Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 22:22
Behavioral task
behavioral1
Sample
6e46a5208f20b403d933f4548cdaa7794b91b15e5466dbbd152c67355bc204d0.dll
Resource
win7-20240903-en
windows7-x64
6 signatures
150 seconds
General
-
Target
6e46a5208f20b403d933f4548cdaa7794b91b15e5466dbbd152c67355bc204d0.dll
-
Size
80KB
-
MD5
e8028fc16f218e5d7bc92058490f7db0
-
SHA1
95d1b64be0ae981c9b2e93f66166d9cd96729565
-
SHA256
6e46a5208f20b403d933f4548cdaa7794b91b15e5466dbbd152c67355bc204d0
-
SHA512
eaead1c0cf5a51b7eb9a2c97e368a3bf991847e5b6157e7ff1b70a98c1630573fcaece166bdfd5f7afdea29ceff0a5b9e4b98e15a15f83c2daf4d48eb2e71f86
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEO3:5dbwovEVyqgoZmZXWfIdQdRaefPr
Malware Config
Signatures
-
pid Process 1976 arp.exe 2344 arp.exe 3856 arp.exe 1736 arp.exe 3620 arp.exe 3568 arp.exe 408 arp.exe 2908 arp.exe 3660 arp.exe -
resource yara_rule behavioral2/memory/5032-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/5032-1-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1752 5032 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5032 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4520 wrote to memory of 5032 4520 rundll32.exe 82 PID 4520 wrote to memory of 5032 4520 rundll32.exe 82 PID 4520 wrote to memory of 5032 4520 rundll32.exe 82 PID 5032 wrote to memory of 2344 5032 rundll32.exe 84 PID 5032 wrote to memory of 2344 5032 rundll32.exe 84 PID 5032 wrote to memory of 2344 5032 rundll32.exe 84 PID 5032 wrote to memory of 3856 5032 rundll32.exe 87 PID 5032 wrote to memory of 3856 5032 rundll32.exe 87 PID 5032 wrote to memory of 3856 5032 rundll32.exe 87 PID 5032 wrote to memory of 3660 5032 rundll32.exe 88 PID 5032 wrote to memory of 3660 5032 rundll32.exe 88 PID 5032 wrote to memory of 3660 5032 rundll32.exe 88 PID 5032 wrote to memory of 2908 5032 rundll32.exe 89 PID 5032 wrote to memory of 2908 5032 rundll32.exe 89 PID 5032 wrote to memory of 2908 5032 rundll32.exe 89 PID 5032 wrote to memory of 408 5032 rundll32.exe 90 PID 5032 wrote to memory of 408 5032 rundll32.exe 90 PID 5032 wrote to memory of 408 5032 rundll32.exe 90 PID 5032 wrote to memory of 3568 5032 rundll32.exe 91 PID 5032 wrote to memory of 3568 5032 rundll32.exe 91 PID 5032 wrote to memory of 3568 5032 rundll32.exe 91 PID 5032 wrote to memory of 3620 5032 rundll32.exe 92 PID 5032 wrote to memory of 3620 5032 rundll32.exe 92 PID 5032 wrote to memory of 3620 5032 rundll32.exe 92 PID 5032 wrote to memory of 1736 5032 rundll32.exe 93 PID 5032 wrote to memory of 1736 5032 rundll32.exe 93 PID 5032 wrote to memory of 1736 5032 rundll32.exe 93 PID 5032 wrote to memory of 1976 5032 rundll32.exe 94 PID 5032 wrote to memory of 1976 5032 rundll32.exe 94 PID 5032 wrote to memory of 1976 5032 rundll32.exe 94
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6e46a5208f20b403d933f4548cdaa7794b91b15e5466dbbd152c67355bc204d0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6e46a5208f20b403d933f4548cdaa7794b91b15e5466dbbd152c67355bc204d0.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2344
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 73-04-27-65-dd-dd3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3856
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 a7-78-5e-76-e4-c53⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3660
-
-
C:\Windows\SysWOW64\arp.exearp -s 37.27.61.183 fb-68-b1-2f-95-d33⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2908
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 8f-15-2a-48-ac-cb3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:408
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 15-41-c1-b0-6f-9e3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3568
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 85-1b-e7-89-81-4c3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3620
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 85-9e-e1-89-f0-623⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1736
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 dd-e9-86-90-2b-283⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 7123⤵
- Program crash
PID:1752
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5032 -ip 50321⤵PID:3908