Analysis
-
max time kernel
95s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 19:50
Static task
static1
Behavioral task
behavioral1
Sample
f37c66290615525b1226b8189b8462135af1b1e88034a41ca47107498055b604N.dll
Resource
win7-20240903-en
General
-
Target
f37c66290615525b1226b8189b8462135af1b1e88034a41ca47107498055b604N.dll
-
Size
241KB
-
MD5
8b79e5182923b1cb542a4d0a065e9860
-
SHA1
f819196bf93221f6760a943f080f63c90504efc7
-
SHA256
f37c66290615525b1226b8189b8462135af1b1e88034a41ca47107498055b604
-
SHA512
d1cff7fe66f999a29b9a6c325762df47d6584e4d274888d08550ffec98b51e381c22aa019dd2632d15898ad2c64a589a7247186af0f947d18b0534c97d430f76
-
SSDEEP
6144:GTWYCAvCMeFF3sTnvOTB5VsQvMRlkM4RD/qzMfUpFg:GKYTuFFmnvOT7MRGM4h/qofkg
Malware Config
Signatures
-
Floxif family
-
Detects Floxif payload 1 IoCs
resource yara_rule behavioral2/files/0x000c000000023b30-1.dat floxif -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000c000000023b30-1.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 2100 rundll32.exe -
pid Process 4180 arp.exe 4064 arp.exe 3712 arp.exe 2132 arp.exe 5072 arp.exe 60 arp.exe 2440 arp.exe 2632 arp.exe 440 arp.exe -
resource yara_rule behavioral2/memory/2100-2-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/files/0x000c000000023b30-1.dat upx behavioral2/memory/2100-8-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\System\symsrv.dll rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1148 2100 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2100 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3644 wrote to memory of 2100 3644 rundll32.exe 82 PID 3644 wrote to memory of 2100 3644 rundll32.exe 82 PID 3644 wrote to memory of 2100 3644 rundll32.exe 82 PID 2100 wrote to memory of 60 2100 rundll32.exe 84 PID 2100 wrote to memory of 60 2100 rundll32.exe 84 PID 2100 wrote to memory of 60 2100 rundll32.exe 84 PID 2100 wrote to memory of 4180 2100 rundll32.exe 87 PID 2100 wrote to memory of 4180 2100 rundll32.exe 87 PID 2100 wrote to memory of 4180 2100 rundll32.exe 87 PID 2100 wrote to memory of 5072 2100 rundll32.exe 88 PID 2100 wrote to memory of 5072 2100 rundll32.exe 88 PID 2100 wrote to memory of 5072 2100 rundll32.exe 88 PID 2100 wrote to memory of 2132 2100 rundll32.exe 89 PID 2100 wrote to memory of 2132 2100 rundll32.exe 89 PID 2100 wrote to memory of 2132 2100 rundll32.exe 89 PID 2100 wrote to memory of 3712 2100 rundll32.exe 90 PID 2100 wrote to memory of 3712 2100 rundll32.exe 90 PID 2100 wrote to memory of 3712 2100 rundll32.exe 90 PID 2100 wrote to memory of 440 2100 rundll32.exe 91 PID 2100 wrote to memory of 440 2100 rundll32.exe 91 PID 2100 wrote to memory of 440 2100 rundll32.exe 91 PID 2100 wrote to memory of 2632 2100 rundll32.exe 92 PID 2100 wrote to memory of 2632 2100 rundll32.exe 92 PID 2100 wrote to memory of 2632 2100 rundll32.exe 92 PID 2100 wrote to memory of 4064 2100 rundll32.exe 93 PID 2100 wrote to memory of 4064 2100 rundll32.exe 93 PID 2100 wrote to memory of 4064 2100 rundll32.exe 93 PID 2100 wrote to memory of 2440 2100 rundll32.exe 94 PID 2100 wrote to memory of 2440 2100 rundll32.exe 94 PID 2100 wrote to memory of 2440 2100 rundll32.exe 94
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f37c66290615525b1226b8189b8462135af1b1e88034a41ca47107498055b604N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f37c66290615525b1226b8189b8462135af1b1e88034a41ca47107498055b604N.dll,#12⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:60
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 22-d0-a6-d4-ae-f63⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4180
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 d9-69-fd-69-a1-b13⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:5072
-
-
C:\Windows\SysWOW64\arp.exearp -s 49.12.169.207 46-7a-29-b8-72-e13⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2132
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 75-64-cc-a0-b3-983⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3712
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 5e-d3-1e-3d-13-263⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:440
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 04-8a-d4-1d-1f-ad3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2632
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 5d-42-05-1d-79-343⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4064
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 ca-55-14-f1-d8-843⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 7043⤵
- Program crash
PID:1148
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2100 -ip 21001⤵PID:3068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD54fcd7574537cebec8e75b4e646996643
SHA1efa59bb9050fb656b90d5d40c942fb2a304f2a8b
SHA2568ea3b17e4b783ffc0bc387b81b823bf87af0d57da74541d88ba85314bb232a5d
SHA5127f1a7ef64d332a735db82506b47d84853af870785066d29ccaf4fdeab114079a9f0db400e01ba574776a0d652a248658fe1e8f9659cdced19ad6eea09644ea3e