Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 09:30
Behavioral task
behavioral1
Sample
e571d4e6e15396b945d4917d68ee5b972ad0141acdf0df90fee998548420f18c.dll
Resource
win7-20240903-en
windows7-x64
6 signatures
120 seconds
General
-
Target
e571d4e6e15396b945d4917d68ee5b972ad0141acdf0df90fee998548420f18c.dll
-
Size
80KB
-
MD5
a837b957630734f1ecbebe659ec53b97
-
SHA1
17c882616bee7ec38eaf76919b3d890c62ba3f7c
-
SHA256
e571d4e6e15396b945d4917d68ee5b972ad0141acdf0df90fee998548420f18c
-
SHA512
bf5feec3911c0145c8cc23487ceba4d5bfcf82b73fd28eb7a0ba1878c414c59a70e3d4213693fe2f901db5e74e23a6a1ccaec782b09912d4f83f80259d525fdb
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEBaK:5dbwovEVyqgoZmZXWfIdQdRaefPAaK
Malware Config
Signatures
-
pid Process 1436 arp.exe 4044 arp.exe 3152 arp.exe 888 arp.exe 4568 arp.exe 2756 arp.exe 556 arp.exe 3572 arp.exe 1412 arp.exe -
resource yara_rule behavioral2/memory/4744-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/4744-1-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4472 4744 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4744 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4276 wrote to memory of 4744 4276 rundll32.exe 82 PID 4276 wrote to memory of 4744 4276 rundll32.exe 82 PID 4276 wrote to memory of 4744 4276 rundll32.exe 82 PID 4744 wrote to memory of 4568 4744 rundll32.exe 83 PID 4744 wrote to memory of 4568 4744 rundll32.exe 83 PID 4744 wrote to memory of 4568 4744 rundll32.exe 83 PID 4744 wrote to memory of 2756 4744 rundll32.exe 87 PID 4744 wrote to memory of 2756 4744 rundll32.exe 87 PID 4744 wrote to memory of 2756 4744 rundll32.exe 87 PID 4744 wrote to memory of 888 4744 rundll32.exe 88 PID 4744 wrote to memory of 888 4744 rundll32.exe 88 PID 4744 wrote to memory of 888 4744 rundll32.exe 88 PID 4744 wrote to memory of 1436 4744 rundll32.exe 89 PID 4744 wrote to memory of 1436 4744 rundll32.exe 89 PID 4744 wrote to memory of 1436 4744 rundll32.exe 89 PID 4744 wrote to memory of 3572 4744 rundll32.exe 90 PID 4744 wrote to memory of 3572 4744 rundll32.exe 90 PID 4744 wrote to memory of 3572 4744 rundll32.exe 90 PID 4744 wrote to memory of 556 4744 rundll32.exe 91 PID 4744 wrote to memory of 556 4744 rundll32.exe 91 PID 4744 wrote to memory of 556 4744 rundll32.exe 91 PID 4744 wrote to memory of 1412 4744 rundll32.exe 92 PID 4744 wrote to memory of 1412 4744 rundll32.exe 92 PID 4744 wrote to memory of 1412 4744 rundll32.exe 92 PID 4744 wrote to memory of 3152 4744 rundll32.exe 93 PID 4744 wrote to memory of 3152 4744 rundll32.exe 93 PID 4744 wrote to memory of 3152 4744 rundll32.exe 93 PID 4744 wrote to memory of 4044 4744 rundll32.exe 94 PID 4744 wrote to memory of 4044 4744 rundll32.exe 94 PID 4744 wrote to memory of 4044 4744 rundll32.exe 94
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e571d4e6e15396b945d4917d68ee5b972ad0141acdf0df90fee998548420f18c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e571d4e6e15396b945d4917d68ee5b972ad0141acdf0df90fee998548420f18c.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4568
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 56-47-33-d2-c8-e93⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2756
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 f2-93-96-59-98-773⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:888
-
-
C:\Windows\SysWOW64\arp.exearp -s 37.27.61.180 28-b3-21-ca-ac-843⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1436
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 02-4d-2e-4a-e0-7b3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3572
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 cb-1d-fa-0a-d4-5c3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:556
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 34-c6-42-9a-a1-b13⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1412
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 ef-19-9c-ed-07-a73⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3152
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 43-bc-79-36-f3-b73⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4744 -s 7123⤵
- Program crash
PID:4472
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4744 -ip 47441⤵PID:1980