Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 22:18
Behavioral task
behavioral1
Sample
6e46a5208f20b403d933f4548cdaa7794b91b15e5466dbbd152c67355bc204d0.dll
Resource
win7-20241010-en
windows7-x64
9 signatures
120 seconds
General
-
Target
6e46a5208f20b403d933f4548cdaa7794b91b15e5466dbbd152c67355bc204d0.dll
-
Size
80KB
-
MD5
e8028fc16f218e5d7bc92058490f7db0
-
SHA1
95d1b64be0ae981c9b2e93f66166d9cd96729565
-
SHA256
6e46a5208f20b403d933f4548cdaa7794b91b15e5466dbbd152c67355bc204d0
-
SHA512
eaead1c0cf5a51b7eb9a2c97e368a3bf991847e5b6157e7ff1b70a98c1630573fcaece166bdfd5f7afdea29ceff0a5b9e4b98e15a15f83c2daf4d48eb2e71f86
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEO3:5dbwovEVyqgoZmZXWfIdQdRaefPr
Malware Config
Signatures
-
pid Process 2056 arp.exe 3656 arp.exe 2228 arp.exe 3964 arp.exe 4252 arp.exe 1264 arp.exe 4544 arp.exe 3356 arp.exe 3172 arp.exe -
resource yara_rule behavioral2/memory/3484-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/3484-2-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2876 3484 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3484 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4308 wrote to memory of 3484 4308 rundll32.exe 83 PID 4308 wrote to memory of 3484 4308 rundll32.exe 83 PID 4308 wrote to memory of 3484 4308 rundll32.exe 83 PID 3484 wrote to memory of 3172 3484 rundll32.exe 85 PID 3484 wrote to memory of 3172 3484 rundll32.exe 85 PID 3484 wrote to memory of 3172 3484 rundll32.exe 85 PID 3484 wrote to memory of 2228 3484 rundll32.exe 88 PID 3484 wrote to memory of 2228 3484 rundll32.exe 88 PID 3484 wrote to memory of 2228 3484 rundll32.exe 88 PID 3484 wrote to memory of 3656 3484 rundll32.exe 89 PID 3484 wrote to memory of 3656 3484 rundll32.exe 89 PID 3484 wrote to memory of 3656 3484 rundll32.exe 89 PID 3484 wrote to memory of 3356 3484 rundll32.exe 90 PID 3484 wrote to memory of 3356 3484 rundll32.exe 90 PID 3484 wrote to memory of 3356 3484 rundll32.exe 90 PID 3484 wrote to memory of 4544 3484 rundll32.exe 91 PID 3484 wrote to memory of 4544 3484 rundll32.exe 91 PID 3484 wrote to memory of 4544 3484 rundll32.exe 91 PID 3484 wrote to memory of 2056 3484 rundll32.exe 92 PID 3484 wrote to memory of 2056 3484 rundll32.exe 92 PID 3484 wrote to memory of 2056 3484 rundll32.exe 92 PID 3484 wrote to memory of 3964 3484 rundll32.exe 93 PID 3484 wrote to memory of 3964 3484 rundll32.exe 93 PID 3484 wrote to memory of 3964 3484 rundll32.exe 93 PID 3484 wrote to memory of 1264 3484 rundll32.exe 94 PID 3484 wrote to memory of 1264 3484 rundll32.exe 94 PID 3484 wrote to memory of 1264 3484 rundll32.exe 94 PID 3484 wrote to memory of 4252 3484 rundll32.exe 95 PID 3484 wrote to memory of 4252 3484 rundll32.exe 95 PID 3484 wrote to memory of 4252 3484 rundll32.exe 95
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6e46a5208f20b403d933f4548cdaa7794b91b15e5466dbbd152c67355bc204d0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6e46a5208f20b403d933f4548cdaa7794b91b15e5466dbbd152c67355bc204d0.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3172
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 a2-14-47-05-ad-223⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2228
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 d1-61-fc-2a-c3-0c3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3656
-
-
C:\Windows\SysWOW64\arp.exearp -s 37.27.61.181 be-93-21-d0-3f-153⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3356
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 92-b4-53-35-c8-ab3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4544
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 c1-a9-99-3d-53-663⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2056
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 78-87-c2-22-16-8e3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3964
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 34-39-b3-87-51-583⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1264
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 f1-9b-2f-5f-db-8c3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3484 -s 7283⤵
- Program crash
PID:2876
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3484 -ip 34841⤵PID:1888