Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 22:22
Behavioral task
behavioral1
Sample
6e46a5208f20b403d933f4548cdaa7794b91b15e5466dbbd152c67355bc204d0.dll
Resource
win7-20240903-en
windows7-x64
6 signatures
150 seconds
General
-
Target
6e46a5208f20b403d933f4548cdaa7794b91b15e5466dbbd152c67355bc204d0.dll
-
Size
80KB
-
MD5
e8028fc16f218e5d7bc92058490f7db0
-
SHA1
95d1b64be0ae981c9b2e93f66166d9cd96729565
-
SHA256
6e46a5208f20b403d933f4548cdaa7794b91b15e5466dbbd152c67355bc204d0
-
SHA512
eaead1c0cf5a51b7eb9a2c97e368a3bf991847e5b6157e7ff1b70a98c1630573fcaece166bdfd5f7afdea29ceff0a5b9e4b98e15a15f83c2daf4d48eb2e71f86
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEO3:5dbwovEVyqgoZmZXWfIdQdRaefPr
Malware Config
Signatures
-
pid Process 2280 arp.exe 2716 arp.exe 2756 arp.exe 2820 arp.exe 2816 arp.exe 1604 arp.exe 2760 arp.exe 2836 arp.exe 2832 arp.exe -
resource yara_rule behavioral1/memory/1632-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1632-2-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2876 1632 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1632 rundll32.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1848 wrote to memory of 1632 1848 rundll32.exe 30 PID 1848 wrote to memory of 1632 1848 rundll32.exe 30 PID 1848 wrote to memory of 1632 1848 rundll32.exe 30 PID 1848 wrote to memory of 1632 1848 rundll32.exe 30 PID 1848 wrote to memory of 1632 1848 rundll32.exe 30 PID 1848 wrote to memory of 1632 1848 rundll32.exe 30 PID 1848 wrote to memory of 1632 1848 rundll32.exe 30 PID 1632 wrote to memory of 1604 1632 rundll32.exe 32 PID 1632 wrote to memory of 1604 1632 rundll32.exe 32 PID 1632 wrote to memory of 1604 1632 rundll32.exe 32 PID 1632 wrote to memory of 1604 1632 rundll32.exe 32 PID 1632 wrote to memory of 2876 1632 rundll32.exe 31 PID 1632 wrote to memory of 2876 1632 rundll32.exe 31 PID 1632 wrote to memory of 2876 1632 rundll32.exe 31 PID 1632 wrote to memory of 2876 1632 rundll32.exe 31 PID 1632 wrote to memory of 2280 1632 rundll32.exe 35 PID 1632 wrote to memory of 2280 1632 rundll32.exe 35 PID 1632 wrote to memory of 2280 1632 rundll32.exe 35 PID 1632 wrote to memory of 2280 1632 rundll32.exe 35 PID 1632 wrote to memory of 2756 1632 rundll32.exe 36 PID 1632 wrote to memory of 2756 1632 rundll32.exe 36 PID 1632 wrote to memory of 2756 1632 rundll32.exe 36 PID 1632 wrote to memory of 2756 1632 rundll32.exe 36 PID 1632 wrote to memory of 2716 1632 rundll32.exe 37 PID 1632 wrote to memory of 2716 1632 rundll32.exe 37 PID 1632 wrote to memory of 2716 1632 rundll32.exe 37 PID 1632 wrote to memory of 2716 1632 rundll32.exe 37 PID 1632 wrote to memory of 2760 1632 rundll32.exe 38 PID 1632 wrote to memory of 2760 1632 rundll32.exe 38 PID 1632 wrote to memory of 2760 1632 rundll32.exe 38 PID 1632 wrote to memory of 2760 1632 rundll32.exe 38 PID 1632 wrote to memory of 2820 1632 rundll32.exe 39 PID 1632 wrote to memory of 2820 1632 rundll32.exe 39 PID 1632 wrote to memory of 2820 1632 rundll32.exe 39 PID 1632 wrote to memory of 2820 1632 rundll32.exe 39 PID 1632 wrote to memory of 2836 1632 rundll32.exe 40 PID 1632 wrote to memory of 2836 1632 rundll32.exe 40 PID 1632 wrote to memory of 2836 1632 rundll32.exe 40 PID 1632 wrote to memory of 2836 1632 rundll32.exe 40 PID 1632 wrote to memory of 2816 1632 rundll32.exe 41 PID 1632 wrote to memory of 2816 1632 rundll32.exe 41 PID 1632 wrote to memory of 2816 1632 rundll32.exe 41 PID 1632 wrote to memory of 2816 1632 rundll32.exe 41 PID 1632 wrote to memory of 2832 1632 rundll32.exe 42 PID 1632 wrote to memory of 2832 1632 rundll32.exe 42 PID 1632 wrote to memory of 2832 1632 rundll32.exe 42 PID 1632 wrote to memory of 2832 1632 rundll32.exe 42
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6e46a5208f20b403d933f4548cdaa7794b91b15e5466dbbd152c67355bc204d0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6e46a5208f20b403d933f4548cdaa7794b91b15e5466dbbd152c67355bc204d0.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1632 -s 3283⤵
- Program crash
PID:2876
-
-
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1604
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 4a-ad-dc-65-15-e13⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2280
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 2c-4c-f2-7b-64-343⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2756
-
-
C:\Windows\SysWOW64\arp.exearp -s 49.12.169.208 d5-6f-ef-75-e5-313⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2716
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 84-af-83-cf-15-e73⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2760
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 5c-a0-b8-54-32-6b3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2820
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 7d-48-a5-12-16-bb3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2836
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 69-7a-1f-46-0d-f03⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2816
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 1a-51-14-c0-8f-893⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2832
-
-