Analysis
-
max time kernel
90s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 04:49
Behavioral task
behavioral1
Sample
fed765bcb3c5b010e90ee520664fdd945e719e99c2bb7e17dc190cdbf530f2fb.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fed765bcb3c5b010e90ee520664fdd945e719e99c2bb7e17dc190cdbf530f2fb.dll
Resource
win10v2004-20241007-en
General
-
Target
fed765bcb3c5b010e90ee520664fdd945e719e99c2bb7e17dc190cdbf530f2fb.dll
-
Size
80KB
-
MD5
8860dde3ce682f86c8802b891cb54775
-
SHA1
e3909fd5eff9481a182d5679f7bb6b845da931bc
-
SHA256
fed765bcb3c5b010e90ee520664fdd945e719e99c2bb7e17dc190cdbf530f2fb
-
SHA512
c582de1c3f2cddcb4676c4b647cf63bd26e6973dd1ecfbb831c1acea2e521e2bbf28de863e0b265f2f689f8839cbbf7990776a61d8744c07a455f5b6a7ff093c
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEb+p3k:5dbwovEVyqgoZmZXWfIdQdRaefPM+pU
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
pid Process 744 arp.exe 3796 arp.exe 4144 arp.exe 4892 arp.exe 64 arp.exe 2032 arp.exe 880 arp.exe 1824 arp.exe 4504 arp.exe -
resource yara_rule behavioral2/memory/772-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/772-2-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1356 772 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 772 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 516 wrote to memory of 772 516 rundll32.exe 84 PID 516 wrote to memory of 772 516 rundll32.exe 84 PID 516 wrote to memory of 772 516 rundll32.exe 84 PID 772 wrote to memory of 2032 772 rundll32.exe 86 PID 772 wrote to memory of 2032 772 rundll32.exe 86 PID 772 wrote to memory of 2032 772 rundll32.exe 86 PID 772 wrote to memory of 4504 772 rundll32.exe 89 PID 772 wrote to memory of 4504 772 rundll32.exe 89 PID 772 wrote to memory of 4504 772 rundll32.exe 89 PID 772 wrote to memory of 64 772 rundll32.exe 90 PID 772 wrote to memory of 64 772 rundll32.exe 90 PID 772 wrote to memory of 64 772 rundll32.exe 90 PID 772 wrote to memory of 1824 772 rundll32.exe 91 PID 772 wrote to memory of 1824 772 rundll32.exe 91 PID 772 wrote to memory of 1824 772 rundll32.exe 91 PID 772 wrote to memory of 4892 772 rundll32.exe 92 PID 772 wrote to memory of 4892 772 rundll32.exe 92 PID 772 wrote to memory of 4892 772 rundll32.exe 92 PID 772 wrote to memory of 4144 772 rundll32.exe 93 PID 772 wrote to memory of 4144 772 rundll32.exe 93 PID 772 wrote to memory of 4144 772 rundll32.exe 93 PID 772 wrote to memory of 3796 772 rundll32.exe 94 PID 772 wrote to memory of 3796 772 rundll32.exe 94 PID 772 wrote to memory of 3796 772 rundll32.exe 94 PID 772 wrote to memory of 744 772 rundll32.exe 95 PID 772 wrote to memory of 744 772 rundll32.exe 95 PID 772 wrote to memory of 744 772 rundll32.exe 95 PID 772 wrote to memory of 880 772 rundll32.exe 96 PID 772 wrote to memory of 880 772 rundll32.exe 96 PID 772 wrote to memory of 880 772 rundll32.exe 96
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fed765bcb3c5b010e90ee520664fdd945e719e99c2bb7e17dc190cdbf530f2fb.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fed765bcb3c5b010e90ee520664fdd945e719e99c2bb7e17dc190cdbf530f2fb.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2032
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 72-fa-93-18-e9-ca3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4504
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 39-26-31-51-d9-753⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:64
-
-
C:\Windows\SysWOW64\arp.exearp -s 136.243.76.170 bb-14-8f-67-59-1a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1824
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 64-e9-dc-18-57-933⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4892
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 31-b6-d6-90-4b-fb3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4144
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 43-c5-2a-c4-46-d93⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3796
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 a5-80-02-c7-53-cc3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:744
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 cd-76-81-c5-51-ca3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 772 -s 7043⤵
- Program crash
PID:1356
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 772 -ip 7721⤵PID:2044