Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-12-2024 01:11
Behavioral task
behavioral1
Sample
6218736f8d284d691e78376a2bad365c66983e5453f69af1487a75c802a6b240N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6218736f8d284d691e78376a2bad365c66983e5453f69af1487a75c802a6b240N.dll
Resource
win10v2004-20241007-en
General
-
Target
6218736f8d284d691e78376a2bad365c66983e5453f69af1487a75c802a6b240N.dll
-
Size
80KB
-
MD5
c385bf8dec94d6d8bac8953d495d2a80
-
SHA1
ed7d1f150d7136d776dcadf85a75872284bcf0e3
-
SHA256
6218736f8d284d691e78376a2bad365c66983e5453f69af1487a75c802a6b240
-
SHA512
32f9002c0b38f1340a37078d4cb58813c0cd922f504ad0894baff1b6412209c27023f78bc2fb6697479e34d91e72e4cde7143c37ccdebfccfad10526bce34297
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPE6GIo:5dbwovEVyqgoZmZXWfIdQdRaefPsIo
Malware Config
Signatures
-
pid Process 2840 arp.exe 2828 arp.exe 2232 arp.exe 628 arp.exe 2724 arp.exe 2688 arp.exe 2864 arp.exe 2836 arp.exe 1800 arp.exe -
resource yara_rule behavioral1/memory/1784-2-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1784-1-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1784-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1784-4-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2664 1784 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1784 rundll32.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1956 wrote to memory of 1784 1956 rundll32.exe 30 PID 1956 wrote to memory of 1784 1956 rundll32.exe 30 PID 1956 wrote to memory of 1784 1956 rundll32.exe 30 PID 1956 wrote to memory of 1784 1956 rundll32.exe 30 PID 1956 wrote to memory of 1784 1956 rundll32.exe 30 PID 1956 wrote to memory of 1784 1956 rundll32.exe 30 PID 1956 wrote to memory of 1784 1956 rundll32.exe 30 PID 1784 wrote to memory of 2664 1784 rundll32.exe 31 PID 1784 wrote to memory of 2664 1784 rundll32.exe 31 PID 1784 wrote to memory of 2664 1784 rundll32.exe 31 PID 1784 wrote to memory of 2664 1784 rundll32.exe 31 PID 1784 wrote to memory of 1800 1784 rundll32.exe 32 PID 1784 wrote to memory of 1800 1784 rundll32.exe 32 PID 1784 wrote to memory of 1800 1784 rundll32.exe 32 PID 1784 wrote to memory of 1800 1784 rundll32.exe 32 PID 1784 wrote to memory of 2232 1784 rundll32.exe 35 PID 1784 wrote to memory of 2232 1784 rundll32.exe 35 PID 1784 wrote to memory of 2232 1784 rundll32.exe 35 PID 1784 wrote to memory of 2232 1784 rundll32.exe 35 PID 1784 wrote to memory of 628 1784 rundll32.exe 36 PID 1784 wrote to memory of 628 1784 rundll32.exe 36 PID 1784 wrote to memory of 628 1784 rundll32.exe 36 PID 1784 wrote to memory of 628 1784 rundll32.exe 36 PID 1784 wrote to memory of 2724 1784 rundll32.exe 37 PID 1784 wrote to memory of 2724 1784 rundll32.exe 37 PID 1784 wrote to memory of 2724 1784 rundll32.exe 37 PID 1784 wrote to memory of 2724 1784 rundll32.exe 37 PID 1784 wrote to memory of 2688 1784 rundll32.exe 38 PID 1784 wrote to memory of 2688 1784 rundll32.exe 38 PID 1784 wrote to memory of 2688 1784 rundll32.exe 38 PID 1784 wrote to memory of 2688 1784 rundll32.exe 38 PID 1784 wrote to memory of 2840 1784 rundll32.exe 39 PID 1784 wrote to memory of 2840 1784 rundll32.exe 39 PID 1784 wrote to memory of 2840 1784 rundll32.exe 39 PID 1784 wrote to memory of 2840 1784 rundll32.exe 39 PID 1784 wrote to memory of 2836 1784 rundll32.exe 40 PID 1784 wrote to memory of 2836 1784 rundll32.exe 40 PID 1784 wrote to memory of 2836 1784 rundll32.exe 40 PID 1784 wrote to memory of 2836 1784 rundll32.exe 40 PID 1784 wrote to memory of 2828 1784 rundll32.exe 41 PID 1784 wrote to memory of 2828 1784 rundll32.exe 41 PID 1784 wrote to memory of 2828 1784 rundll32.exe 41 PID 1784 wrote to memory of 2828 1784 rundll32.exe 41 PID 1784 wrote to memory of 2864 1784 rundll32.exe 42 PID 1784 wrote to memory of 2864 1784 rundll32.exe 42 PID 1784 wrote to memory of 2864 1784 rundll32.exe 42 PID 1784 wrote to memory of 2864 1784 rundll32.exe 42
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6218736f8d284d691e78376a2bad365c66983e5453f69af1487a75c802a6b240N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6218736f8d284d691e78376a2bad365c66983e5453f69af1487a75c802a6b240N.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 3123⤵
- Program crash
PID:2664
-
-
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1800
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 ff-f5-f0-76-89-533⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2232
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 c1-44-30-31-3b-443⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:628
-
-
C:\Windows\SysWOW64\arp.exearp -s 49.12.169.207 e2-2c-39-ff-1f-4b3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2724
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 64-97-a6-b5-08-c23⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2688
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 34-d3-b9-73-f5-533⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2840
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 1e-bf-70-78-4b-b13⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2836
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 8f-b3-13-18-5a-4b3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2828
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 f0-38-1d-45-53-723⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2864
-
-