Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 01:16
Behavioral task
behavioral1
Sample
a3da8aaaf439be346fdb26bb918efaedef2955be88bd4f53860c2a4812fbb5d1.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a3da8aaaf439be346fdb26bb918efaedef2955be88bd4f53860c2a4812fbb5d1.dll
Resource
win10v2004-20241007-en
General
-
Target
a3da8aaaf439be346fdb26bb918efaedef2955be88bd4f53860c2a4812fbb5d1.dll
-
Size
80KB
-
MD5
bf937b141d9b925050d8dd6c85fbc3a3
-
SHA1
531cf97ebbe39fd2dcfc6d6090fd9fbb771b3f84
-
SHA256
a3da8aaaf439be346fdb26bb918efaedef2955be88bd4f53860c2a4812fbb5d1
-
SHA512
f4bd0793fa8b2d1e60403fd7b973bce457c6e0b87c472e5423fccb22d0c45e886915db38aab88cc42c02a58951efa36e37b0c378639af5b6ac974dd39a449d5a
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEg6ZV:5dbwovEVyqgoZmZXWfIdQdRaefP2
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
pid Process 3900 arp.exe 3692 arp.exe 5036 arp.exe 4724 arp.exe 5024 arp.exe 4900 arp.exe 4984 arp.exe 1924 arp.exe 1268 arp.exe -
resource yara_rule behavioral2/memory/1880-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/1880-2-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4152 1880 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1880 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1224 wrote to memory of 1880 1224 rundll32.exe 83 PID 1224 wrote to memory of 1880 1224 rundll32.exe 83 PID 1224 wrote to memory of 1880 1224 rundll32.exe 83 PID 1880 wrote to memory of 4984 1880 rundll32.exe 84 PID 1880 wrote to memory of 4984 1880 rundll32.exe 84 PID 1880 wrote to memory of 4984 1880 rundll32.exe 84 PID 1880 wrote to memory of 3900 1880 rundll32.exe 88 PID 1880 wrote to memory of 3900 1880 rundll32.exe 88 PID 1880 wrote to memory of 3900 1880 rundll32.exe 88 PID 1880 wrote to memory of 4724 1880 rundll32.exe 89 PID 1880 wrote to memory of 4724 1880 rundll32.exe 89 PID 1880 wrote to memory of 4724 1880 rundll32.exe 89 PID 1880 wrote to memory of 5036 1880 rundll32.exe 90 PID 1880 wrote to memory of 5036 1880 rundll32.exe 90 PID 1880 wrote to memory of 5036 1880 rundll32.exe 90 PID 1880 wrote to memory of 4900 1880 rundll32.exe 91 PID 1880 wrote to memory of 4900 1880 rundll32.exe 91 PID 1880 wrote to memory of 4900 1880 rundll32.exe 91 PID 1880 wrote to memory of 1924 1880 rundll32.exe 92 PID 1880 wrote to memory of 1924 1880 rundll32.exe 92 PID 1880 wrote to memory of 1924 1880 rundll32.exe 92 PID 1880 wrote to memory of 3692 1880 rundll32.exe 95 PID 1880 wrote to memory of 3692 1880 rundll32.exe 95 PID 1880 wrote to memory of 3692 1880 rundll32.exe 95 PID 1880 wrote to memory of 5024 1880 rundll32.exe 96 PID 1880 wrote to memory of 5024 1880 rundll32.exe 96 PID 1880 wrote to memory of 5024 1880 rundll32.exe 96 PID 1880 wrote to memory of 1268 1880 rundll32.exe 97 PID 1880 wrote to memory of 1268 1880 rundll32.exe 97 PID 1880 wrote to memory of 1268 1880 rundll32.exe 97
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a3da8aaaf439be346fdb26bb918efaedef2955be88bd4f53860c2a4812fbb5d1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a3da8aaaf439be346fdb26bb918efaedef2955be88bd4f53860c2a4812fbb5d1.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4984
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 f3-53-2d-53-5c-053⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3900
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 cc-52-03-32-48-4b3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4724
-
-
C:\Windows\SysWOW64\arp.exearp -s 136.243.76.21 9b-0b-27-1f-3f-173⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:5036
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 0f-e0-5d-51-06-a63⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4900
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 14-94-d3-ce-77-493⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1924
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 d1-c3-71-79-fe-bc3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3692
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 65-7c-d3-91-ee-873⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:5024
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 d0-75-ba-66-c3-6d3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1880 -s 7163⤵
- Program crash
PID:4152
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1880 -ip 18801⤵PID:860