Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 06:57
Behavioral task
behavioral1
Sample
03d2b319dec87654f22a07f086e0b5053cc5c5677f6b8884e2dd3b0d48d34846N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
03d2b319dec87654f22a07f086e0b5053cc5c5677f6b8884e2dd3b0d48d34846N.dll
Resource
win10v2004-20241007-en
General
-
Target
03d2b319dec87654f22a07f086e0b5053cc5c5677f6b8884e2dd3b0d48d34846N.dll
-
Size
80KB
-
MD5
79517a78bef6e744e1d14c182da23de0
-
SHA1
e8751dc0af5b6d40e45ab6e2e1d80cb68d502e3c
-
SHA256
03d2b319dec87654f22a07f086e0b5053cc5c5677f6b8884e2dd3b0d48d34846
-
SHA512
f1935891315c7eb2622e27093d53e60dd139e1e55c00a2d82b00718a863b1e54ec7de1c3e3e3025d69b8988c5c308f0d227eb8d574be972eaafdc5251fb17e7c
-
SSDEEP
1536:uIcs6msUvrh8ErMInQ+4cw9NVWfjaRkE4LEl8B60Y2lfxxHZPEVO1Ekq:dcs6v68Erj3w9zWf+SEFuk0/pfP+kq
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
pid Process 3980 arp.exe 2924 arp.exe 3412 arp.exe 4860 arp.exe 3620 arp.exe 4256 arp.exe 2204 arp.exe 3096 arp.exe 2408 arp.exe -
resource yara_rule behavioral2/memory/3500-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/3500-2-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1500 3500 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3500 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1668 wrote to memory of 3500 1668 rundll32.exe 83 PID 1668 wrote to memory of 3500 1668 rundll32.exe 83 PID 1668 wrote to memory of 3500 1668 rundll32.exe 83 PID 3500 wrote to memory of 2924 3500 rundll32.exe 85 PID 3500 wrote to memory of 2924 3500 rundll32.exe 85 PID 3500 wrote to memory of 2924 3500 rundll32.exe 85 PID 3500 wrote to memory of 4256 3500 rundll32.exe 88 PID 3500 wrote to memory of 4256 3500 rundll32.exe 88 PID 3500 wrote to memory of 4256 3500 rundll32.exe 88 PID 3500 wrote to memory of 3620 3500 rundll32.exe 89 PID 3500 wrote to memory of 3620 3500 rundll32.exe 89 PID 3500 wrote to memory of 3620 3500 rundll32.exe 89 PID 3500 wrote to memory of 2408 3500 rundll32.exe 90 PID 3500 wrote to memory of 2408 3500 rundll32.exe 90 PID 3500 wrote to memory of 2408 3500 rundll32.exe 90 PID 3500 wrote to memory of 3980 3500 rundll32.exe 91 PID 3500 wrote to memory of 3980 3500 rundll32.exe 91 PID 3500 wrote to memory of 3980 3500 rundll32.exe 91 PID 3500 wrote to memory of 4860 3500 rundll32.exe 92 PID 3500 wrote to memory of 4860 3500 rundll32.exe 92 PID 3500 wrote to memory of 4860 3500 rundll32.exe 92 PID 3500 wrote to memory of 3412 3500 rundll32.exe 93 PID 3500 wrote to memory of 3412 3500 rundll32.exe 93 PID 3500 wrote to memory of 3412 3500 rundll32.exe 93 PID 3500 wrote to memory of 2204 3500 rundll32.exe 94 PID 3500 wrote to memory of 2204 3500 rundll32.exe 94 PID 3500 wrote to memory of 2204 3500 rundll32.exe 94 PID 3500 wrote to memory of 3096 3500 rundll32.exe 95 PID 3500 wrote to memory of 3096 3500 rundll32.exe 95 PID 3500 wrote to memory of 3096 3500 rundll32.exe 95
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\03d2b319dec87654f22a07f086e0b5053cc5c5677f6b8884e2dd3b0d48d34846N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\03d2b319dec87654f22a07f086e0b5053cc5c5677f6b8884e2dd3b0d48d34846N.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2924
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 e6-46-d0-8f-f4-073⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4256
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 91-e7-40-2e-4e-ef3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3620
-
-
C:\Windows\SysWOW64\arp.exearp -s 136.243.76.21 93-9a-61-8f-6a-233⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2408
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 38-d5-a4-1f-7f-ac3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3980
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 38-da-39-d4-72-9d3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4860
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 65-a8-44-41-a5-4f3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3412
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 d4-c1-c0-21-f0-e43⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2204
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 62-82-3a-44-2b-443⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3500 -s 7163⤵
- Program crash
PID:1500
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3500 -ip 35001⤵PID:3616