Analysis
-
max time kernel
114s -
max time network
75s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 20:19
Behavioral task
behavioral1
Sample
69e3b51daeeecf38b1f349b08dc3bff0924bea32bdd7ec32ea244b57ff4e3d24.dll
Resource
win7-20241023-en
General
-
Target
69e3b51daeeecf38b1f349b08dc3bff0924bea32bdd7ec32ea244b57ff4e3d24.dll
-
Size
80KB
-
MD5
972cf2217710bb8e472ceb2d2858120a
-
SHA1
72cbbd4110e745b386e7a4a7ecfb0cb74da8b439
-
SHA256
69e3b51daeeecf38b1f349b08dc3bff0924bea32bdd7ec32ea244b57ff4e3d24
-
SHA512
3ee1250309923ea4a6d81dbda53c9a6d876dd1e58e5509d33991c312bc18863f1d434af032e4ab529a760ed68259e105064ba0c4f0b260836d001cf19154f267
-
SSDEEP
1536:uIcs6msUvrh8ErMInQ+4cw9NVWfjaRkE4LEl8B60Y2lfxxHZPEmywZqD:dcs6v68Erj3w9zWf+SEFuk0/pfPPywZQ
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 5 620 rundll32.exe 8 620 rundll32.exe 9 620 rundll32.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: rundll32.exe -
pid Process 2096 arp.exe 2352 arp.exe 2784 arp.exe 1656 arp.exe 2516 arp.exe 2568 arp.exe 2508 arp.exe 2564 arp.exe 3024 arp.exe -
resource yara_rule behavioral1/memory/620-2-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/620-1-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/620-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/620-5-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/620-6-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/620-12-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/620-14-0x0000000010000000-0x0000000010033000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 620 rundll32.exe 620 rundll32.exe 620 rundll32.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 476 Process not Found 476 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 620 rundll32.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2116 wrote to memory of 620 2116 rundll32.exe 30 PID 2116 wrote to memory of 620 2116 rundll32.exe 30 PID 2116 wrote to memory of 620 2116 rundll32.exe 30 PID 2116 wrote to memory of 620 2116 rundll32.exe 30 PID 2116 wrote to memory of 620 2116 rundll32.exe 30 PID 2116 wrote to memory of 620 2116 rundll32.exe 30 PID 2116 wrote to memory of 620 2116 rundll32.exe 30 PID 620 wrote to memory of 2096 620 rundll32.exe 31 PID 620 wrote to memory of 2096 620 rundll32.exe 31 PID 620 wrote to memory of 2096 620 rundll32.exe 31 PID 620 wrote to memory of 2096 620 rundll32.exe 31 PID 620 wrote to memory of 2352 620 rundll32.exe 33 PID 620 wrote to memory of 2352 620 rundll32.exe 33 PID 620 wrote to memory of 2352 620 rundll32.exe 33 PID 620 wrote to memory of 2352 620 rundll32.exe 33 PID 620 wrote to memory of 1656 620 rundll32.exe 34 PID 620 wrote to memory of 1656 620 rundll32.exe 34 PID 620 wrote to memory of 1656 620 rundll32.exe 34 PID 620 wrote to memory of 1656 620 rundll32.exe 34 PID 620 wrote to memory of 2516 620 rundll32.exe 35 PID 620 wrote to memory of 2516 620 rundll32.exe 35 PID 620 wrote to memory of 2516 620 rundll32.exe 35 PID 620 wrote to memory of 2516 620 rundll32.exe 35 PID 620 wrote to memory of 2568 620 rundll32.exe 36 PID 620 wrote to memory of 2568 620 rundll32.exe 36 PID 620 wrote to memory of 2568 620 rundll32.exe 36 PID 620 wrote to memory of 2568 620 rundll32.exe 36 PID 620 wrote to memory of 2508 620 rundll32.exe 38 PID 620 wrote to memory of 2508 620 rundll32.exe 38 PID 620 wrote to memory of 2508 620 rundll32.exe 38 PID 620 wrote to memory of 2508 620 rundll32.exe 38 PID 620 wrote to memory of 2564 620 rundll32.exe 39 PID 620 wrote to memory of 2564 620 rundll32.exe 39 PID 620 wrote to memory of 2564 620 rundll32.exe 39 PID 620 wrote to memory of 2564 620 rundll32.exe 39 PID 620 wrote to memory of 3024 620 rundll32.exe 42 PID 620 wrote to memory of 3024 620 rundll32.exe 42 PID 620 wrote to memory of 3024 620 rundll32.exe 42 PID 620 wrote to memory of 3024 620 rundll32.exe 42 PID 620 wrote to memory of 2784 620 rundll32.exe 43 PID 620 wrote to memory of 2784 620 rundll32.exe 43 PID 620 wrote to memory of 2784 620 rundll32.exe 43 PID 620 wrote to memory of 2784 620 rundll32.exe 43 PID 620 wrote to memory of 2708 620 rundll32.exe 50 PID 620 wrote to memory of 2708 620 rundll32.exe 50 PID 620 wrote to memory of 2708 620 rundll32.exe 50 PID 620 wrote to memory of 2708 620 rundll32.exe 50
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\69e3b51daeeecf38b1f349b08dc3bff0924bea32bdd7ec32ea244b57ff4e3d24.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\69e3b51daeeecf38b1f349b08dc3bff0924bea32bdd7ec32ea244b57ff4e3d24.dll,#12⤵
- Blocklisted process makes network request
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2096
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 33-f5-6d-7b-a6-7b3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2352
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 ce-13-44-9e-ad-293⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1656
-
-
C:\Windows\SysWOW64\arp.exearp -s 37.27.61.182 e8-95-04-c5-08-d63⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2516
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 82-a0-af-5c-a9-0f3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2568
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 9f-37-44-d6-ee-6c3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2508
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 d9-d7-08-14-56-d53⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2564
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 bb-df-e6-c3-e2-363⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3024
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 48-8b-99-d1-16-003⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2784
-
-
C:\Windows\SysWOW64\arp.exearp -d3⤵
- System Location Discovery: System Language Discovery
PID:2708
-
-