Analysis
-
max time kernel
92s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2025 02:41
Behavioral task
behavioral1
Sample
a05b43f0ff416c7c1c3f2310f24fb38860a3c59468a531956feb6c3f5a314c90.dll
Resource
win7-20241010-en
windows7-x64
7 signatures
150 seconds
General
-
Target
a05b43f0ff416c7c1c3f2310f24fb38860a3c59468a531956feb6c3f5a314c90.dll
-
Size
80KB
-
MD5
211ed6cf8da10c850d7de82e73d2cbe9
-
SHA1
f64db5cabda0a4bc471069022e729465f7c545b1
-
SHA256
a05b43f0ff416c7c1c3f2310f24fb38860a3c59468a531956feb6c3f5a314c90
-
SHA512
9e344a0bf2b8c2698c3c1cbafd72f4f54a21ba05b1f4e559a0c682b9f9e871ef2b2e5a0e80e6328b44230a9572e16af3c98380983eb8207929c46ce9a21ef64c
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEXG3T:5dbwovEVyqgoZmZXWfIdQdRaefPzD
Malware Config
Signatures
-
pid Process 4796 arp.exe 5028 arp.exe 4048 arp.exe 3168 arp.exe 1056 arp.exe 3184 arp.exe 2248 arp.exe 4268 arp.exe 1828 arp.exe -
resource yara_rule behavioral2/memory/3908-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/3908-2-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1800 3908 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3908 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2000 wrote to memory of 3908 2000 rundll32.exe 83 PID 2000 wrote to memory of 3908 2000 rundll32.exe 83 PID 2000 wrote to memory of 3908 2000 rundll32.exe 83 PID 3908 wrote to memory of 4796 3908 rundll32.exe 84 PID 3908 wrote to memory of 4796 3908 rundll32.exe 84 PID 3908 wrote to memory of 4796 3908 rundll32.exe 84 PID 3908 wrote to memory of 2248 3908 rundll32.exe 88 PID 3908 wrote to memory of 2248 3908 rundll32.exe 88 PID 3908 wrote to memory of 2248 3908 rundll32.exe 88 PID 3908 wrote to memory of 3184 3908 rundll32.exe 89 PID 3908 wrote to memory of 3184 3908 rundll32.exe 89 PID 3908 wrote to memory of 3184 3908 rundll32.exe 89 PID 3908 wrote to memory of 1056 3908 rundll32.exe 90 PID 3908 wrote to memory of 1056 3908 rundll32.exe 90 PID 3908 wrote to memory of 1056 3908 rundll32.exe 90 PID 3908 wrote to memory of 5028 3908 rundll32.exe 91 PID 3908 wrote to memory of 5028 3908 rundll32.exe 91 PID 3908 wrote to memory of 5028 3908 rundll32.exe 91 PID 3908 wrote to memory of 4048 3908 rundll32.exe 92 PID 3908 wrote to memory of 4048 3908 rundll32.exe 92 PID 3908 wrote to memory of 4048 3908 rundll32.exe 92 PID 3908 wrote to memory of 3168 3908 rundll32.exe 94 PID 3908 wrote to memory of 3168 3908 rundll32.exe 94 PID 3908 wrote to memory of 3168 3908 rundll32.exe 94 PID 3908 wrote to memory of 1828 3908 rundll32.exe 95 PID 3908 wrote to memory of 1828 3908 rundll32.exe 95 PID 3908 wrote to memory of 1828 3908 rundll32.exe 95 PID 3908 wrote to memory of 4268 3908 rundll32.exe 96 PID 3908 wrote to memory of 4268 3908 rundll32.exe 96 PID 3908 wrote to memory of 4268 3908 rundll32.exe 96
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a05b43f0ff416c7c1c3f2310f24fb38860a3c59468a531956feb6c3f5a314c90.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a05b43f0ff416c7c1c3f2310f24fb38860a3c59468a531956feb6c3f5a314c90.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4796
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 fc-55-75-09-08-ba3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2248
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 80-cd-77-69-7e-253⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3184
-
-
C:\Windows\SysWOW64\arp.exearp -s 49.12.169.208 a5-df-38-71-c3-b93⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1056
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 13-ae-90-8d-b1-143⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:5028
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 ab-39-bb-cf-19-193⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4048
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 96-81-7c-0b-91-863⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3168
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 1c-19-bd-75-bf-583⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1828
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 a2-4e-5d-3a-fc-c13⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3908 -s 7283⤵
- Program crash
PID:1800
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3908 -ip 39081⤵PID:2024