Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-12-2024 01:16
Behavioral task
behavioral1
Sample
a3da8aaaf439be346fdb26bb918efaedef2955be88bd4f53860c2a4812fbb5d1.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a3da8aaaf439be346fdb26bb918efaedef2955be88bd4f53860c2a4812fbb5d1.dll
Resource
win10v2004-20241007-en
General
-
Target
a3da8aaaf439be346fdb26bb918efaedef2955be88bd4f53860c2a4812fbb5d1.dll
-
Size
80KB
-
MD5
bf937b141d9b925050d8dd6c85fbc3a3
-
SHA1
531cf97ebbe39fd2dcfc6d6090fd9fbb771b3f84
-
SHA256
a3da8aaaf439be346fdb26bb918efaedef2955be88bd4f53860c2a4812fbb5d1
-
SHA512
f4bd0793fa8b2d1e60403fd7b973bce457c6e0b87c472e5423fccb22d0c45e886915db38aab88cc42c02a58951efa36e37b0c378639af5b6ac974dd39a449d5a
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEg6ZV:5dbwovEVyqgoZmZXWfIdQdRaefP2
Malware Config
Signatures
-
pid Process 596 arp.exe 2232 arp.exe 3016 arp.exe 576 arp.exe -
resource yara_rule behavioral1/memory/2116-2-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2116-1-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2116-4-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 996 2116 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2116 rundll32.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2116 3008 rundll32.exe 30 PID 3008 wrote to memory of 2116 3008 rundll32.exe 30 PID 3008 wrote to memory of 2116 3008 rundll32.exe 30 PID 3008 wrote to memory of 2116 3008 rundll32.exe 30 PID 3008 wrote to memory of 2116 3008 rundll32.exe 30 PID 3008 wrote to memory of 2116 3008 rundll32.exe 30 PID 3008 wrote to memory of 2116 3008 rundll32.exe 30 PID 2116 wrote to memory of 996 2116 rundll32.exe 31 PID 2116 wrote to memory of 996 2116 rundll32.exe 31 PID 2116 wrote to memory of 996 2116 rundll32.exe 31 PID 2116 wrote to memory of 996 2116 rundll32.exe 31 PID 2116 wrote to memory of 596 2116 rundll32.exe 32 PID 2116 wrote to memory of 596 2116 rundll32.exe 32 PID 2116 wrote to memory of 596 2116 rundll32.exe 32 PID 2116 wrote to memory of 596 2116 rundll32.exe 32 PID 2116 wrote to memory of 2232 2116 rundll32.exe 35 PID 2116 wrote to memory of 2232 2116 rundll32.exe 35 PID 2116 wrote to memory of 2232 2116 rundll32.exe 35 PID 2116 wrote to memory of 2232 2116 rundll32.exe 35 PID 2116 wrote to memory of 3016 2116 rundll32.exe 36 PID 2116 wrote to memory of 3016 2116 rundll32.exe 36 PID 2116 wrote to memory of 3016 2116 rundll32.exe 36 PID 2116 wrote to memory of 3016 2116 rundll32.exe 36
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a3da8aaaf439be346fdb26bb918efaedef2955be88bd4f53860c2a4812fbb5d1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a3da8aaaf439be346fdb26bb918efaedef2955be88bd4f53860c2a4812fbb5d1.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2116 -s 2763⤵
- Program crash
PID:996
-
-
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:596
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 f3-53-2d-53-5c-053⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2232
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 cc-52-03-32-48-4b3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3016
-
-
C:\Windows\SysWOW64\arp.exearp -s 37.27.61.183 9b-0b-27-1f-3f-173⤵
- Network Service Discovery
PID:576
-
-