Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 02:41
Behavioral task
behavioral1
Sample
a05b43f0ff416c7c1c3f2310f24fb38860a3c59468a531956feb6c3f5a314c90.dll
Resource
win7-20241010-en
General
-
Target
a05b43f0ff416c7c1c3f2310f24fb38860a3c59468a531956feb6c3f5a314c90.dll
-
Size
80KB
-
MD5
211ed6cf8da10c850d7de82e73d2cbe9
-
SHA1
f64db5cabda0a4bc471069022e729465f7c545b1
-
SHA256
a05b43f0ff416c7c1c3f2310f24fb38860a3c59468a531956feb6c3f5a314c90
-
SHA512
9e344a0bf2b8c2698c3c1cbafd72f4f54a21ba05b1f4e559a0c682b9f9e871ef2b2e5a0e80e6328b44230a9572e16af3c98380983eb8207929c46ce9a21ef64c
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEXG3T:5dbwovEVyqgoZmZXWfIdQdRaefPzD
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
pid Process 2796 arp.exe 2940 arp.exe 2936 arp.exe 2164 arp.exe 3032 arp.exe 1744 arp.exe 2964 arp.exe 2792 arp.exe 2928 arp.exe -
resource yara_rule behavioral1/memory/2860-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2860-2-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2860-1-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/3032-7-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/3032-9-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2860-11-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2792-19-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2936-18-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1744-17-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2964-16-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2940-15-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2164-14-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2796-13-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2928-12-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2796-29-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2936-33-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2964-31-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2928-27-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2940-26-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1744-24-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2164-21-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2792-34-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2868 2860 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2860 rundll32.exe Token: SeDebugPrivilege 3032 arp.exe Token: SeDebugPrivilege 1744 arp.exe Token: SeDebugPrivilege 2796 arp.exe Token: SeDebugPrivilege 2164 arp.exe Token: SeDebugPrivilege 2940 arp.exe Token: SeDebugPrivilege 2964 arp.exe Token: SeDebugPrivilege 2936 arp.exe Token: SeDebugPrivilege 2928 arp.exe Token: SeDebugPrivilege 2792 arp.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2860 3012 rundll32.exe 30 PID 3012 wrote to memory of 2860 3012 rundll32.exe 30 PID 3012 wrote to memory of 2860 3012 rundll32.exe 30 PID 3012 wrote to memory of 2860 3012 rundll32.exe 30 PID 3012 wrote to memory of 2860 3012 rundll32.exe 30 PID 3012 wrote to memory of 2860 3012 rundll32.exe 30 PID 3012 wrote to memory of 2860 3012 rundll32.exe 30 PID 2860 wrote to memory of 3032 2860 rundll32.exe 32 PID 2860 wrote to memory of 3032 2860 rundll32.exe 32 PID 2860 wrote to memory of 3032 2860 rundll32.exe 32 PID 2860 wrote to memory of 3032 2860 rundll32.exe 32 PID 2860 wrote to memory of 2868 2860 rundll32.exe 31 PID 2860 wrote to memory of 2868 2860 rundll32.exe 31 PID 2860 wrote to memory of 2868 2860 rundll32.exe 31 PID 2860 wrote to memory of 2868 2860 rundll32.exe 31 PID 2860 wrote to memory of 1744 2860 rundll32.exe 34 PID 2860 wrote to memory of 1744 2860 rundll32.exe 34 PID 2860 wrote to memory of 1744 2860 rundll32.exe 34 PID 2860 wrote to memory of 1744 2860 rundll32.exe 34 PID 2860 wrote to memory of 2964 2860 rundll32.exe 35 PID 2860 wrote to memory of 2964 2860 rundll32.exe 35 PID 2860 wrote to memory of 2964 2860 rundll32.exe 35 PID 2860 wrote to memory of 2964 2860 rundll32.exe 35 PID 2860 wrote to memory of 2796 2860 rundll32.exe 36 PID 2860 wrote to memory of 2796 2860 rundll32.exe 36 PID 2860 wrote to memory of 2796 2860 rundll32.exe 36 PID 2860 wrote to memory of 2796 2860 rundll32.exe 36 PID 2860 wrote to memory of 2940 2860 rundll32.exe 37 PID 2860 wrote to memory of 2940 2860 rundll32.exe 37 PID 2860 wrote to memory of 2940 2860 rundll32.exe 37 PID 2860 wrote to memory of 2940 2860 rundll32.exe 37 PID 2860 wrote to memory of 2792 2860 rundll32.exe 38 PID 2860 wrote to memory of 2792 2860 rundll32.exe 38 PID 2860 wrote to memory of 2792 2860 rundll32.exe 38 PID 2860 wrote to memory of 2792 2860 rundll32.exe 38 PID 2860 wrote to memory of 2936 2860 rundll32.exe 39 PID 2860 wrote to memory of 2936 2860 rundll32.exe 39 PID 2860 wrote to memory of 2936 2860 rundll32.exe 39 PID 2860 wrote to memory of 2936 2860 rundll32.exe 39 PID 2860 wrote to memory of 2164 2860 rundll32.exe 40 PID 2860 wrote to memory of 2164 2860 rundll32.exe 40 PID 2860 wrote to memory of 2164 2860 rundll32.exe 40 PID 2860 wrote to memory of 2164 2860 rundll32.exe 40 PID 2860 wrote to memory of 2928 2860 rundll32.exe 41 PID 2860 wrote to memory of 2928 2860 rundll32.exe 41 PID 2860 wrote to memory of 2928 2860 rundll32.exe 41 PID 2860 wrote to memory of 2928 2860 rundll32.exe 41
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a05b43f0ff416c7c1c3f2310f24fb38860a3c59468a531956feb6c3f5a314c90.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a05b43f0ff416c7c1c3f2310f24fb38860a3c59468a531956feb6c3f5a314c90.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2860 -s 3403⤵
- Program crash
PID:2868
-
-
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3032
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 75-59-55-07-61-af3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1744
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 f0-51-bb-5d-fc-d73⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
C:\Windows\SysWOW64\arp.exearp -s 154.61.71.51 19-ca-7e-9f-d3-a03⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 34-e2-85-f8-77-c23⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 d6-1c-d6-e2-cf-b23⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 ae-fc-42-70-d2-383⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 6f-87-05-3e-68-ab3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2164
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 ea-15-b1-aa-d1-9d3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-