Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 22:31
Behavioral task
behavioral1
Sample
19d5803ab5a3af8e0246f74268e3ad2fc7dabdb2b48b91fc2aba4d1ecf2e2a3fN.dll
Resource
win7-20240903-en
windows7-x64
6 signatures
120 seconds
General
-
Target
19d5803ab5a3af8e0246f74268e3ad2fc7dabdb2b48b91fc2aba4d1ecf2e2a3fN.dll
-
Size
80KB
-
MD5
c0f115ec606e1a80603d17e7562749c0
-
SHA1
f0b2daa2fe3ae494b8fba9d560b7d72217df5800
-
SHA256
19d5803ab5a3af8e0246f74268e3ad2fc7dabdb2b48b91fc2aba4d1ecf2e2a3f
-
SHA512
b19752a68389b01eca9370c294df4e6a2cb79953268c1c51fbe61cfb5cf43a30af9b4267b8bc14619d05323de7ecb0ab67aee37bf9a47ce1f966a6daaa5dab93
-
SSDEEP
1536:uIcs6msUvrh8ErMInQ+4cw9NVWfjaRkE4LEl8B60Y2lfxxHZPEmywZqJ:dcs6v68Erj3w9zWf+SEFuk0/pfPPywZg
Malware Config
Signatures
-
pid Process 2936 arp.exe 2856 arp.exe 2620 arp.exe 2632 arp.exe 2056 arp.exe 400 arp.exe 2596 arp.exe 3048 arp.exe 2136 arp.exe -
resource yara_rule behavioral1/memory/2424-1-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2424-3-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2924 2424 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2424 rundll32.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2424 1684 rundll32.exe 28 PID 1684 wrote to memory of 2424 1684 rundll32.exe 28 PID 1684 wrote to memory of 2424 1684 rundll32.exe 28 PID 1684 wrote to memory of 2424 1684 rundll32.exe 28 PID 1684 wrote to memory of 2424 1684 rundll32.exe 28 PID 1684 wrote to memory of 2424 1684 rundll32.exe 28 PID 1684 wrote to memory of 2424 1684 rundll32.exe 28 PID 2424 wrote to memory of 2936 2424 rundll32.exe 30 PID 2424 wrote to memory of 2936 2424 rundll32.exe 30 PID 2424 wrote to memory of 2936 2424 rundll32.exe 30 PID 2424 wrote to memory of 2936 2424 rundll32.exe 30 PID 2424 wrote to memory of 2924 2424 rundll32.exe 29 PID 2424 wrote to memory of 2924 2424 rundll32.exe 29 PID 2424 wrote to memory of 2924 2424 rundll32.exe 29 PID 2424 wrote to memory of 2924 2424 rundll32.exe 29 PID 2424 wrote to memory of 2856 2424 rundll32.exe 32 PID 2424 wrote to memory of 2856 2424 rundll32.exe 32 PID 2424 wrote to memory of 2856 2424 rundll32.exe 32 PID 2424 wrote to memory of 2856 2424 rundll32.exe 32 PID 2424 wrote to memory of 400 2424 rundll32.exe 33 PID 2424 wrote to memory of 400 2424 rundll32.exe 33 PID 2424 wrote to memory of 400 2424 rundll32.exe 33 PID 2424 wrote to memory of 400 2424 rundll32.exe 33 PID 2424 wrote to memory of 2136 2424 rundll32.exe 34 PID 2424 wrote to memory of 2136 2424 rundll32.exe 34 PID 2424 wrote to memory of 2136 2424 rundll32.exe 34 PID 2424 wrote to memory of 2136 2424 rundll32.exe 34 PID 2424 wrote to memory of 3048 2424 rundll32.exe 35 PID 2424 wrote to memory of 3048 2424 rundll32.exe 35 PID 2424 wrote to memory of 3048 2424 rundll32.exe 35 PID 2424 wrote to memory of 3048 2424 rundll32.exe 35 PID 2424 wrote to memory of 2056 2424 rundll32.exe 36 PID 2424 wrote to memory of 2056 2424 rundll32.exe 36 PID 2424 wrote to memory of 2056 2424 rundll32.exe 36 PID 2424 wrote to memory of 2056 2424 rundll32.exe 36 PID 2424 wrote to memory of 2632 2424 rundll32.exe 37 PID 2424 wrote to memory of 2632 2424 rundll32.exe 37 PID 2424 wrote to memory of 2632 2424 rundll32.exe 37 PID 2424 wrote to memory of 2632 2424 rundll32.exe 37 PID 2424 wrote to memory of 2620 2424 rundll32.exe 38 PID 2424 wrote to memory of 2620 2424 rundll32.exe 38 PID 2424 wrote to memory of 2620 2424 rundll32.exe 38 PID 2424 wrote to memory of 2620 2424 rundll32.exe 38 PID 2424 wrote to memory of 2596 2424 rundll32.exe 39 PID 2424 wrote to memory of 2596 2424 rundll32.exe 39 PID 2424 wrote to memory of 2596 2424 rundll32.exe 39 PID 2424 wrote to memory of 2596 2424 rundll32.exe 39
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\19d5803ab5a3af8e0246f74268e3ad2fc7dabdb2b48b91fc2aba4d1ecf2e2a3fN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\19d5803ab5a3af8e0246f74268e3ad2fc7dabdb2b48b91fc2aba4d1ecf2e2a3fN.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 3363⤵
- Program crash
PID:2924
-
-
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2936
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 c2-f9-25-2e-c9-f13⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2856
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 c0-3e-66-5b-f5-4a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:400
-
-
C:\Windows\SysWOW64\arp.exearp -s 37.27.61.180 b7-41-61-db-f3-493⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2136
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 22-25-d6-29-3c-c43⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3048
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 21-88-75-a2-48-9d3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2056
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 58-5e-15-f1-8c-8e3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2632
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 11-c2-48-5d-3b-183⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2620
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 d5-3d-c1-d1-6b-a13⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2596
-
-