Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 06:38
Behavioral task
behavioral1
Sample
67b71a440987b18b40c6e43a519633bb43756eaf46ff105a1591515ee8a0dda6N.dll
Resource
win7-20240903-en
windows7-x64
6 signatures
120 seconds
General
-
Target
67b71a440987b18b40c6e43a519633bb43756eaf46ff105a1591515ee8a0dda6N.dll
-
Size
80KB
-
MD5
8927897f68bc90ebc2a340b0b020b070
-
SHA1
13fb4d1fd8e7a3fa121c2d81364ad33a001119c7
-
SHA256
67b71a440987b18b40c6e43a519633bb43756eaf46ff105a1591515ee8a0dda6
-
SHA512
254564e22eb764b429f680fae2b5447de53cb9daee8b955df1bc200f655deb545f35d76e9b5b8058ee4356d7c91190fc3fd36b80aa7aa098bd3d5f603b98d404
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEN9fD:5dbwovEVyqgoZmZXWfIdQdRaefP4D
Malware Config
Signatures
-
pid Process 1408 arp.exe 1104 arp.exe 4304 arp.exe 4464 arp.exe 4872 arp.exe 3752 arp.exe 2948 arp.exe 3768 arp.exe 4744 arp.exe -
resource yara_rule behavioral2/memory/3976-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/3976-2-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4104 3976 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3976 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1600 wrote to memory of 3976 1600 rundll32.exe 83 PID 1600 wrote to memory of 3976 1600 rundll32.exe 83 PID 1600 wrote to memory of 3976 1600 rundll32.exe 83 PID 3976 wrote to memory of 1408 3976 rundll32.exe 85 PID 3976 wrote to memory of 1408 3976 rundll32.exe 85 PID 3976 wrote to memory of 1408 3976 rundll32.exe 85 PID 3976 wrote to memory of 4872 3976 rundll32.exe 88 PID 3976 wrote to memory of 4872 3976 rundll32.exe 88 PID 3976 wrote to memory of 4872 3976 rundll32.exe 88 PID 3976 wrote to memory of 4464 3976 rundll32.exe 89 PID 3976 wrote to memory of 4464 3976 rundll32.exe 89 PID 3976 wrote to memory of 4464 3976 rundll32.exe 89 PID 3976 wrote to memory of 4304 3976 rundll32.exe 90 PID 3976 wrote to memory of 4304 3976 rundll32.exe 90 PID 3976 wrote to memory of 4304 3976 rundll32.exe 90 PID 3976 wrote to memory of 4744 3976 rundll32.exe 91 PID 3976 wrote to memory of 4744 3976 rundll32.exe 91 PID 3976 wrote to memory of 4744 3976 rundll32.exe 91 PID 3976 wrote to memory of 3768 3976 rundll32.exe 92 PID 3976 wrote to memory of 3768 3976 rundll32.exe 92 PID 3976 wrote to memory of 3768 3976 rundll32.exe 92 PID 3976 wrote to memory of 2948 3976 rundll32.exe 93 PID 3976 wrote to memory of 2948 3976 rundll32.exe 93 PID 3976 wrote to memory of 2948 3976 rundll32.exe 93 PID 3976 wrote to memory of 3752 3976 rundll32.exe 94 PID 3976 wrote to memory of 3752 3976 rundll32.exe 94 PID 3976 wrote to memory of 3752 3976 rundll32.exe 94 PID 3976 wrote to memory of 1104 3976 rundll32.exe 95 PID 3976 wrote to memory of 1104 3976 rundll32.exe 95 PID 3976 wrote to memory of 1104 3976 rundll32.exe 95
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\67b71a440987b18b40c6e43a519633bb43756eaf46ff105a1591515ee8a0dda6N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\67b71a440987b18b40c6e43a519633bb43756eaf46ff105a1591515ee8a0dda6N.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1408
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 fb-dc-66-b3-8e-8b3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4872
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 12-8f-2f-15-cf-8a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4464
-
-
C:\Windows\SysWOW64\arp.exearp -s 37.27.61.182 6a-7d-e7-b5-22-933⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4304
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 f7-95-99-aa-cb-033⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4744
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 81-98-92-e4-cc-bf3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3768
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 51-b9-a9-ea-26-473⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2948
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 97-a0-bd-dc-ff-263⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3752
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 a9-db-ba-f0-51-3e3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3976 -s 7283⤵
- Program crash
PID:4104
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3976 -ip 39761⤵PID:4556