Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2025 00:30
Behavioral task
behavioral1
Sample
72866a0f93e281373385e44e2047064c55dae4991c04d973b86beee6b1f24865.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
72866a0f93e281373385e44e2047064c55dae4991c04d973b86beee6b1f24865.dll
Resource
win10v2004-20241007-en
General
-
Target
72866a0f93e281373385e44e2047064c55dae4991c04d973b86beee6b1f24865.dll
-
Size
80KB
-
MD5
2279861fb0e91f69c6b9b66df611f4ea
-
SHA1
84b24b90cbde33ff884456bb00d0dccf0cc67a0d
-
SHA256
72866a0f93e281373385e44e2047064c55dae4991c04d973b86beee6b1f24865
-
SHA512
db4eeab1f2cc90e86b1a4038f716056879458d40533f0b6c96085d55bca50dbd47177756f78297a8693952af2dbca79095beacf7ef54f4e3f87f3a3f1f90a8e1
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEOAeIc5:5dbwovEVyqgoZmZXWfIdQdRaefP5AvW
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
pid Process 2184 arp.exe 2896 arp.exe 2004 arp.exe 3036 arp.exe 2428 arp.exe 1088 arp.exe 1584 arp.exe 2544 arp.exe 4452 arp.exe -
resource yara_rule behavioral2/memory/3228-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/3228-2-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4616 3228 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3228 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1340 wrote to memory of 3228 1340 rundll32.exe 82 PID 1340 wrote to memory of 3228 1340 rundll32.exe 82 PID 1340 wrote to memory of 3228 1340 rundll32.exe 82 PID 3228 wrote to memory of 3036 3228 rundll32.exe 84 PID 3228 wrote to memory of 3036 3228 rundll32.exe 84 PID 3228 wrote to memory of 3036 3228 rundll32.exe 84 PID 3228 wrote to memory of 4452 3228 rundll32.exe 87 PID 3228 wrote to memory of 4452 3228 rundll32.exe 87 PID 3228 wrote to memory of 4452 3228 rundll32.exe 87 PID 3228 wrote to memory of 2004 3228 rundll32.exe 88 PID 3228 wrote to memory of 2004 3228 rundll32.exe 88 PID 3228 wrote to memory of 2004 3228 rundll32.exe 88 PID 3228 wrote to memory of 2544 3228 rundll32.exe 89 PID 3228 wrote to memory of 2544 3228 rundll32.exe 89 PID 3228 wrote to memory of 2544 3228 rundll32.exe 89 PID 3228 wrote to memory of 1584 3228 rundll32.exe 90 PID 3228 wrote to memory of 1584 3228 rundll32.exe 90 PID 3228 wrote to memory of 1584 3228 rundll32.exe 90 PID 3228 wrote to memory of 1088 3228 rundll32.exe 91 PID 3228 wrote to memory of 1088 3228 rundll32.exe 91 PID 3228 wrote to memory of 1088 3228 rundll32.exe 91 PID 3228 wrote to memory of 2896 3228 rundll32.exe 92 PID 3228 wrote to memory of 2896 3228 rundll32.exe 92 PID 3228 wrote to memory of 2896 3228 rundll32.exe 92 PID 3228 wrote to memory of 2428 3228 rundll32.exe 93 PID 3228 wrote to memory of 2428 3228 rundll32.exe 93 PID 3228 wrote to memory of 2428 3228 rundll32.exe 93 PID 3228 wrote to memory of 2184 3228 rundll32.exe 94 PID 3228 wrote to memory of 2184 3228 rundll32.exe 94 PID 3228 wrote to memory of 2184 3228 rundll32.exe 94
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\72866a0f93e281373385e44e2047064c55dae4991c04d973b86beee6b1f24865.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\72866a0f93e281373385e44e2047064c55dae4991c04d973b86beee6b1f24865.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3036
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 b2-c6-35-1d-94-173⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4452
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 df-16-cd-56-13-803⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2004
-
-
C:\Windows\SysWOW64\arp.exearp -s 37.27.61.180 8a-f9-82-6b-a6-8a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2544
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 0c-d3-26-70-d4-673⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1584
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 d8-c1-7c-19-9d-923⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1088
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 a2-67-1e-42-7b-4b3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2896
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 e6-40-3b-da-e4-9b3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2428
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 de-78-76-6f-f6-423⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3228 -s 7003⤵
- Program crash
PID:4616
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3228 -ip 32281⤵PID:4408