Analysis
-
max time kernel
92s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2024 01:11
Behavioral task
behavioral1
Sample
6218736f8d284d691e78376a2bad365c66983e5453f69af1487a75c802a6b240N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6218736f8d284d691e78376a2bad365c66983e5453f69af1487a75c802a6b240N.dll
Resource
win10v2004-20241007-en
General
-
Target
6218736f8d284d691e78376a2bad365c66983e5453f69af1487a75c802a6b240N.dll
-
Size
80KB
-
MD5
c385bf8dec94d6d8bac8953d495d2a80
-
SHA1
ed7d1f150d7136d776dcadf85a75872284bcf0e3
-
SHA256
6218736f8d284d691e78376a2bad365c66983e5453f69af1487a75c802a6b240
-
SHA512
32f9002c0b38f1340a37078d4cb58813c0cd922f504ad0894baff1b6412209c27023f78bc2fb6697479e34d91e72e4cde7143c37ccdebfccfad10526bce34297
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPE6GIo:5dbwovEVyqgoZmZXWfIdQdRaefPsIo
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
pid Process 4780 arp.exe 4784 arp.exe 824 arp.exe 1912 arp.exe 3904 arp.exe 1176 arp.exe 1524 arp.exe 4512 arp.exe 4176 arp.exe -
resource yara_rule behavioral2/memory/4352-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/4352-2-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3032 4352 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4352 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1180 wrote to memory of 4352 1180 rundll32.exe 83 PID 1180 wrote to memory of 4352 1180 rundll32.exe 83 PID 1180 wrote to memory of 4352 1180 rundll32.exe 83 PID 4352 wrote to memory of 1176 4352 rundll32.exe 85 PID 4352 wrote to memory of 1176 4352 rundll32.exe 85 PID 4352 wrote to memory of 1176 4352 rundll32.exe 85 PID 4352 wrote to memory of 4780 4352 rundll32.exe 88 PID 4352 wrote to memory of 4780 4352 rundll32.exe 88 PID 4352 wrote to memory of 4780 4352 rundll32.exe 88 PID 4352 wrote to memory of 4784 4352 rundll32.exe 89 PID 4352 wrote to memory of 4784 4352 rundll32.exe 89 PID 4352 wrote to memory of 4784 4352 rundll32.exe 89 PID 4352 wrote to memory of 3904 4352 rundll32.exe 90 PID 4352 wrote to memory of 3904 4352 rundll32.exe 90 PID 4352 wrote to memory of 3904 4352 rundll32.exe 90 PID 4352 wrote to memory of 824 4352 rundll32.exe 91 PID 4352 wrote to memory of 824 4352 rundll32.exe 91 PID 4352 wrote to memory of 824 4352 rundll32.exe 91 PID 4352 wrote to memory of 1524 4352 rundll32.exe 92 PID 4352 wrote to memory of 1524 4352 rundll32.exe 92 PID 4352 wrote to memory of 1524 4352 rundll32.exe 92 PID 4352 wrote to memory of 4176 4352 rundll32.exe 93 PID 4352 wrote to memory of 4176 4352 rundll32.exe 93 PID 4352 wrote to memory of 4176 4352 rundll32.exe 93 PID 4352 wrote to memory of 4512 4352 rundll32.exe 94 PID 4352 wrote to memory of 4512 4352 rundll32.exe 94 PID 4352 wrote to memory of 4512 4352 rundll32.exe 94 PID 4352 wrote to memory of 1912 4352 rundll32.exe 97 PID 4352 wrote to memory of 1912 4352 rundll32.exe 97 PID 4352 wrote to memory of 1912 4352 rundll32.exe 97
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6218736f8d284d691e78376a2bad365c66983e5453f69af1487a75c802a6b240N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6218736f8d284d691e78376a2bad365c66983e5453f69af1487a75c802a6b240N.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1176
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 ff-f5-f0-76-89-533⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4780
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 c1-44-30-31-3b-443⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4784
-
-
C:\Windows\SysWOW64\arp.exearp -s 49.12.169.208 e2-2c-39-ff-1f-4b3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3904
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 64-97-a6-b5-08-c23⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:824
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 34-d3-b9-73-f5-533⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1524
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 1e-bf-70-78-4b-b13⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4176
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 8f-b3-13-18-5a-4b3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4512
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 f0-38-1d-45-53-723⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4352 -s 7083⤵
- Program crash
PID:3032
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4352 -ip 43521⤵PID:2052