Analysis
-
max time kernel
96s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 22:31
Behavioral task
behavioral1
Sample
19d5803ab5a3af8e0246f74268e3ad2fc7dabdb2b48b91fc2aba4d1ecf2e2a3fN.dll
Resource
win7-20240903-en
windows7-x64
6 signatures
120 seconds
General
-
Target
19d5803ab5a3af8e0246f74268e3ad2fc7dabdb2b48b91fc2aba4d1ecf2e2a3fN.dll
-
Size
80KB
-
MD5
c0f115ec606e1a80603d17e7562749c0
-
SHA1
f0b2daa2fe3ae494b8fba9d560b7d72217df5800
-
SHA256
19d5803ab5a3af8e0246f74268e3ad2fc7dabdb2b48b91fc2aba4d1ecf2e2a3f
-
SHA512
b19752a68389b01eca9370c294df4e6a2cb79953268c1c51fbe61cfb5cf43a30af9b4267b8bc14619d05323de7ecb0ab67aee37bf9a47ce1f966a6daaa5dab93
-
SSDEEP
1536:uIcs6msUvrh8ErMInQ+4cw9NVWfjaRkE4LEl8B60Y2lfxxHZPEmywZqJ:dcs6v68Erj3w9zWf+SEFuk0/pfPPywZg
Malware Config
Signatures
-
pid Process 3432 arp.exe 3760 arp.exe 4660 arp.exe 3548 arp.exe 4420 arp.exe 3520 arp.exe 4672 arp.exe 60 arp.exe 2348 arp.exe -
resource yara_rule behavioral2/memory/2124-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/2124-2-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2892 2124 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2124 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1032 wrote to memory of 2124 1032 rundll32.exe 82 PID 1032 wrote to memory of 2124 1032 rundll32.exe 82 PID 1032 wrote to memory of 2124 1032 rundll32.exe 82 PID 2124 wrote to memory of 4672 2124 rundll32.exe 84 PID 2124 wrote to memory of 4672 2124 rundll32.exe 84 PID 2124 wrote to memory of 4672 2124 rundll32.exe 84 PID 2124 wrote to memory of 60 2124 rundll32.exe 87 PID 2124 wrote to memory of 60 2124 rundll32.exe 87 PID 2124 wrote to memory of 60 2124 rundll32.exe 87 PID 2124 wrote to memory of 3520 2124 rundll32.exe 88 PID 2124 wrote to memory of 3520 2124 rundll32.exe 88 PID 2124 wrote to memory of 3520 2124 rundll32.exe 88 PID 2124 wrote to memory of 4420 2124 rundll32.exe 89 PID 2124 wrote to memory of 4420 2124 rundll32.exe 89 PID 2124 wrote to memory of 4420 2124 rundll32.exe 89 PID 2124 wrote to memory of 3548 2124 rundll32.exe 90 PID 2124 wrote to memory of 3548 2124 rundll32.exe 90 PID 2124 wrote to memory of 3548 2124 rundll32.exe 90 PID 2124 wrote to memory of 4660 2124 rundll32.exe 91 PID 2124 wrote to memory of 4660 2124 rundll32.exe 91 PID 2124 wrote to memory of 4660 2124 rundll32.exe 91 PID 2124 wrote to memory of 3760 2124 rundll32.exe 92 PID 2124 wrote to memory of 3760 2124 rundll32.exe 92 PID 2124 wrote to memory of 3760 2124 rundll32.exe 92 PID 2124 wrote to memory of 2348 2124 rundll32.exe 93 PID 2124 wrote to memory of 2348 2124 rundll32.exe 93 PID 2124 wrote to memory of 2348 2124 rundll32.exe 93 PID 2124 wrote to memory of 3432 2124 rundll32.exe 94 PID 2124 wrote to memory of 3432 2124 rundll32.exe 94 PID 2124 wrote to memory of 3432 2124 rundll32.exe 94
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\19d5803ab5a3af8e0246f74268e3ad2fc7dabdb2b48b91fc2aba4d1ecf2e2a3fN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\19d5803ab5a3af8e0246f74268e3ad2fc7dabdb2b48b91fc2aba4d1ecf2e2a3fN.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4672
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 c2-f9-25-2e-c9-f13⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:60
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 c0-3e-66-5b-f5-4a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3520
-
-
C:\Windows\SysWOW64\arp.exearp -s 37.27.61.180 b7-41-61-db-f3-493⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4420
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 22-25-d6-29-3c-c43⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3548
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 21-88-75-a2-48-9d3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4660
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 58-5e-15-f1-8c-8e3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3760
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 11-c2-48-5d-3b-183⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2348
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 d5-3d-c1-d1-6b-a13⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 6923⤵
- Program crash
PID:2892
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2124 -ip 21241⤵PID:3332