Analysis
-
max time kernel
119s -
max time network
72s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 13:38
Behavioral task
behavioral1
Sample
3a17bd7ee4d67ecefd27f8e0fbd9364f232420f0024320c704437e33bc17fe6fN.dll
Resource
win7-20241023-en
General
-
Target
3a17bd7ee4d67ecefd27f8e0fbd9364f232420f0024320c704437e33bc17fe6fN.dll
-
Size
80KB
-
MD5
7695b08a7d8f2b7de4b5f5fc4907ac60
-
SHA1
64d4cf2596f0b2237b773535e1c0fd7f8c14fd20
-
SHA256
3a17bd7ee4d67ecefd27f8e0fbd9364f232420f0024320c704437e33bc17fe6f
-
SHA512
847b12fb6d24b065d23ae4c5dca806db7bdc88f11d4490b7813426087d345835f693cf775d5ad228abeccce3d2f10850db6773292366724193c489450af89b26
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEVo6+:5dbwovEVyqgoZmZXWfIdQdRaefPrf
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 4 2076 rundll32.exe 8 2076 rundll32.exe 9 2076 rundll32.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: rundll32.exe -
pid Process 2680 arp.exe 2756 arp.exe 2320 arp.exe 828 arp.exe 2904 arp.exe 2628 arp.exe 2640 arp.exe 2728 arp.exe 2768 arp.exe -
resource yara_rule behavioral1/memory/2076-1-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2076-4-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2076-5-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2076-6-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2076-13-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2076-14-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2076-20-0x0000000010000000-0x0000000010033000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2076 rundll32.exe 2076 rundll32.exe 2076 rundll32.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 472 Process not Found 472 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2076 rundll32.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2076 2884 rundll32.exe 28 PID 2884 wrote to memory of 2076 2884 rundll32.exe 28 PID 2884 wrote to memory of 2076 2884 rundll32.exe 28 PID 2884 wrote to memory of 2076 2884 rundll32.exe 28 PID 2884 wrote to memory of 2076 2884 rundll32.exe 28 PID 2884 wrote to memory of 2076 2884 rundll32.exe 28 PID 2884 wrote to memory of 2076 2884 rundll32.exe 28 PID 2076 wrote to memory of 828 2076 rundll32.exe 29 PID 2076 wrote to memory of 828 2076 rundll32.exe 29 PID 2076 wrote to memory of 828 2076 rundll32.exe 29 PID 2076 wrote to memory of 828 2076 rundll32.exe 29 PID 2076 wrote to memory of 2680 2076 rundll32.exe 31 PID 2076 wrote to memory of 2680 2076 rundll32.exe 31 PID 2076 wrote to memory of 2680 2076 rundll32.exe 31 PID 2076 wrote to memory of 2680 2076 rundll32.exe 31 PID 2076 wrote to memory of 2756 2076 rundll32.exe 32 PID 2076 wrote to memory of 2756 2076 rundll32.exe 32 PID 2076 wrote to memory of 2756 2076 rundll32.exe 32 PID 2076 wrote to memory of 2756 2076 rundll32.exe 32 PID 2076 wrote to memory of 2768 2076 rundll32.exe 34 PID 2076 wrote to memory of 2768 2076 rundll32.exe 34 PID 2076 wrote to memory of 2768 2076 rundll32.exe 34 PID 2076 wrote to memory of 2768 2076 rundll32.exe 34 PID 2076 wrote to memory of 2904 2076 rundll32.exe 36 PID 2076 wrote to memory of 2904 2076 rundll32.exe 36 PID 2076 wrote to memory of 2904 2076 rundll32.exe 36 PID 2076 wrote to memory of 2904 2076 rundll32.exe 36 PID 2076 wrote to memory of 2628 2076 rundll32.exe 38 PID 2076 wrote to memory of 2628 2076 rundll32.exe 38 PID 2076 wrote to memory of 2628 2076 rundll32.exe 38 PID 2076 wrote to memory of 2628 2076 rundll32.exe 38 PID 2076 wrote to memory of 2320 2076 rundll32.exe 40 PID 2076 wrote to memory of 2320 2076 rundll32.exe 40 PID 2076 wrote to memory of 2320 2076 rundll32.exe 40 PID 2076 wrote to memory of 2320 2076 rundll32.exe 40 PID 2076 wrote to memory of 2640 2076 rundll32.exe 42 PID 2076 wrote to memory of 2640 2076 rundll32.exe 42 PID 2076 wrote to memory of 2640 2076 rundll32.exe 42 PID 2076 wrote to memory of 2640 2076 rundll32.exe 42 PID 2076 wrote to memory of 2728 2076 rundll32.exe 44 PID 2076 wrote to memory of 2728 2076 rundll32.exe 44 PID 2076 wrote to memory of 2728 2076 rundll32.exe 44 PID 2076 wrote to memory of 2728 2076 rundll32.exe 44 PID 2076 wrote to memory of 1920 2076 rundll32.exe 47 PID 2076 wrote to memory of 1920 2076 rundll32.exe 47 PID 2076 wrote to memory of 1920 2076 rundll32.exe 47 PID 2076 wrote to memory of 1920 2076 rundll32.exe 47
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3a17bd7ee4d67ecefd27f8e0fbd9364f232420f0024320c704437e33bc17fe6fN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3a17bd7ee4d67ecefd27f8e0fbd9364f232420f0024320c704437e33bc17fe6fN.dll,#12⤵
- Blocklisted process makes network request
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:828
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 89-06-fe-37-93-f53⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2680
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 e2-60-89-b0-3e-1d3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2756
-
-
C:\Windows\SysWOW64\arp.exearp -s 37.27.61.182 e7-7a-11-a5-cf-ba3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2768
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 7c-cb-63-9a-d8-953⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2904
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 e7-9c-0f-f0-cf-1c3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2628
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 7a-a0-07-d5-42-243⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2320
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 77-d8-26-9a-e2-673⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2640
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 70-ea-41-d8-4f-693⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2728
-
-
C:\Windows\SysWOW64\arp.exearp -d3⤵
- System Location Discovery: System Language Discovery
PID:1920
-
-