Analysis
-
max time kernel
93s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 17:45
Behavioral task
behavioral1
Sample
ef695c91c264c91733d7836ce9552430960631e8d745e7f95c96492962e40f74.dll
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
ef695c91c264c91733d7836ce9552430960631e8d745e7f95c96492962e40f74.dll
Resource
win10v2004-20241007-en
General
-
Target
ef695c91c264c91733d7836ce9552430960631e8d745e7f95c96492962e40f74.dll
-
Size
80KB
-
MD5
605d917837db2d341cb4c021f821f97b
-
SHA1
7d6c1a9ef64152bee7dc77e9dd327fe884e818c7
-
SHA256
ef695c91c264c91733d7836ce9552430960631e8d745e7f95c96492962e40f74
-
SHA512
235800a8ae0f8a1ef7cd897175cd6d572aecac18a5dd84187ee7d8a6cec58eebad1509322bd078e0083373b3a368ba08aaae143d3d9ba6900bc038914b1dc32c
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEVo66:5dbwovEVyqgoZmZXWfIdQdRaefPrl
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
pid Process 4092 arp.exe 4536 arp.exe 3668 arp.exe 1372 arp.exe 2244 arp.exe 4828 arp.exe 4728 arp.exe 924 arp.exe 4124 arp.exe -
resource yara_rule behavioral2/memory/3908-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/3908-2-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1160 3908 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3908 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3932 wrote to memory of 3908 3932 rundll32.exe 83 PID 3932 wrote to memory of 3908 3932 rundll32.exe 83 PID 3932 wrote to memory of 3908 3932 rundll32.exe 83 PID 3908 wrote to memory of 924 3908 rundll32.exe 85 PID 3908 wrote to memory of 924 3908 rundll32.exe 85 PID 3908 wrote to memory of 924 3908 rundll32.exe 85 PID 3908 wrote to memory of 4536 3908 rundll32.exe 88 PID 3908 wrote to memory of 4536 3908 rundll32.exe 88 PID 3908 wrote to memory of 4536 3908 rundll32.exe 88 PID 3908 wrote to memory of 4092 3908 rundll32.exe 89 PID 3908 wrote to memory of 4092 3908 rundll32.exe 89 PID 3908 wrote to memory of 4092 3908 rundll32.exe 89 PID 3908 wrote to memory of 4728 3908 rundll32.exe 90 PID 3908 wrote to memory of 4728 3908 rundll32.exe 90 PID 3908 wrote to memory of 4728 3908 rundll32.exe 90 PID 3908 wrote to memory of 4828 3908 rundll32.exe 91 PID 3908 wrote to memory of 4828 3908 rundll32.exe 91 PID 3908 wrote to memory of 4828 3908 rundll32.exe 91 PID 3908 wrote to memory of 2244 3908 rundll32.exe 92 PID 3908 wrote to memory of 2244 3908 rundll32.exe 92 PID 3908 wrote to memory of 2244 3908 rundll32.exe 92 PID 3908 wrote to memory of 3668 3908 rundll32.exe 93 PID 3908 wrote to memory of 3668 3908 rundll32.exe 93 PID 3908 wrote to memory of 3668 3908 rundll32.exe 93 PID 3908 wrote to memory of 1372 3908 rundll32.exe 94 PID 3908 wrote to memory of 1372 3908 rundll32.exe 94 PID 3908 wrote to memory of 1372 3908 rundll32.exe 94 PID 3908 wrote to memory of 4124 3908 rundll32.exe 95 PID 3908 wrote to memory of 4124 3908 rundll32.exe 95 PID 3908 wrote to memory of 4124 3908 rundll32.exe 95
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ef695c91c264c91733d7836ce9552430960631e8d745e7f95c96492962e40f74.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ef695c91c264c91733d7836ce9552430960631e8d745e7f95c96492962e40f74.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:924
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 89-9b-cd-d7-a9-e53⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4536
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 04-3f-50-23-b9-6a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4092
-
-
C:\Windows\SysWOW64\arp.exearp -s 136.243.76.173 20-e0-fa-aa-bb-2c3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4728
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 17-f7-af-73-3a-3e3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4828
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 ad-82-3e-b9-f8-fb3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2244
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 74-ba-a9-59-99-f93⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3668
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 7b-64-df-bc-32-b03⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1372
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 98-2e-6d-18-53-f03⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3908 -s 7043⤵
- Program crash
PID:1160
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3908 -ip 39081⤵PID:4036