32.exe 40 PID 2088 wrote to memory of 2592 2088 rundll32.exe 40 PID 2088 wrote to memory of 2592 2088 rundll32.exe 40 PID 2088 wrote to memory of 580 2088 rundll32.exe 42 PID 2088 wrote to memory of 580 2088 rundll32.exe 42 PID 2088 wrote to memory of 580 2088 rundll32.exe 42 PID 2088 wrote to memory of 580 2088 rundll32.exe 42 PID 2088 wrote to memory of 2876 2088 rundll32.exe 50 PID 2088 wrote to memory of 2876 2088 rundll32.exe 50 PID 2088 wrote to memory of 2876 2088 rundll32.exe 50 PID 2088 wrote to memory of 2876 2088 rundll32.exe 50
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a032ef3dfbd2fba9aa86854095801c84d641e6019efa8bf80244a32c5308e40d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a032ef3dfbd2fba9aa86854095801c84d641e6019efa8bf80244a32c5308e40d.dll,#12⤵
- Blocklisted process makes network request
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2232
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 db-53-15-c1-ec-e93⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2152
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 2e-1e-9d-76-60-ae3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3004
-
-
C:\Windows\SysWOW64\arp.exearp -s 37.27.61.182 d8-ed-a7-f2-98-f83⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2324
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 01-bb-f9-92-e7-113⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2532
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 25-95-44-1a-48-3e3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2568
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 fc-7b-ac-ff-bd-1a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2564
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 56-ea-1b-25-94-593⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2592
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 d4-72-92-98-fd-bb3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:580
-
-
C:\Windows\SysWOW64\arp.exearp -d3⤵
- System Location Discovery: System Language Discovery
PID:2876
-
-