Analysis
-
max time kernel
93s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2025 02:44
Behavioral task
behavioral1
Sample
a05b43f0ff416c7c1c3f2310f24fb38860a3c59468a531956feb6c3f5a314c90.dll
Resource
win7-20241010-en
windows7-x64
9 signatures
150 seconds
General
-
Target
a05b43f0ff416c7c1c3f2310f24fb38860a3c59468a531956feb6c3f5a314c90.dll
-
Size
80KB
-
MD5
211ed6cf8da10c850d7de82e73d2cbe9
-
SHA1
f64db5cabda0a4bc471069022e729465f7c545b1
-
SHA256
a05b43f0ff416c7c1c3f2310f24fb38860a3c59468a531956feb6c3f5a314c90
-
SHA512
9e344a0bf2b8c2698c3c1cbafd72f4f54a21ba05b1f4e559a0c682b9f9e871ef2b2e5a0e80e6328b44230a9572e16af3c98380983eb8207929c46ce9a21ef64c
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEXG3T:5dbwovEVyqgoZmZXWfIdQdRaefPzD
Malware Config
Signatures
-
pid Process 1788 arp.exe 4236 arp.exe 3568 arp.exe 1572 arp.exe 3668 arp.exe 4956 arp.exe 4000 arp.exe 1280 arp.exe 3676 arp.exe -
resource yara_rule behavioral2/memory/4776-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/4776-2-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3028 4776 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4776 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3200 wrote to memory of 4776 3200 rundll32.exe 83 PID 3200 wrote to memory of 4776 3200 rundll32.exe 83 PID 3200 wrote to memory of 4776 3200 rundll32.exe 83 PID 4776 wrote to memory of 1280 4776 rundll32.exe 84 PID 4776 wrote to memory of 1280 4776 rundll32.exe 84 PID 4776 wrote to memory of 1280 4776 rundll32.exe 84 PID 4776 wrote to memory of 1788 4776 rundll32.exe 88 PID 4776 wrote to memory of 1788 4776 rundll32.exe 88 PID 4776 wrote to memory of 1788 4776 rundll32.exe 88 PID 4776 wrote to memory of 1572 4776 rundll32.exe 89 PID 4776 wrote to memory of 1572 4776 rundll32.exe 89 PID 4776 wrote to memory of 1572 4776 rundll32.exe 89 PID 4776 wrote to memory of 4956 4776 rundll32.exe 90 PID 4776 wrote to memory of 4956 4776 rundll32.exe 90 PID 4776 wrote to memory of 4956 4776 rundll32.exe 90 PID 4776 wrote to memory of 3668 4776 rundll32.exe 91 PID 4776 wrote to memory of 3668 4776 rundll32.exe 91 PID 4776 wrote to memory of 3668 4776 rundll32.exe 91 PID 4776 wrote to memory of 3676 4776 rundll32.exe 92 PID 4776 wrote to memory of 3676 4776 rundll32.exe 92 PID 4776 wrote to memory of 3676 4776 rundll32.exe 92 PID 4776 wrote to memory of 3568 4776 rundll32.exe 96 PID 4776 wrote to memory of 3568 4776 rundll32.exe 96 PID 4776 wrote to memory of 3568 4776 rundll32.exe 96 PID 4776 wrote to memory of 4236 4776 rundll32.exe 98 PID 4776 wrote to memory of 4236 4776 rundll32.exe 98 PID 4776 wrote to memory of 4236 4776 rundll32.exe 98 PID 4776 wrote to memory of 4000 4776 rundll32.exe 100 PID 4776 wrote to memory of 4000 4776 rundll32.exe 100 PID 4776 wrote to memory of 4000 4776 rundll32.exe 100
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a05b43f0ff416c7c1c3f2310f24fb38860a3c59468a531956feb6c3f5a314c90.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a05b43f0ff416c7c1c3f2310f24fb38860a3c59468a531956feb6c3f5a314c90.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1280
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 88-af-ef-89-40-1a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1788
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 41-f9-6c-70-b1-dd3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1572
-
-
C:\Windows\SysWOW64\arp.exearp -s 37.27.61.181 ee-ec-ed-60-71-4c3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4956
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 17-a0-6d-e5-5c-1d3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3668
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 c4-e0-47-c8-53-313⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3676
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 3f-10-c1-0b-c1-413⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3568
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 6d-e6-f0-6c-93-0a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4236
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 a0-4e-4d-11-34-d03⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4776 -s 7163⤵
- Program crash
PID:3028
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4776 -ip 47761⤵PID:3928