Analysis
-
max time kernel
114s -
max time network
75s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 22:18
Behavioral task
behavioral1
Sample
6e46a5208f20b403d933f4548cdaa7794b91b15e5466dbbd152c67355bc204d0.dll
Resource
win7-20241010-en
General
-
Target
6e46a5208f20b403d933f4548cdaa7794b91b15e5466dbbd152c67355bc204d0.dll
-
Size
80KB
-
MD5
e8028fc16f218e5d7bc92058490f7db0
-
SHA1
95d1b64be0ae981c9b2e93f66166d9cd96729565
-
SHA256
6e46a5208f20b403d933f4548cdaa7794b91b15e5466dbbd152c67355bc204d0
-
SHA512
eaead1c0cf5a51b7eb9a2c97e368a3bf991847e5b6157e7ff1b70a98c1630573fcaece166bdfd5f7afdea29ceff0a5b9e4b98e15a15f83c2daf4d48eb2e71f86
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEO3:5dbwovEVyqgoZmZXWfIdQdRaefPr
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 5 2652 rundll32.exe 8 2652 rundll32.exe 9 2652 rundll32.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: rundll32.exe -
pid Process 2612 arp.exe 2292 arp.exe 2540 arp.exe 2412 arp.exe 3000 arp.exe 2052 arp.exe 2804 arp.exe 2352 arp.exe 1516 arp.exe -
resource yara_rule behavioral1/memory/2652-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2652-1-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2652-2-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2652-5-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2652-6-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2652-12-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2652-14-0x0000000010000000-0x0000000010033000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2652 rundll32.exe 2652 rundll32.exe 2652 rundll32.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 476 Process not Found 476 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2652 rundll32.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2596 wrote to memory of 2652 2596 rundll32.exe 30 PID 2596 wrote to memory of 2652 2596 rundll32.exe 30 PID 2596 wrote to memory of 2652 2596 rundll32.exe 30 PID 2596 wrote to memory of 2652 2596 rundll32.exe 30 PID 2596 wrote to memory of 2652 2596 rundll32.exe 30 PID 2596 wrote to memory of 2652 2596 rundll32.exe 30 PID 2596 wrote to memory of 2652 2596 rundll32.exe 30 PID 2652 wrote to memory of 2352 2652 rundll32.exe 31 PID 2652 wrote to memory of 2352 2652 rundll32.exe 31 PID 2652 wrote to memory of 2352 2652 rundll32.exe 31 PID 2652 wrote to memory of 2352 2652 rundll32.exe 31 PID 2652 wrote to memory of 2612 2652 rundll32.exe 34 PID 2652 wrote to memory of 2612 2652 rundll32.exe 34 PID 2652 wrote to memory of 2612 2652 rundll32.exe 34 PID 2652 wrote to memory of 2612 2652 rundll32.exe 34 PID 2652 wrote to memory of 2292 2652 rundll32.exe 35 PID 2652 wrote to memory of 2292 2652 rundll32.exe 35 PID 2652 wrote to memory of 2292 2652 rundll32.exe 35 PID 2652 wrote to memory of 2292 2652 rundll32.exe 35 PID 2652 wrote to memory of 2540 2652 rundll32.exe 37 PID 2652 wrote to memory of 2540 2652 rundll32.exe 37 PID 2652 wrote to memory of 2540 2652 rundll32.exe 37 PID 2652 wrote to memory of 2540 2652 rundll32.exe 37 PID 2652 wrote to memory of 2412 2652 rundll32.exe 38 PID 2652 wrote to memory of 2412 2652 rundll32.exe 38 PID 2652 wrote to memory of 2412 2652 rundll32.exe 38 PID 2652 wrote to memory of 2412 2652 rundll32.exe 38 PID 2652 wrote to memory of 3000 2652 rundll32.exe 40 PID 2652 wrote to memory of 3000 2652 rundll32.exe 40 PID 2652 wrote to memory of 3000 2652 rundll32.exe 40 PID 2652 wrote to memory of 3000 2652 rundll32.exe 40 PID 2652 wrote to memory of 2052 2652 rundll32.exe 42 PID 2652 wrote to memory of 2052 2652 rundll32.exe 42 PID 2652 wrote to memory of 2052 2652 rundll32.exe 42 PID 2652 wrote to memory of 2052 2652 rundll32.exe 42 PID 2652 wrote to memory of 1516 2652 rundll32.exe 44 PID 2652 wrote to memory of 1516 2652 rundll32.exe 44 PID 2652 wrote to memory of 1516 2652 rundll32.exe 44 PID 2652 wrote to memory of 1516 2652 rundll32.exe 44 PID 2652 wrote to memory of 2804 2652 rundll32.exe 46 PID 2652 wrote to memory of 2804 2652 rundll32.exe 46 PID 2652 wrote to memory of 2804 2652 rundll32.exe 46 PID 2652 wrote to memory of 2804 2652 rundll32.exe 46 PID 2652 wrote to memory of 1924 2652 rundll32.exe 50 PID 2652 wrote to memory of 1924 2652 rundll32.exe 50 PID 2652 wrote to memory of 1924 2652 rundll32.exe 50 PID 2652 wrote to memory of 1924 2652 rundll32.exe 50
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6e46a5208f20b403d933f4548cdaa7794b91b15e5466dbbd152c67355bc204d0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6e46a5208f20b403d933f4548cdaa7794b91b15e5466dbbd152c67355bc204d0.dll,#12⤵
- Blocklisted process makes network request
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2352
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 a2-14-47-05-ad-223⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2612
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 d1-61-fc-2a-c3-0c3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2292
-
-
C:\Windows\SysWOW64\arp.exearp -s 37.27.61.184 be-93-21-d0-3f-153⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2540
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 92-b4-53-35-c8-ab3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2412
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 c1-a9-99-3d-53-663⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3000
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 78-87-c2-22-16-8e3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2052
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 34-39-b3-87-51-583⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1516
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 f1-9b-2f-5f-db-8c3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2804
-
-
C:\Windows\SysWOW64\arp.exearp -d3⤵
- System Location Discovery: System Language Discovery
PID:1924
-
-