Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 02:50
Behavioral task
behavioral1
Sample
a7f5e9de3b8db2f681dc9f17e72d765bb7d16a0933d28f732665df316f2da370N.dll
Resource
win7-20241023-en
windows7-x64
7 signatures
120 seconds
General
-
Target
a7f5e9de3b8db2f681dc9f17e72d765bb7d16a0933d28f732665df316f2da370N.dll
-
Size
80KB
-
MD5
900ec7504b8a66462c35eec7eb060f70
-
SHA1
379a7c8910d4480b0f1e93ef7473bf927eb31b2e
-
SHA256
a7f5e9de3b8db2f681dc9f17e72d765bb7d16a0933d28f732665df316f2da370
-
SHA512
1cfdc4faf6904d6a2082aae377a578f18ac870c163adcfd419f585c4ce895aee8b1d0e7edf40a0962d6aeffcf684d68f3ced896599f1281842760b07f0fe1df2
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPE/Rutge5:5dbwovEVyqgoZmZXWfIdQdRaefPOR7e5
Malware Config
Signatures
-
pid Process 4768 arp.exe 2376 arp.exe 2004 arp.exe 2604 arp.exe 536 arp.exe 3692 arp.exe 3780 arp.exe 4996 arp.exe 116 arp.exe -
resource yara_rule behavioral2/memory/928-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/928-2-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1916 928 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 928 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2276 wrote to memory of 928 2276 rundll32.exe 83 PID 2276 wrote to memory of 928 2276 rundll32.exe 83 PID 2276 wrote to memory of 928 2276 rundll32.exe 83 PID 928 wrote to memory of 4996 928 rundll32.exe 85 PID 928 wrote to memory of 4996 928 rundll32.exe 85 PID 928 wrote to memory of 4996 928 rundll32.exe 85 PID 928 wrote to memory of 3780 928 rundll32.exe 88 PID 928 wrote to memory of 3780 928 rundll32.exe 88 PID 928 wrote to memory of 3780 928 rundll32.exe 88 PID 928 wrote to memory of 2376 928 rundll32.exe 89 PID 928 wrote to memory of 2376 928 rundll32.exe 89 PID 928 wrote to memory of 2376 928 rundll32.exe 89 PID 928 wrote to memory of 4768 928 rundll32.exe 90 PID 928 wrote to memory of 4768 928 rundll32.exe 90 PID 928 wrote to memory of 4768 928 rundll32.exe 90 PID 928 wrote to memory of 3692 928 rundll32.exe 91 PID 928 wrote to memory of 3692 928 rundll32.exe 91 PID 928 wrote to memory of 3692 928 rundll32.exe 91 PID 928 wrote to memory of 2604 928 rundll32.exe 92 PID 928 wrote to memory of 2604 928 rundll32.exe 92 PID 928 wrote to memory of 2604 928 rundll32.exe 92 PID 928 wrote to memory of 536 928 rundll32.exe 93 PID 928 wrote to memory of 536 928 rundll32.exe 93 PID 928 wrote to memory of 536 928 rundll32.exe 93 PID 928 wrote to memory of 2004 928 rundll32.exe 94 PID 928 wrote to memory of 2004 928 rundll32.exe 94 PID 928 wrote to memory of 2004 928 rundll32.exe 94 PID 928 wrote to memory of 116 928 rundll32.exe 95 PID 928 wrote to memory of 116 928 rundll32.exe 95 PID 928 wrote to memory of 116 928 rundll32.exe 95
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a7f5e9de3b8db2f681dc9f17e72d765bb7d16a0933d28f732665df316f2da370N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a7f5e9de3b8db2f681dc9f17e72d765bb7d16a0933d28f732665df316f2da370N.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4996
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 ac-4e-7d-ce-71-c43⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3780
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 00-15-41-79-ad-cd3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2376
-
-
C:\Windows\SysWOW64\arp.exearp -s 49.12.169.208 8a-66-dc-4c-28-353⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4768
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 ef-00-82-f3-4d-863⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3692
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 c1-06-0f-11-26-193⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2604
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 04-4c-63-a3-0d-5d3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:536
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 84-17-ad-bb-9c-b13⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2004
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 1e-d4-fe-7a-81-f13⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 928 -s 7123⤵
- Program crash
PID:1916
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 928 -ip 9281⤵PID:2076