Analysis
-
max time kernel
114s -
max time network
74s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 01:08
Behavioral task
behavioral1
Sample
de51bcda784d935dea69ab8e2ed85b976eb27684ece11575f653e42e55dd54bbN.dll
Resource
win7-20240903-en
General
-
Target
de51bcda784d935dea69ab8e2ed85b976eb27684ece11575f653e42e55dd54bbN.dll
-
Size
80KB
-
MD5
e3fb233f868130c9d32848fdbcad4ac0
-
SHA1
c2cb0952d2681fea81ade9c51e7041c48ad7156f
-
SHA256
de51bcda784d935dea69ab8e2ed85b976eb27684ece11575f653e42e55dd54bb
-
SHA512
2a968b8e647e66d3ff9d7d8e7e54853ba3cd0ae3496769e09a4f83e461f0c406a0c0f80122dd5050a23502f97022b3ea66aaf153650bea71fdcf5224fa9843f0
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEJl+qo6:5dbwovEVyqgoZmZXWfIdQdRaefPocq
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 5 1804 rundll32.exe 8 1804 rundll32.exe 9 1804 rundll32.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: rundll32.exe -
pid Process 2288 arp.exe 1892 arp.exe 2552 arp.exe 2040 arp.exe 1684 arp.exe 2364 arp.exe 2116 arp.exe 2144 arp.exe 2176 arp.exe -
resource yara_rule behavioral1/memory/1804-2-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1804-1-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1804-5-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1804-6-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1804-7-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1804-13-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1804-15-0x0000000010000000-0x0000000010033000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1804 rundll32.exe 1804 rundll32.exe 1804 rundll32.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 476 Process not Found 476 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1804 rundll32.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2104 wrote to memory of 1804 2104 rundll32.exe 30 PID 2104 wrote to memory of 1804 2104 rundll32.exe 30 PID 2104 wrote to memory of 1804 2104 rundll32.exe 30 PID 2104 wrote to memory of 1804 2104 rundll32.exe 30 PID 2104 wrote to memory of 1804 2104 rundll32.exe 30 PID 2104 wrote to memory of 1804 2104 rundll32.exe 30 PID 2104 wrote to memory of 1804 2104 rundll32.exe 30 PID 1804 wrote to memory of 2364 1804 rundll32.exe 31 PID 1804 wrote to memory of 2364 1804 rundll32.exe 31 PID 1804 wrote to memory of 2364 1804 rundll32.exe 31 PID 1804 wrote to memory of 2364 1804 rundll32.exe 31 PID 1804 wrote to memory of 2116 1804 rundll32.exe 33 PID 1804 wrote to memory of 2116 1804 rundll32.exe 33 PID 1804 wrote to memory of 2116 1804 rundll32.exe 33 PID 1804 wrote to memory of 2116 1804 rundll32.exe 33 PID 1804 wrote to memory of 2288 1804 rundll32.exe 34 PID 1804 wrote to memory of 2288 1804 rundll32.exe 34 PID 1804 wrote to memory of 2288 1804 rundll32.exe 34 PID 1804 wrote to memory of 2288 1804 rundll32.exe 34 PID 1804 wrote to memory of 1892 1804 rundll32.exe 35 PID 1804 wrote to memory of 1892 1804 rundll32.exe 35 PID 1804 wrote to memory of 1892 1804 rundll32.exe 35 PID 1804 wrote to memory of 1892 1804 rundll32.exe 35 PID 1804 wrote to memory of 2552 1804 rundll32.exe 36 PID 1804 wrote to memory of 2552 1804 rundll32.exe 36 PID 1804 wrote to memory of 2552 1804 rundll32.exe 36 PID 1804 wrote to memory of 2552 1804 rundll32.exe 36 PID 1804 wrote to memory of 2144 1804 rundll32.exe 37 PID 1804 wrote to memory of 2144 1804 rundll32.exe 37 PID 1804 wrote to memory of 2144 1804 rundll32.exe 37 PID 1804 wrote to memory of 2144 1804 rundll32.exe 37 PID 1804 wrote to memory of 1684 1804 rundll32.exe 40 PID 1804 wrote to memory of 1684 1804 rundll32.exe 40 PID 1804 wrote to memory of 1684 1804 rundll32.exe 40 PID 1804 wrote to memory of 1684 1804 rundll32.exe 40 PID 1804 wrote to memory of 2176 1804 rundll32.exe 42 PID 1804 wrote to memory of 2176 1804 rundll32.exe 42 PID 1804 wrote to memory of 2176 1804 rundll32.exe 42 PID 1804 wrote to memory of 2176 1804 rundll32.exe 42 PID 1804 wrote to memory of 2040 1804 rundll32.exe 44 PID 1804 wrote to memory of 2040 1804 rundll32.exe 44 PID 1804 wrote to memory of 2040 1804 rundll32.exe 44 PID 1804 wrote to memory of 2040 1804 rundll32.exe 44 PID 1804 wrote to memory of 2640 1804 rundll32.exe 50 PID 1804 wrote to memory of 2640 1804 rundll32.exe 50 PID 1804 wrote to memory of 2640 1804 rundll32.exe 50 PID 1804 wrote to memory of 2640 1804 rundll32.exe 50
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de51bcda784d935dea69ab8e2ed85b976eb27684ece11575f653e42e55dd54bbN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de51bcda784d935dea69ab8e2ed85b976eb27684ece11575f653e42e55dd54bbN.dll,#12⤵
- Blocklisted process makes network request
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2364
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 f0-77-aa-57-c4-383⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2116
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 be-6c-17-62-66-563⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2288
-
-
C:\Windows\SysWOW64\arp.exearp -s 37.27.61.183 95-e4-65-8f-d8-c83⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1892
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 d9-53-c9-3c-f2-673⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2552
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 b3-5a-9a-ad-9b-ca3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2144
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 ed-55-4c-33-38-4f3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1684
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 0e-d2-1c-25-8a-f93⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2176
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 c2-ec-c9-c8-87-ad3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2040
-
-
C:\Windows\SysWOW64\arp.exearp -d3⤵
- System Location Discovery: System Language Discovery
PID:2640
-
-