Analysis
-
max time kernel
95s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 04:40
Behavioral task
behavioral1
Sample
fed765bcb3c5b010e90ee520664fdd945e719e99c2bb7e17dc190cdbf530f2fb.dll
Resource
win7-20240903-en
windows7-x64
6 signatures
150 seconds
General
-
Target
fed765bcb3c5b010e90ee520664fdd945e719e99c2bb7e17dc190cdbf530f2fb.dll
-
Size
80KB
-
MD5
8860dde3ce682f86c8802b891cb54775
-
SHA1
e3909fd5eff9481a182d5679f7bb6b845da931bc
-
SHA256
fed765bcb3c5b010e90ee520664fdd945e719e99c2bb7e17dc190cdbf530f2fb
-
SHA512
c582de1c3f2cddcb4676c4b647cf63bd26e6973dd1ecfbb831c1acea2e521e2bbf28de863e0b265f2f689f8839cbbf7990776a61d8744c07a455f5b6a7ff093c
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEb+p3k:5dbwovEVyqgoZmZXWfIdQdRaefPM+pU
Malware Config
Signatures
-
pid Process 4864 arp.exe 3996 arp.exe 2232 arp.exe 1004 arp.exe 2592 arp.exe 2248 arp.exe 4092 arp.exe 748 arp.exe 3584 arp.exe -
resource yara_rule behavioral2/memory/1420-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/1420-2-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4972 1420 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1420 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 224 wrote to memory of 1420 224 rundll32.exe 82 PID 224 wrote to memory of 1420 224 rundll32.exe 82 PID 224 wrote to memory of 1420 224 rundll32.exe 82 PID 1420 wrote to memory of 2248 1420 rundll32.exe 84 PID 1420 wrote to memory of 2248 1420 rundll32.exe 84 PID 1420 wrote to memory of 2248 1420 rundll32.exe 84 PID 1420 wrote to memory of 2592 1420 rundll32.exe 87 PID 1420 wrote to memory of 2592 1420 rundll32.exe 87 PID 1420 wrote to memory of 2592 1420 rundll32.exe 87 PID 1420 wrote to memory of 1004 1420 rundll32.exe 88 PID 1420 wrote to memory of 1004 1420 rundll32.exe 88 PID 1420 wrote to memory of 1004 1420 rundll32.exe 88 PID 1420 wrote to memory of 3584 1420 rundll32.exe 89 PID 1420 wrote to memory of 3584 1420 rundll32.exe 89 PID 1420 wrote to memory of 3584 1420 rundll32.exe 89 PID 1420 wrote to memory of 4092 1420 rundll32.exe 90 PID 1420 wrote to memory of 4092 1420 rundll32.exe 90 PID 1420 wrote to memory of 4092 1420 rundll32.exe 90 PID 1420 wrote to memory of 748 1420 rundll32.exe 91 PID 1420 wrote to memory of 748 1420 rundll32.exe 91 PID 1420 wrote to memory of 748 1420 rundll32.exe 91 PID 1420 wrote to memory of 2232 1420 rundll32.exe 92 PID 1420 wrote to memory of 2232 1420 rundll32.exe 92 PID 1420 wrote to memory of 2232 1420 rundll32.exe 92 PID 1420 wrote to memory of 3996 1420 rundll32.exe 93 PID 1420 wrote to memory of 3996 1420 rundll32.exe 93 PID 1420 wrote to memory of 3996 1420 rundll32.exe 93 PID 1420 wrote to memory of 4864 1420 rundll32.exe 94 PID 1420 wrote to memory of 4864 1420 rundll32.exe 94 PID 1420 wrote to memory of 4864 1420 rundll32.exe 94
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fed765bcb3c5b010e90ee520664fdd945e719e99c2bb7e17dc190cdbf530f2fb.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fed765bcb3c5b010e90ee520664fdd945e719e99c2bb7e17dc190cdbf530f2fb.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2248
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 60-de-88-a0-37-ca3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2592
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 a2-13-84-60-c2-383⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1004
-
-
C:\Windows\SysWOW64\arp.exearp -s 136.243.76.170 85-2a-9f-0f-1c-ac3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3584
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 f5-79-69-d1-01-6d3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4092
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 67-17-e1-6c-7b-ea3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:748
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 03-a7-08-93-f5-913⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2232
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 b6-ce-90-87-dc-bb3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3996
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 fd-1d-b3-f1-2b-063⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 7043⤵
- Program crash
PID:4972
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1420 -ip 14201⤵PID:1132