Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 04:12
Behavioral task
behavioral1
Sample
e7bcb00840c4559fbb1844073a5ba71a72e6494cea5453f86b02a1a1515dd2e1.dll
Resource
win7-20240903-en
windows7-x64
6 signatures
150 seconds
General
-
Target
e7bcb00840c4559fbb1844073a5ba71a72e6494cea5453f86b02a1a1515dd2e1.dll
-
Size
80KB
-
MD5
f13535b31587cfacee97ae49a40a9382
-
SHA1
8fd8d8807031bca1bee177361adfcfcd4dee7e38
-
SHA256
e7bcb00840c4559fbb1844073a5ba71a72e6494cea5453f86b02a1a1515dd2e1
-
SHA512
4b269fd2bc4fad29317a7ced82e78b97d854ae48c61833b6c678914b357bdba67a767367260ee40e35b62932abbab2c568a38786fbd1dc70275c1cbc77522ba2
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEZZocyq:5dbwovEVyqgoZmZXWfIdQdRaefPlo
Malware Config
Signatures
-
pid Process 1544 arp.exe 2532 arp.exe 4868 arp.exe 3688 arp.exe 1840 arp.exe 2796 arp.exe 4060 arp.exe 4924 arp.exe 4920 arp.exe -
resource yara_rule behavioral2/memory/1148-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/1148-2-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1748 1148 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1148 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2300 wrote to memory of 1148 2300 rundll32.exe 83 PID 2300 wrote to memory of 1148 2300 rundll32.exe 83 PID 2300 wrote to memory of 1148 2300 rundll32.exe 83 PID 1148 wrote to memory of 1544 1148 rundll32.exe 85 PID 1148 wrote to memory of 1544 1148 rundll32.exe 85 PID 1148 wrote to memory of 1544 1148 rundll32.exe 85 PID 1148 wrote to memory of 2796 1148 rundll32.exe 88 PID 1148 wrote to memory of 2796 1148 rundll32.exe 88 PID 1148 wrote to memory of 2796 1148 rundll32.exe 88 PID 1148 wrote to memory of 1840 1148 rundll32.exe 89 PID 1148 wrote to memory of 1840 1148 rundll32.exe 89 PID 1148 wrote to memory of 1840 1148 rundll32.exe 89 PID 1148 wrote to memory of 3688 1148 rundll32.exe 90 PID 1148 wrote to memory of 3688 1148 rundll32.exe 90 PID 1148 wrote to memory of 3688 1148 rundll32.exe 90 PID 1148 wrote to memory of 4920 1148 rundll32.exe 91 PID 1148 wrote to memory of 4920 1148 rundll32.exe 91 PID 1148 wrote to memory of 4920 1148 rundll32.exe 91 PID 1148 wrote to memory of 4924 1148 rundll32.exe 92 PID 1148 wrote to memory of 4924 1148 rundll32.exe 92 PID 1148 wrote to memory of 4924 1148 rundll32.exe 92 PID 1148 wrote to memory of 4868 1148 rundll32.exe 93 PID 1148 wrote to memory of 4868 1148 rundll32.exe 93 PID 1148 wrote to memory of 4868 1148 rundll32.exe 93 PID 1148 wrote to memory of 4060 1148 rundll32.exe 94 PID 1148 wrote to memory of 4060 1148 rundll32.exe 94 PID 1148 wrote to memory of 4060 1148 rundll32.exe 94 PID 1148 wrote to memory of 2532 1148 rundll32.exe 95 PID 1148 wrote to memory of 2532 1148 rundll32.exe 95 PID 1148 wrote to memory of 2532 1148 rundll32.exe 95
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e7bcb00840c4559fbb1844073a5ba71a72e6494cea5453f86b02a1a1515dd2e1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e7bcb00840c4559fbb1844073a5ba71a72e6494cea5453f86b02a1a1515dd2e1.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1544
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 09-97-ad-2d-42-443⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2796
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 93-4e-76-d6-0c-d13⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1840
-
-
C:\Windows\SysWOW64\arp.exearp -s 136.243.76.173 ee-9e-a4-9c-b8-8c3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3688
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 f3-42-a5-23-e9-f53⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4920
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 c9-88-21-d3-9b-753⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4924
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 80-fa-a1-7b-c4-523⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4868
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 d8-92-f6-04-95-6d3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4060
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 fb-b0-68-86-9f-623⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 7123⤵
- Program crash
PID:1748
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1148 -ip 11481⤵PID:3900