Analysis
-
max time kernel
96s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 10:19
Behavioral task
behavioral1
Sample
a032ef3dfbd2fba9aa86854095801c84d641e6019efa8bf80244a32c5308e40d.dll
Resource
win7-20240903-en
windows7-x64
6 signatures
150 seconds
General
-
Target
a032ef3dfbd2fba9aa86854095801c84d641e6019efa8bf80244a32c5308e40d.dll
-
Size
80KB
-
MD5
8b0386d1da743cd68938e9bc3ea41877
-
SHA1
370571c3b2e9e26a96f309056d3c14744f65615a
-
SHA256
a032ef3dfbd2fba9aa86854095801c84d641e6019efa8bf80244a32c5308e40d
-
SHA512
b9afa0bad92a2cc89aad615cec88b9a18dd60925a7755e6d94c0120d8f3a8b302db322ff03ba74442725bb760c3700d8d14f2b6499eb79ce1955af8870265969
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEeWpQi:5dbwovEVyqgoZmZXWfIdQdRaefPrEv
Malware Config
Signatures
-
pid Process 4152 arp.exe 100 arp.exe 3724 arp.exe 760 arp.exe 2248 arp.exe 3804 arp.exe 1172 arp.exe 3980 arp.exe 3436 arp.exe -
resource yara_rule behavioral2/memory/4332-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/4332-2-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4868 4332 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4332 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3196 wrote to memory of 4332 3196 rundll32.exe 83 PID 3196 wrote to memory of 4332 3196 rundll32.exe 83 PID 3196 wrote to memory of 4332 3196 rundll32.exe 83 PID 4332 wrote to memory of 3436 4332 rundll32.exe 85 PID 4332 wrote to memory of 3436 4332 rundll32.exe 85 PID 4332 wrote to memory of 3436 4332 rundll32.exe 85 PID 4332 wrote to memory of 760 4332 rundll32.exe 88 PID 4332 wrote to memory of 760 4332 rundll32.exe 88 PID 4332 wrote to memory of 760 4332 rundll32.exe 88 PID 4332 wrote to memory of 100 4332 rundll32.exe 89 PID 4332 wrote to memory of 100 4332 rundll32.exe 89 PID 4332 wrote to memory of 100 4332 rundll32.exe 89 PID 4332 wrote to memory of 3724 4332 rundll32.exe 90 PID 4332 wrote to memory of 3724 4332 rundll32.exe 90 PID 4332 wrote to memory of 3724 4332 rundll32.exe 90 PID 4332 wrote to memory of 2248 4332 rundll32.exe 91 PID 4332 wrote to memory of 2248 4332 rundll32.exe 91 PID 4332 wrote to memory of 2248 4332 rundll32.exe 91 PID 4332 wrote to memory of 3804 4332 rundll32.exe 92 PID 4332 wrote to memory of 3804 4332 rundll32.exe 92 PID 4332 wrote to memory of 3804 4332 rundll32.exe 92 PID 4332 wrote to memory of 1172 4332 rundll32.exe 93 PID 4332 wrote to memory of 1172 4332 rundll32.exe 93 PID 4332 wrote to memory of 1172 4332 rundll32.exe 93 PID 4332 wrote to memory of 4152 4332 rundll32.exe 94 PID 4332 wrote to memory of 4152 4332 rundll32.exe 94 PID 4332 wrote to memory of 4152 4332 rundll32.exe 94 PID 4332 wrote to memory of 3980 4332 rundll32.exe 95 PID 4332 wrote to memory of 3980 4332 rundll32.exe 95 PID 4332 wrote to memory of 3980 4332 rundll32.exe 95
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a032ef3dfbd2fba9aa86854095801c84d641e6019efa8bf80244a32c5308e40d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a032ef3dfbd2fba9aa86854095801c84d641e6019efa8bf80244a32c5308e40d.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3436
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 f1-48-e4-f4-ef-ba3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:760
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 37-63-71-ba-e6-263⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:100
-
-
C:\Windows\SysWOW64\arp.exearp -s 136.243.76.173 eb-0a-79-91-a8-ed3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3724
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 c8-29-2c-5a-44-413⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2248
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 6f-13-b3-d4-c3-5b3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3804
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 01-c9-97-a4-55-983⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1172
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 b7-a0-b7-2c-d6-213⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4152
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 1b-56-bd-90-01-ae3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4332 -s 6923⤵
- Program crash
PID:4868
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4332 -ip 43321⤵PID:1148