Analysis
-
max time kernel
141s -
max time network
76s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 02:44
Behavioral task
behavioral1
Sample
a05b43f0ff416c7c1c3f2310f24fb38860a3c59468a531956feb6c3f5a314c90.dll
Resource
win7-20241010-en
General
-
Target
a05b43f0ff416c7c1c3f2310f24fb38860a3c59468a531956feb6c3f5a314c90.dll
-
Size
80KB
-
MD5
211ed6cf8da10c850d7de82e73d2cbe9
-
SHA1
f64db5cabda0a4bc471069022e729465f7c545b1
-
SHA256
a05b43f0ff416c7c1c3f2310f24fb38860a3c59468a531956feb6c3f5a314c90
-
SHA512
9e344a0bf2b8c2698c3c1cbafd72f4f54a21ba05b1f4e559a0c682b9f9e871ef2b2e5a0e80e6328b44230a9572e16af3c98380983eb8207929c46ce9a21ef64c
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEXG3T:5dbwovEVyqgoZmZXWfIdQdRaefPzD
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 4 1356 rundll32.exe 8 1356 rundll32.exe 9 1356 rundll32.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: rundll32.exe -
pid Process 2868 arp.exe 2816 arp.exe 2856 arp.exe 2932 arp.exe 2980 arp.exe 2988 arp.exe 2916 arp.exe 2804 arp.exe 2860 arp.exe -
resource yara_rule behavioral1/memory/1356-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1356-2-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1356-1-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1356-5-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1356-6-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1356-7-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1356-8-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1356-9-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1356-16-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1356-17-0x0000000010000000-0x0000000010033000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1356 rundll32.exe 1356 rundll32.exe 1356 rundll32.exe 1356 rundll32.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 464 Process not Found 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1356 rundll32.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2660 wrote to memory of 1356 2660 rundll32.exe 29 PID 2660 wrote to memory of 1356 2660 rundll32.exe 29 PID 2660 wrote to memory of 1356 2660 rundll32.exe 29 PID 2660 wrote to memory of 1356 2660 rundll32.exe 29 PID 2660 wrote to memory of 1356 2660 rundll32.exe 29 PID 2660 wrote to memory of 1356 2660 rundll32.exe 29 PID 2660 wrote to memory of 1356 2660 rundll32.exe 29 PID 1356 wrote to memory of 2804 1356 rundll32.exe 30 PID 1356 wrote to memory of 2804 1356 rundll32.exe 30 PID 1356 wrote to memory of 2804 1356 rundll32.exe 30 PID 1356 wrote to memory of 2804 1356 rundll32.exe 30 PID 1356 wrote to memory of 2816 1356 rundll32.exe 32 PID 1356 wrote to memory of 2816 1356 rundll32.exe 32 PID 1356 wrote to memory of 2816 1356 rundll32.exe 32 PID 1356 wrote to memory of 2816 1356 rundll32.exe 32 PID 1356 wrote to memory of 2856 1356 rundll32.exe 33 PID 1356 wrote to memory of 2856 1356 rundll32.exe 33 PID 1356 wrote to memory of 2856 1356 rundll32.exe 33 PID 1356 wrote to memory of 2856 1356 rundll32.exe 33 PID 1356 wrote to memory of 2860 1356 rundll32.exe 34 PID 1356 wrote to memory of 2860 1356 rundll32.exe 34 PID 1356 wrote to memory of 2860 1356 rundll32.exe 34 PID 1356 wrote to memory of 2860 1356 rundll32.exe 34 PID 1356 wrote to memory of 2868 1356 rundll32.exe 35 PID 1356 wrote to memory of 2868 1356 rundll32.exe 35 PID 1356 wrote to memory of 2868 1356 rundll32.exe 35 PID 1356 wrote to memory of 2868 1356 rundll32.exe 35 PID 1356 wrote to memory of 2932 1356 rundll32.exe 37 PID 1356 wrote to memory of 2932 1356 rundll32.exe 37 PID 1356 wrote to memory of 2932 1356 rundll32.exe 37 PID 1356 wrote to memory of 2932 1356 rundll32.exe 37 PID 1356 wrote to memory of 2980 1356 rundll32.exe 38 PID 1356 wrote to memory of 2980 1356 rundll32.exe 38 PID 1356 wrote to memory of 2980 1356 rundll32.exe 38 PID 1356 wrote to memory of 2980 1356 rundll32.exe 38 PID 1356 wrote to memory of 2988 1356 rundll32.exe 39 PID 1356 wrote to memory of 2988 1356 rundll32.exe 39 PID 1356 wrote to memory of 2988 1356 rundll32.exe 39 PID 1356 wrote to memory of 2988 1356 rundll32.exe 39 PID 1356 wrote to memory of 2916 1356 rundll32.exe 40 PID 1356 wrote to memory of 2916 1356 rundll32.exe 40 PID 1356 wrote to memory of 2916 1356 rundll32.exe 40 PID 1356 wrote to memory of 2916 1356 rundll32.exe 40 PID 1356 wrote to memory of 2600 1356 rundll32.exe 48 PID 1356 wrote to memory of 2600 1356 rundll32.exe 48 PID 1356 wrote to memory of 2600 1356 rundll32.exe 48 PID 1356 wrote to memory of 2600 1356 rundll32.exe 48
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a05b43f0ff416c7c1c3f2310f24fb38860a3c59468a531956feb6c3f5a314c90.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a05b43f0ff416c7c1c3f2310f24fb38860a3c59468a531956feb6c3f5a314c90.dll,#12⤵
- Blocklisted process makes network request
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2804
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 d9-5d-84-88-d1-133⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2816
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 37-51-44-68-b0-fe3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2856
-
-
C:\Windows\SysWOW64\arp.exearp -s 154.61.71.51 3b-de-71-d4-d2-913⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2860
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 2d-6d-ba-d7-8b-e73⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2868
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 36-22-59-80-cc-973⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2932
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 4f-b7-45-f9-97-633⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2980
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 a5-30-76-f2-59-ec3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2988
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 25-7e-30-b1-6c-0e3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2916
-
-
C:\Windows\SysWOW64\arp.exearp -d3⤵
- System Location Discovery: System Language Discovery
PID:2600
-
-