Analysis
-
max time kernel
119s -
max time network
76s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 12:55
Behavioral task
behavioral1
Sample
a75835a6dc893740b6dc0eea624727181e39265f3221148c1543e8aabc6e5633N.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a75835a6dc893740b6dc0eea624727181e39265f3221148c1543e8aabc6e5633N.dll
Resource
win10v2004-20241007-en
General
-
Target
a75835a6dc893740b6dc0eea624727181e39265f3221148c1543e8aabc6e5633N.dll
-
Size
80KB
-
MD5
85c11b1f4a4d1292f48b119c63b56a90
-
SHA1
3fdbeb5acac2246055fad8a45e1df7ff05e3480c
-
SHA256
a75835a6dc893740b6dc0eea624727181e39265f3221148c1543e8aabc6e5633
-
SHA512
15e4b90ce117f6640fbadb38b01872cc91a1bd4b55241d6cf9ae88a5591ad272d1e61bdfa2f7603b9ef5348b017683d72be3dd253193e1c28cd0b85f149ee765
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEI9z:5dbwovEVyqgoZmZXWfIdQdRaefP1z
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 5 2128 rundll32.exe 8 2128 rundll32.exe 9 2128 rundll32.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: rundll32.exe -
pid Process 2192 arp.exe 2784 arp.exe 1804 arp.exe 2788 arp.exe 3012 arp.exe 1632 arp.exe 2648 arp.exe 2620 arp.exe 1956 arp.exe -
resource yara_rule behavioral1/memory/2128-2-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2128-1-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2128-5-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2128-6-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2128-7-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2128-13-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2128-15-0x0000000010000000-0x0000000010033000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2128 rundll32.exe 2128 rundll32.exe 2128 rundll32.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 472 Process not Found 472 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2128 rundll32.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1812 wrote to memory of 2128 1812 rundll32.exe 30 PID 1812 wrote to memory of 2128 1812 rundll32.exe 30 PID 1812 wrote to memory of 2128 1812 rundll32.exe 30 PID 1812 wrote to memory of 2128 1812 rundll32.exe 30 PID 1812 wrote to memory of 2128 1812 rundll32.exe 30 PID 1812 wrote to memory of 2128 1812 rundll32.exe 30 PID 1812 wrote to memory of 2128 1812 rundll32.exe 30 PID 2128 wrote to memory of 2620 2128 rundll32.exe 31 PID 2128 wrote to memory of 2620 2128 rundll32.exe 31 PID 2128 wrote to memory of 2620 2128 rundll32.exe 31 PID 2128 wrote to memory of 2620 2128 rundll32.exe 31 PID 2128 wrote to memory of 1804 2128 rundll32.exe 33 PID 2128 wrote to memory of 1804 2128 rundll32.exe 33 PID 2128 wrote to memory of 1804 2128 rundll32.exe 33 PID 2128 wrote to memory of 1804 2128 rundll32.exe 33 PID 2128 wrote to memory of 1956 2128 rundll32.exe 34 PID 2128 wrote to memory of 1956 2128 rundll32.exe 34 PID 2128 wrote to memory of 1956 2128 rundll32.exe 34 PID 2128 wrote to memory of 1956 2128 rundll32.exe 34 PID 2128 wrote to memory of 3012 2128 rundll32.exe 36 PID 2128 wrote to memory of 3012 2128 rundll32.exe 36 PID 2128 wrote to memory of 3012 2128 rundll32.exe 36 PID 2128 wrote to memory of 3012 2128 rundll32.exe 36 PID 2128 wrote to memory of 1632 2128 rundll32.exe 37 PID 2128 wrote to memory of 1632 2128 rundll32.exe 37 PID 2128 wrote to memory of 1632 2128 rundll32.exe 37 PID 2128 wrote to memory of 1632 2128 rundll32.exe 37 PID 2128 wrote to memory of 2648 2128 rundll32.exe 40 PID 2128 wrote to memory of 2648 2128 rundll32.exe 40 PID 2128 wrote to memory of 2648 2128 rundll32.exe 40 PID 2128 wrote to memory of 2648 2128 rundll32.exe 40 PID 2128 wrote to memory of 2788 2128 rundll32.exe 41 PID 2128 wrote to memory of 2788 2128 rundll32.exe 41 PID 2128 wrote to memory of 2788 2128 rundll32.exe 41 PID 2128 wrote to memory of 2788 2128 rundll32.exe 41 PID 2128 wrote to memory of 2192 2128 rundll32.exe 42 PID 2128 wrote to memory of 2192 2128 rundll32.exe 42 PID 2128 wrote to memory of 2192 2128 rundll32.exe 42 PID 2128 wrote to memory of 2192 2128 rundll32.exe 42 PID 2128 wrote to memory of 2784 2128 rundll32.exe 44 PID 2128 wrote to memory of 2784 2128 rundll32.exe 44 PID 2128 wrote to memory of 2784 2128 rundll32.exe 44 PID 2128 wrote to memory of 2784 2128 rundll32.exe 44 PID 2128 wrote to memory of 2756 2128 rundll32.exe 50 PID 2128 wrote to memory of 2756 2128 rundll32.exe 50 PID 2128 wrote to memory of 2756 2128 rundll32.exe 50 PID 2128 wrote to memory of 2756 2128 rundll32.exe 50
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a75835a6dc893740b6dc0eea624727181e39265f3221148c1543e8aabc6e5633N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a75835a6dc893740b6dc0eea624727181e39265f3221148c1543e8aabc6e5633N.dll,#12⤵
- Blocklisted process makes network request
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2620
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 e1-7e-3e-92-31-403⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1804
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 6c-27-49-9f-b2-813⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1956
-
-
C:\Windows\SysWOW64\arp.exearp -s 37.27.61.184 a9-d3-3e-2d-8a-b33⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3012
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 90-a2-ec-57-e6-993⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1632
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 77-19-9c-c2-87-493⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2648
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 b3-c3-af-91-a2-0e3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2788
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 00-e3-e2-21-72-0c3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2192
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 b3-90-74-29-03-7c3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2784
-
-
C:\Windows\SysWOW64\arp.exearp -d3⤵
- System Location Discovery: System Language Discovery
PID:2756
-
-