Analysis
-
max time kernel
30s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 09:30
Behavioral task
behavioral1
Sample
e571d4e6e15396b945d4917d68ee5b972ad0141acdf0df90fee998548420f18c.dll
Resource
win7-20240903-en
windows7-x64
6 signatures
120 seconds
General
-
Target
e571d4e6e15396b945d4917d68ee5b972ad0141acdf0df90fee998548420f18c.dll
-
Size
80KB
-
MD5
a837b957630734f1ecbebe659ec53b97
-
SHA1
17c882616bee7ec38eaf76919b3d890c62ba3f7c
-
SHA256
e571d4e6e15396b945d4917d68ee5b972ad0141acdf0df90fee998548420f18c
-
SHA512
bf5feec3911c0145c8cc23487ceba4d5bfcf82b73fd28eb7a0ba1878c414c59a70e3d4213693fe2f901db5e74e23a6a1ccaec782b09912d4f83f80259d525fdb
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEBaK:5dbwovEVyqgoZmZXWfIdQdRaefPAaK
Malware Config
Signatures
-
pid Process 2704 arp.exe 2728 arp.exe 2784 arp.exe 2912 arp.exe 2580 arp.exe 2732 arp.exe 1652 arp.exe 2724 arp.exe 2672 arp.exe -
resource yara_rule behavioral1/memory/2744-2-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2744-3-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2744-1-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2744-5-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2712 2744 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2744 rundll32.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2744 2708 rundll32.exe 30 PID 2708 wrote to memory of 2744 2708 rundll32.exe 30 PID 2708 wrote to memory of 2744 2708 rundll32.exe 30 PID 2708 wrote to memory of 2744 2708 rundll32.exe 30 PID 2708 wrote to memory of 2744 2708 rundll32.exe 30 PID 2708 wrote to memory of 2744 2708 rundll32.exe 30 PID 2708 wrote to memory of 2744 2708 rundll32.exe 30 PID 2744 wrote to memory of 2712 2744 rundll32.exe 31 PID 2744 wrote to memory of 2712 2744 rundll32.exe 31 PID 2744 wrote to memory of 2712 2744 rundll32.exe 31 PID 2744 wrote to memory of 2712 2744 rundll32.exe 31 PID 2744 wrote to memory of 2704 2744 rundll32.exe 32 PID 2744 wrote to memory of 2704 2744 rundll32.exe 32 PID 2744 wrote to memory of 2704 2744 rundll32.exe 32 PID 2744 wrote to memory of 2704 2744 rundll32.exe 32 PID 2744 wrote to memory of 2912 2744 rundll32.exe 34 PID 2744 wrote to memory of 2912 2744 rundll32.exe 34 PID 2744 wrote to memory of 2912 2744 rundll32.exe 34 PID 2744 wrote to memory of 2912 2744 rundll32.exe 34 PID 2744 wrote to memory of 2580 2744 rundll32.exe 35 PID 2744 wrote to memory of 2580 2744 rundll32.exe 35 PID 2744 wrote to memory of 2580 2744 rundll32.exe 35 PID 2744 wrote to memory of 2580 2744 rundll32.exe 35 PID 2744 wrote to memory of 2732 2744 rundll32.exe 36 PID 2744 wrote to memory of 2732 2744 rundll32.exe 36 PID 2744 wrote to memory of 2732 2744 rundll32.exe 36 PID 2744 wrote to memory of 2732 2744 rundll32.exe 36 PID 2744 wrote to memory of 2728 2744 rundll32.exe 37 PID 2744 wrote to memory of 2728 2744 rundll32.exe 37 PID 2744 wrote to memory of 2728 2744 rundll32.exe 37 PID 2744 wrote to memory of 2728 2744 rundll32.exe 37 PID 2744 wrote to memory of 1652 2744 rundll32.exe 38 PID 2744 wrote to memory of 1652 2744 rundll32.exe 38 PID 2744 wrote to memory of 1652 2744 rundll32.exe 38 PID 2744 wrote to memory of 1652 2744 rundll32.exe 38 PID 2744 wrote to memory of 2724 2744 rundll32.exe 39 PID 2744 wrote to memory of 2724 2744 rundll32.exe 39 PID 2744 wrote to memory of 2724 2744 rundll32.exe 39 PID 2744 wrote to memory of 2724 2744 rundll32.exe 39 PID 2744 wrote to memory of 2672 2744 rundll32.exe 40 PID 2744 wrote to memory of 2672 2744 rundll32.exe 40 PID 2744 wrote to memory of 2672 2744 rundll32.exe 40 PID 2744 wrote to memory of 2672 2744 rundll32.exe 40 PID 2744 wrote to memory of 2784 2744 rundll32.exe 41 PID 2744 wrote to memory of 2784 2744 rundll32.exe 41 PID 2744 wrote to memory of 2784 2744 rundll32.exe 41 PID 2744 wrote to memory of 2784 2744 rundll32.exe 41
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e571d4e6e15396b945d4917d68ee5b972ad0141acdf0df90fee998548420f18c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e571d4e6e15396b945d4917d68ee5b972ad0141acdf0df90fee998548420f18c.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 3283⤵
- Program crash
PID:2712
-
-
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2704
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 2e-f0-e8-d2-00-ed3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2912
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 77-67-2a-5d-19-e63⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2580
-
-
C:\Windows\SysWOW64\arp.exearp -s 136.243.76.173 01-ba-5f-10-fb-e23⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2732
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 f7-e6-87-d1-48-963⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2728
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 12-7c-f2-ae-97-293⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1652
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 2c-f3-00-23-36-203⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2724
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 d3-f5-da-aa-24-363⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2672
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 81-24-07-66-56-183⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2784
-
-