Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 00:30
Behavioral task
behavioral1
Sample
72866a0f93e281373385e44e2047064c55dae4991c04d973b86beee6b1f24865.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
72866a0f93e281373385e44e2047064c55dae4991c04d973b86beee6b1f24865.dll
Resource
win10v2004-20241007-en
General
-
Target
72866a0f93e281373385e44e2047064c55dae4991c04d973b86beee6b1f24865.dll
-
Size
80KB
-
MD5
2279861fb0e91f69c6b9b66df611f4ea
-
SHA1
84b24b90cbde33ff884456bb00d0dccf0cc67a0d
-
SHA256
72866a0f93e281373385e44e2047064c55dae4991c04d973b86beee6b1f24865
-
SHA512
db4eeab1f2cc90e86b1a4038f716056879458d40533f0b6c96085d55bca50dbd47177756f78297a8693952af2dbca79095beacf7ef54f4e3f87f3a3f1f90a8e1
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEOAeIc5:5dbwovEVyqgoZmZXWfIdQdRaefP5AvW
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
pid Process 2664 arp.exe 336 arp.exe 2748 arp.exe 2724 arp.exe 2796 arp.exe 2768 arp.exe 2776 arp.exe 2824 arp.exe 2780 arp.exe -
resource yara_rule behavioral1/memory/2192-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2664-1-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2664-2-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2192-4-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/336-5-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2796-6-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2776-10-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2768-9-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2724-12-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2780-11-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2824-8-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2748-7-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2824-14-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2776-24-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2780-28-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2724-27-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2768-22-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2748-20-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/336-19-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2796-17-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2364 2192 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2192 rundll32.exe Token: SeDebugPrivilege 2664 arp.exe Token: SeDebugPrivilege 2748 arp.exe Token: SeDebugPrivilege 336 arp.exe Token: SeDebugPrivilege 2780 arp.exe Token: SeDebugPrivilege 2796 arp.exe Token: SeDebugPrivilege 2724 arp.exe Token: SeDebugPrivilege 2768 arp.exe Token: SeDebugPrivilege 2776 arp.exe Token: SeDebugPrivilege 2824 arp.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2192 3040 rundll32.exe 30 PID 3040 wrote to memory of 2192 3040 rundll32.exe 30 PID 3040 wrote to memory of 2192 3040 rundll32.exe 30 PID 3040 wrote to memory of 2192 3040 rundll32.exe 30 PID 3040 wrote to memory of 2192 3040 rundll32.exe 30 PID 3040 wrote to memory of 2192 3040 rundll32.exe 30 PID 3040 wrote to memory of 2192 3040 rundll32.exe 30 PID 2192 wrote to memory of 2364 2192 rundll32.exe 31 PID 2192 wrote to memory of 2364 2192 rundll32.exe 31 PID 2192 wrote to memory of 2364 2192 rundll32.exe 31 PID 2192 wrote to memory of 2364 2192 rundll32.exe 31 PID 2192 wrote to memory of 2664 2192 rundll32.exe 32 PID 2192 wrote to memory of 2664 2192 rundll32.exe 32 PID 2192 wrote to memory of 2664 2192 rundll32.exe 32 PID 2192 wrote to memory of 2664 2192 rundll32.exe 32 PID 2192 wrote to memory of 336 2192 rundll32.exe 34 PID 2192 wrote to memory of 336 2192 rundll32.exe 34 PID 2192 wrote to memory of 336 2192 rundll32.exe 34 PID 2192 wrote to memory of 336 2192 rundll32.exe 34 PID 2192 wrote to memory of 2780 2192 rundll32.exe 35 PID 2192 wrote to memory of 2780 2192 rundll32.exe 35 PID 2192 wrote to memory of 2780 2192 rundll32.exe 35 PID 2192 wrote to memory of 2780 2192 rundll32.exe 35 PID 2192 wrote to memory of 2768 2192 rundll32.exe 36 PID 2192 wrote to memory of 2768 2192 rundll32.exe 36 PID 2192 wrote to memory of 2768 2192 rundll32.exe 36 PID 2192 wrote to memory of 2768 2192 rundll32.exe 36 PID 2192 wrote to memory of 2796 2192 rundll32.exe 37 PID 2192 wrote to memory of 2796 2192 rundll32.exe 37 PID 2192 wrote to memory of 2796 2192 rundll32.exe 37 PID 2192 wrote to memory of 2796 2192 rundll32.exe 37 PID 2192 wrote to memory of 2824 2192 rundll32.exe 38 PID 2192 wrote to memory of 2824 2192 rundll32.exe 38 PID 2192 wrote to memory of 2824 2192 rundll32.exe 38 PID 2192 wrote to memory of 2824 2192 rundll32.exe 38 PID 2192 wrote to memory of 2724 2192 rundll32.exe 39 PID 2192 wrote to memory of 2724 2192 rundll32.exe 39 PID 2192 wrote to memory of 2724 2192 rundll32.exe 39 PID 2192 wrote to memory of 2724 2192 rundll32.exe 39 PID 2192 wrote to memory of 2748 2192 rundll32.exe 40 PID 2192 wrote to memory of 2748 2192 rundll32.exe 40 PID 2192 wrote to memory of 2748 2192 rundll32.exe 40 PID 2192 wrote to memory of 2748 2192 rundll32.exe 40 PID 2192 wrote to memory of 2776 2192 rundll32.exe 42 PID 2192 wrote to memory of 2776 2192 rundll32.exe 42 PID 2192 wrote to memory of 2776 2192 rundll32.exe 42 PID 2192 wrote to memory of 2776 2192 rundll32.exe 42
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\72866a0f93e281373385e44e2047064c55dae4991c04d973b86beee6b1f24865.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\72866a0f93e281373385e44e2047064c55dae4991c04d973b86beee6b1f24865.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2192 -s 3043⤵
- Program crash
PID:2364
-
-
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 39-c2-55-1f-3c-223⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:336
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 6e-92-89-62-94-ce3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
C:\Windows\SysWOW64\arp.exearp -s 49.12.169.207 16-0e-3c-3c-95-a33⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 eb-9f-32-05-0d-b93⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 ad-de-61-06-e7-f93⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 8a-ed-57-dc-3a-993⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 92-d2-f3-11-3b-483⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 97-b0-22-00-21-663⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-