Analysis
-
max time kernel
63s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 17:33
Behavioral task
behavioral1
Sample
5b7cd47fc832296aaaea21692c1401eed0056950600bb5767ef6ec08dc285b6aN.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
5b7cd47fc832296aaaea21692c1401eed0056950600bb5767ef6ec08dc285b6aN.dll
Resource
win10v2004-20241007-en
General
-
Target
5b7cd47fc832296aaaea21692c1401eed0056950600bb5767ef6ec08dc285b6aN.dll
-
Size
80KB
-
MD5
378c320c9023c0fe7600916e0ba93340
-
SHA1
bdd021823a09d6c6c572a3ab25275ff4433f727a
-
SHA256
5b7cd47fc832296aaaea21692c1401eed0056950600bb5767ef6ec08dc285b6a
-
SHA512
5af06722c6d0f850649e9a581bca3d5d7a8583ba403d7a7eb49ee038aac07857e751ef08ba6894b11bac83980775f8dde03cb9bb979eeecb476ca8f57f7c99a1
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPE3eVwIMl:5dbwovEVyqgoZmZXWfIdQdRaefPIahE
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
pid Process 2360 arp.exe 2824 arp.exe 1976 arp.exe 2740 arp.exe 2868 arp.exe 3008 arp.exe 2800 arp.exe -
resource yara_rule behavioral1/memory/3024-1-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2800-2-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2800-4-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/3024-6-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2360-10-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1976-19-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2824-21-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2360-18-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2868-15-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2824-11-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2868-9-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1976-8-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2740-7-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2740-14-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2096 3024 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 3024 rundll32.exe Token: SeDebugPrivilege 2800 arp.exe Token: SeDebugPrivilege 2740 arp.exe Token: SeDebugPrivilege 2868 arp.exe Token: SeDebugPrivilege 2360 arp.exe Token: SeDebugPrivilege 1976 arp.exe Token: SeDebugPrivilege 2824 arp.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1172 wrote to memory of 3024 1172 rundll32.exe 30 PID 1172 wrote to memory of 3024 1172 rundll32.exe 30 PID 1172 wrote to memory of 3024 1172 rundll32.exe 30 PID 1172 wrote to memory of 3024 1172 rundll32.exe 30 PID 1172 wrote to memory of 3024 1172 rundll32.exe 30 PID 1172 wrote to memory of 3024 1172 rundll32.exe 30 PID 1172 wrote to memory of 3024 1172 rundll32.exe 30 PID 3024 wrote to memory of 2800 3024 rundll32.exe 32 PID 3024 wrote to memory of 2800 3024 rundll32.exe 32 PID 3024 wrote to memory of 2800 3024 rundll32.exe 32 PID 3024 wrote to memory of 2800 3024 rundll32.exe 32 PID 3024 wrote to memory of 2096 3024 rundll32.exe 31 PID 3024 wrote to memory of 2096 3024 rundll32.exe 31 PID 3024 wrote to memory of 2096 3024 rundll32.exe 31 PID 3024 wrote to memory of 2096 3024 rundll32.exe 31 PID 3024 wrote to memory of 2360 3024 rundll32.exe 34 PID 3024 wrote to memory of 2360 3024 rundll32.exe 34 PID 3024 wrote to memory of 2360 3024 rundll32.exe 34 PID 3024 wrote to memory of 2360 3024 rundll32.exe 34 PID 3024 wrote to memory of 2824 3024 rundll32.exe 35 PID 3024 wrote to memory of 2824 3024 rundll32.exe 35 PID 3024 wrote to memory of 2824 3024 rundll32.exe 35 PID 3024 wrote to memory of 2824 3024 rundll32.exe 35 PID 3024 wrote to memory of 2868 3024 rundll32.exe 36 PID 3024 wrote to memory of 2868 3024 rundll32.exe 36 PID 3024 wrote to memory of 2868 3024 rundll32.exe 36 PID 3024 wrote to memory of 2868 3024 rundll32.exe 36 PID 3024 wrote to memory of 1976 3024 rundll32.exe 37 PID 3024 wrote to memory of 1976 3024 rundll32.exe 37 PID 3024 wrote to memory of 1976 3024 rundll32.exe 37 PID 3024 wrote to memory of 1976 3024 rundll32.exe 37 PID 3024 wrote to memory of 2740 3024 rundll32.exe 38 PID 3024 wrote to memory of 2740 3024 rundll32.exe 38 PID 3024 wrote to memory of 2740 3024 rundll32.exe 38 PID 3024 wrote to memory of 2740 3024 rundll32.exe 38
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5b7cd47fc832296aaaea21692c1401eed0056950600bb5767ef6ec08dc285b6aN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5b7cd47fc832296aaaea21692c1401eed0056950600bb5767ef6ec08dc285b6aN.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3024 -s 3363⤵
- Program crash
PID:2096
-
-
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 18-70-9d-e1-94-3b3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 38-84-79-ba-84-2a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Windows\SysWOW64\arp.exearp -s 136.243.76.21 1a-8c-49-9d-6e-8d3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 35-df-e1-f2-13-d93⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 44-d9-44-58-79-313⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 46-ad-dd-ba-c0-f33⤵
- Network Service Discovery
PID:3008
-
-