Analysis
-
max time kernel
92s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 10:00
Static task
static1
Behavioral task
behavioral1
Sample
b99d6d0e0efee084431ee80b424709489e5e1acb0d56d025a66da7648a74874cN.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b99d6d0e0efee084431ee80b424709489e5e1acb0d56d025a66da7648a74874cN.dll
Resource
win10v2004-20241007-en
General
-
Target
b99d6d0e0efee084431ee80b424709489e5e1acb0d56d025a66da7648a74874cN.dll
-
Size
163KB
-
MD5
27f76da4410dc3ca013cf6f4c4441880
-
SHA1
45d23109b5409152c3d8f2ec54b2a2f72dfd10ba
-
SHA256
b99d6d0e0efee084431ee80b424709489e5e1acb0d56d025a66da7648a74874c
-
SHA512
ea1fba057ec0c2c9cb9996cc832e26e430c7d24f72984ba9fa5b298f3915b19e8f95a7d2fd2b14bdf1ecd996bf0d608eaf97746b1db01a904a557ad42fa0841a
-
SSDEEP
3072:ryy9dPX0+CIZyTmPP56e5lmeqsQvVqRlkM4OAD/KLznBuB2JA2BjtSEJ1:rFd8+CIEGieqsQvMRlkM4RD/qzMfUhSk
Malware Config
Signatures
-
Floxif family
-
Detects Floxif payload 1 IoCs
resource yara_rule behavioral2/files/0x000c000000023b0f-2.dat floxif -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000c000000023b0f-2.dat acprotect -
Loads dropped DLL 4 IoCs
pid Process 744 rundll32.exe 744 rundll32.exe 4008 WerFault.exe 2680 WerFault.exe -
pid Process 4956 arp.exe 1788 arp.exe 4988 arp.exe 1572 arp.exe 2376 arp.exe 3668 arp.exe 1968 arp.exe 4476 arp.exe 3676 arp.exe -
resource yara_rule behavioral2/files/0x000c000000023b0f-2.dat upx behavioral2/memory/744-6-0x0000000000790000-0x00000000007C3000-memory.dmp upx behavioral2/memory/744-13-0x0000000000790000-0x00000000007C3000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\System\symsrv.dll rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2680 744 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 744 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2672 wrote to memory of 744 2672 rundll32.exe 85 PID 2672 wrote to memory of 744 2672 rundll32.exe 85 PID 2672 wrote to memory of 744 2672 rundll32.exe 85 PID 744 wrote to memory of 2376 744 rundll32.exe 86 PID 744 wrote to memory of 2376 744 rundll32.exe 86 PID 744 wrote to memory of 2376 744 rundll32.exe 86 PID 744 wrote to memory of 4988 744 rundll32.exe 90 PID 744 wrote to memory of 4988 744 rundll32.exe 90 PID 744 wrote to memory of 4988 744 rundll32.exe 90 PID 744 wrote to memory of 1788 744 rundll32.exe 91 PID 744 wrote to memory of 1788 744 rundll32.exe 91 PID 744 wrote to memory of 1788 744 rundll32.exe 91 PID 744 wrote to memory of 1572 744 rundll32.exe 92 PID 744 wrote to memory of 1572 744 rundll32.exe 92 PID 744 wrote to memory of 1572 744 rundll32.exe 92 PID 744 wrote to memory of 4956 744 rundll32.exe 93 PID 744 wrote to memory of 4956 744 rundll32.exe 93 PID 744 wrote to memory of 4956 744 rundll32.exe 93 PID 744 wrote to memory of 3668 744 rundll32.exe 94 PID 744 wrote to memory of 3668 744 rundll32.exe 94 PID 744 wrote to memory of 3668 744 rundll32.exe 94 PID 744 wrote to memory of 3676 744 rundll32.exe 95 PID 744 wrote to memory of 3676 744 rundll32.exe 95 PID 744 wrote to memory of 3676 744 rundll32.exe 95 PID 744 wrote to memory of 1968 744 rundll32.exe 96 PID 744 wrote to memory of 1968 744 rundll32.exe 96 PID 744 wrote to memory of 1968 744 rundll32.exe 96 PID 744 wrote to memory of 4476 744 rundll32.exe 97 PID 744 wrote to memory of 4476 744 rundll32.exe 97 PID 744 wrote to memory of 4476 744 rundll32.exe 97
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b99d6d0e0efee084431ee80b424709489e5e1acb0d56d025a66da7648a74874cN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b99d6d0e0efee084431ee80b424709489e5e1acb0d56d025a66da7648a74874cN.dll,#12⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2376
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 2e-da-f0-1e-ff-de3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4988
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 be-6f-4e-af-bb-6a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1788
-
-
C:\Windows\SysWOW64\arp.exearp -s 37.27.61.181 93-e9-62-91-82-ac3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1572
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 fd-17-42-2b-d4-443⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4956
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 0e-4d-b5-f2-dc-093⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3668
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 c8-7f-fb-9d-33-9b3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3676
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 07-c9-ce-b0-8c-5b3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1968
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 3a-5a-e4-71-db-2a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 8883⤵
- Loads dropped DLL
- Program crash
PID:2680
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 744 -ip 7441⤵
- Loads dropped DLL
PID:4008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD54fcd7574537cebec8e75b4e646996643
SHA1efa59bb9050fb656b90d5d40c942fb2a304f2a8b
SHA2568ea3b17e4b783ffc0bc387b81b823bf87af0d57da74541d88ba85314bb232a5d
SHA5127f1a7ef64d332a735db82506b47d84853af870785066d29ccaf4fdeab114079a9f0db400e01ba574776a0d652a248658fe1e8f9659cdced19ad6eea09644ea3e