Analysis
-
max time kernel
96s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 01:08
Behavioral task
behavioral1
Sample
de51bcda784d935dea69ab8e2ed85b976eb27684ece11575f653e42e55dd54bbN.dll
Resource
win7-20240903-en
windows7-x64
9 signatures
120 seconds
General
-
Target
de51bcda784d935dea69ab8e2ed85b976eb27684ece11575f653e42e55dd54bbN.dll
-
Size
80KB
-
MD5
e3fb233f868130c9d32848fdbcad4ac0
-
SHA1
c2cb0952d2681fea81ade9c51e7041c48ad7156f
-
SHA256
de51bcda784d935dea69ab8e2ed85b976eb27684ece11575f653e42e55dd54bb
-
SHA512
2a968b8e647e66d3ff9d7d8e7e54853ba3cd0ae3496769e09a4f83e461f0c406a0c0f80122dd5050a23502f97022b3ea66aaf153650bea71fdcf5224fa9843f0
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEJl+qo6:5dbwovEVyqgoZmZXWfIdQdRaefPocq
Malware Config
Signatures
-
pid Process 2256 arp.exe 3600 arp.exe 644 arp.exe 3892 arp.exe 2776 arp.exe 1528 arp.exe 2248 arp.exe 2680 arp.exe 4884 arp.exe -
resource yara_rule behavioral2/memory/3360-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/3360-2-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 744 3360 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3360 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4972 wrote to memory of 3360 4972 rundll32.exe 83 PID 4972 wrote to memory of 3360 4972 rundll32.exe 83 PID 4972 wrote to memory of 3360 4972 rundll32.exe 83 PID 3360 wrote to memory of 2256 3360 rundll32.exe 85 PID 3360 wrote to memory of 2256 3360 rundll32.exe 85 PID 3360 wrote to memory of 2256 3360 rundll32.exe 85 PID 3360 wrote to memory of 1528 3360 rundll32.exe 88 PID 3360 wrote to memory of 1528 3360 rundll32.exe 88 PID 3360 wrote to memory of 1528 3360 rundll32.exe 88 PID 3360 wrote to memory of 3600 3360 rundll32.exe 89 PID 3360 wrote to memory of 3600 3360 rundll32.exe 89 PID 3360 wrote to memory of 3600 3360 rundll32.exe 89 PID 3360 wrote to memory of 2248 3360 rundll32.exe 90 PID 3360 wrote to memory of 2248 3360 rundll32.exe 90 PID 3360 wrote to memory of 2248 3360 rundll32.exe 90 PID 3360 wrote to memory of 4884 3360 rundll32.exe 91 PID 3360 wrote to memory of 4884 3360 rundll32.exe 91 PID 3360 wrote to memory of 4884 3360 rundll32.exe 91 PID 3360 wrote to memory of 2776 3360 rundll32.exe 92 PID 3360 wrote to memory of 2776 3360 rundll32.exe 92 PID 3360 wrote to memory of 2776 3360 rundll32.exe 92 PID 3360 wrote to memory of 644 3360 rundll32.exe 93 PID 3360 wrote to memory of 644 3360 rundll32.exe 93 PID 3360 wrote to memory of 644 3360 rundll32.exe 93 PID 3360 wrote to memory of 2680 3360 rundll32.exe 94 PID 3360 wrote to memory of 2680 3360 rundll32.exe 94 PID 3360 wrote to memory of 2680 3360 rundll32.exe 94 PID 3360 wrote to memory of 3892 3360 rundll32.exe 95 PID 3360 wrote to memory of 3892 3360 rundll32.exe 95 PID 3360 wrote to memory of 3892 3360 rundll32.exe 95
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de51bcda784d935dea69ab8e2ed85b976eb27684ece11575f653e42e55dd54bbN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de51bcda784d935dea69ab8e2ed85b976eb27684ece11575f653e42e55dd54bbN.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2256
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 18-ce-f5-57-8c-353⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1528
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 39-98-83-5e-e6-e63⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3600
-
-
C:\Windows\SysWOW64\arp.exearp -s 49.12.169.208 bc-dd-27-49-88-6a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2248
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 e4-b9-70-b5-8a-4c3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4884
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 6c-fb-a3-08-d7-fd3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2776
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 f5-29-8e-aa-a3-df3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:644
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 2a-f7-df-68-6d-6b3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2680
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 84-84-3a-98-23-4c3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 7043⤵
- Program crash
PID:744
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3360 -ip 33601⤵PID:536