Analysis
-
max time kernel
93s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 09:27
Behavioral task
behavioral1
Sample
3231dec858ba584cfb09317d5fc7966ce322949f6f45d7df242253d7f2983f74.dll
Resource
win7-20241023-en
windows7-x64
6 signatures
150 seconds
General
-
Target
3231dec858ba584cfb09317d5fc7966ce322949f6f45d7df242253d7f2983f74.dll
-
Size
80KB
-
MD5
3d1382f2f19167caecd7b7ab693a4436
-
SHA1
695cbc23e54f66c55bd461cb8dd39c036f5e0f47
-
SHA256
3231dec858ba584cfb09317d5fc7966ce322949f6f45d7df242253d7f2983f74
-
SHA512
f868da844f3c54b2895a0fb3edbf25da7286477c65a6fc10486f391b269f8b64c858dba3bda69b844259264f1b6d7eea15f33c82477f11b055a2923d7c07fdbb
-
SSDEEP
1536:uIcs6msUvrh8ErMInQ+4cw9NVWfjaRkE4LEl8B60Y2lfxxHZPEvB+2C:dcs6v68Erj3w9zWf+SEFuk0/pfPt2C
Malware Config
Signatures
-
pid Process 824 arp.exe 4780 arp.exe 4588 arp.exe 1748 arp.exe 1524 arp.exe 3904 arp.exe 4784 arp.exe 4144 arp.exe 1168 arp.exe -
resource yara_rule behavioral2/memory/1056-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/1056-2-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1496 1056 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1056 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3020 wrote to memory of 1056 3020 rundll32.exe 83 PID 3020 wrote to memory of 1056 3020 rundll32.exe 83 PID 3020 wrote to memory of 1056 3020 rundll32.exe 83 PID 1056 wrote to memory of 1168 1056 rundll32.exe 85 PID 1056 wrote to memory of 1168 1056 rundll32.exe 85 PID 1056 wrote to memory of 1168 1056 rundll32.exe 85 PID 1056 wrote to memory of 4588 1056 rundll32.exe 88 PID 1056 wrote to memory of 4588 1056 rundll32.exe 88 PID 1056 wrote to memory of 4588 1056 rundll32.exe 88 PID 1056 wrote to memory of 4780 1056 rundll32.exe 89 PID 1056 wrote to memory of 4780 1056 rundll32.exe 89 PID 1056 wrote to memory of 4780 1056 rundll32.exe 89 PID 1056 wrote to memory of 4784 1056 rundll32.exe 90 PID 1056 wrote to memory of 4784 1056 rundll32.exe 90 PID 1056 wrote to memory of 4784 1056 rundll32.exe 90 PID 1056 wrote to memory of 3904 1056 rundll32.exe 91 PID 1056 wrote to memory of 3904 1056 rundll32.exe 91 PID 1056 wrote to memory of 3904 1056 rundll32.exe 91 PID 1056 wrote to memory of 824 1056 rundll32.exe 92 PID 1056 wrote to memory of 824 1056 rundll32.exe 92 PID 1056 wrote to memory of 824 1056 rundll32.exe 92 PID 1056 wrote to memory of 1524 1056 rundll32.exe 93 PID 1056 wrote to memory of 1524 1056 rundll32.exe 93 PID 1056 wrote to memory of 1524 1056 rundll32.exe 93 PID 1056 wrote to memory of 1748 1056 rundll32.exe 94 PID 1056 wrote to memory of 1748 1056 rundll32.exe 94 PID 1056 wrote to memory of 1748 1056 rundll32.exe 94 PID 1056 wrote to memory of 4144 1056 rundll32.exe 95 PID 1056 wrote to memory of 4144 1056 rundll32.exe 95 PID 1056 wrote to memory of 4144 1056 rundll32.exe 95
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3231dec858ba584cfb09317d5fc7966ce322949f6f45d7df242253d7f2983f74.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3231dec858ba584cfb09317d5fc7966ce322949f6f45d7df242253d7f2983f74.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1168
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 a1-95-6f-53-c8-8d3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4588
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 b5-3a-34-56-e5-2e3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4780
-
-
C:\Windows\SysWOW64\arp.exearp -s 49.12.169.208 b9-ad-ab-21-4d-4f3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4784
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 f2-f4-aa-7a-9d-8d3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3904
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 f9-d5-65-b6-5d-113⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:824
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 83-63-bb-22-07-653⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1524
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 82-27-a6-b3-50-843⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1748
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 83-23-17-8f-1f-093⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 6763⤵
- Program crash
PID:1496
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1056 -ip 10561⤵PID:1928