Analysis
-
max time kernel
94s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 04:17
Behavioral task
behavioral1
Sample
e7bcb00840c4559fbb1844073a5ba71a72e6494cea5453f86b02a1a1515dd2e1.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e7bcb00840c4559fbb1844073a5ba71a72e6494cea5453f86b02a1a1515dd2e1.dll
Resource
win10v2004-20241007-en
General
-
Target
e7bcb00840c4559fbb1844073a5ba71a72e6494cea5453f86b02a1a1515dd2e1.dll
-
Size
80KB
-
MD5
f13535b31587cfacee97ae49a40a9382
-
SHA1
8fd8d8807031bca1bee177361adfcfcd4dee7e38
-
SHA256
e7bcb00840c4559fbb1844073a5ba71a72e6494cea5453f86b02a1a1515dd2e1
-
SHA512
4b269fd2bc4fad29317a7ced82e78b97d854ae48c61833b6c678914b357bdba67a767367260ee40e35b62932abbab2c568a38786fbd1dc70275c1cbc77522ba2
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEZZocyq:5dbwovEVyqgoZmZXWfIdQdRaefPlo
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
pid Process 1128 arp.exe 3592 arp.exe 1992 arp.exe 3120 arp.exe 4292 arp.exe 1796 arp.exe 4936 arp.exe 2884 arp.exe 3380 arp.exe -
resource yara_rule behavioral2/memory/448-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/448-2-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3124 448 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 448 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4584 wrote to memory of 448 4584 rundll32.exe 83 PID 4584 wrote to memory of 448 4584 rundll32.exe 83 PID 4584 wrote to memory of 448 4584 rundll32.exe 83 PID 448 wrote to memory of 1128 448 rundll32.exe 84 PID 448 wrote to memory of 1128 448 rundll32.exe 84 PID 448 wrote to memory of 1128 448 rundll32.exe 84 PID 448 wrote to memory of 3380 448 rundll32.exe 88 PID 448 wrote to memory of 3380 448 rundll32.exe 88 PID 448 wrote to memory of 3380 448 rundll32.exe 88 PID 448 wrote to memory of 2884 448 rundll32.exe 89 PID 448 wrote to memory of 2884 448 rundll32.exe 89 PID 448 wrote to memory of 2884 448 rundll32.exe 89 PID 448 wrote to memory of 1796 448 rundll32.exe 90 PID 448 wrote to memory of 1796 448 rundll32.exe 90 PID 448 wrote to memory of 1796 448 rundll32.exe 90 PID 448 wrote to memory of 4292 448 rundll32.exe 91 PID 448 wrote to memory of 4292 448 rundll32.exe 91 PID 448 wrote to memory of 4292 448 rundll32.exe 91 PID 448 wrote to memory of 4936 448 rundll32.exe 92 PID 448 wrote to memory of 4936 448 rundll32.exe 92 PID 448 wrote to memory of 4936 448 rundll32.exe 92 PID 448 wrote to memory of 3120 448 rundll32.exe 93 PID 448 wrote to memory of 3120 448 rundll32.exe 93 PID 448 wrote to memory of 3120 448 rundll32.exe 93 PID 448 wrote to memory of 1992 448 rundll32.exe 94 PID 448 wrote to memory of 1992 448 rundll32.exe 94 PID 448 wrote to memory of 1992 448 rundll32.exe 94 PID 448 wrote to memory of 3592 448 rundll32.exe 95 PID 448 wrote to memory of 3592 448 rundll32.exe 95 PID 448 wrote to memory of 3592 448 rundll32.exe 95
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e7bcb00840c4559fbb1844073a5ba71a72e6494cea5453f86b02a1a1515dd2e1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e7bcb00840c4559fbb1844073a5ba71a72e6494cea5453f86b02a1a1515dd2e1.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1128
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 05-2d-72-65-cb-2e3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3380
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 40-5f-55-37-15-543⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2884
-
-
C:\Windows\SysWOW64\arp.exearp -s 136.243.76.21 f1-ea-28-25-f7-113⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1796
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 6d-e1-47-9c-21-e43⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4292
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 04-9e-51-0b-6f-2f3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4936
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 4f-7e-bf-de-6e-db3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3120
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 76-48-3f-36-a2-1d3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1992
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 f2-6d-78-cf-5d-fe3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 7283⤵
- Program crash
PID:3124
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 448 -ip 4481⤵PID:2692