Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 13:37
Behavioral task
behavioral1
Sample
0fcbdc521de14aa767da0a42245825a1a36c7fb6a00e4521e8fb5b00aaa3556cN.dll
Resource
win7-20240903-en
windows7-x64
6 signatures
120 seconds
General
-
Target
0fcbdc521de14aa767da0a42245825a1a36c7fb6a00e4521e8fb5b00aaa3556cN.dll
-
Size
80KB
-
MD5
a5a27cf041f762553660f1ebbdb61dd0
-
SHA1
840862820b3f76b9ce7ee81adfbefa25a5a719f0
-
SHA256
0fcbdc521de14aa767da0a42245825a1a36c7fb6a00e4521e8fb5b00aaa3556c
-
SHA512
a0f4afca8123e49999c3e5bb4ff0e652f977fdc6e200df57d93cb088db0fea374643f0a34028272ec38974aa6dd70efa6003cb87fcbdc55d3ba92a558e5ad41f
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPE1+q84EGHy:5dbwovEVyqgoZmZXWfIdQdRaefP+wuy
Malware Config
Signatures
-
pid Process 1316 arp.exe 2020 arp.exe 2852 arp.exe 864 arp.exe 4756 arp.exe 3664 arp.exe 1872 arp.exe 1944 arp.exe 5040 arp.exe -
resource yara_rule behavioral2/memory/1988-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/1988-2-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3052 1988 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1988 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3084 wrote to memory of 1988 3084 rundll32.exe 83 PID 3084 wrote to memory of 1988 3084 rundll32.exe 83 PID 3084 wrote to memory of 1988 3084 rundll32.exe 83 PID 1988 wrote to memory of 1316 1988 rundll32.exe 85 PID 1988 wrote to memory of 1316 1988 rundll32.exe 85 PID 1988 wrote to memory of 1316 1988 rundll32.exe 85 PID 1988 wrote to memory of 5040 1988 rundll32.exe 88 PID 1988 wrote to memory of 5040 1988 rundll32.exe 88 PID 1988 wrote to memory of 5040 1988 rundll32.exe 88 PID 1988 wrote to memory of 4756 1988 rundll32.exe 89 PID 1988 wrote to memory of 4756 1988 rundll32.exe 89 PID 1988 wrote to memory of 4756 1988 rundll32.exe 89 PID 1988 wrote to memory of 1944 1988 rundll32.exe 90 PID 1988 wrote to memory of 1944 1988 rundll32.exe 90 PID 1988 wrote to memory of 1944 1988 rundll32.exe 90 PID 1988 wrote to memory of 864 1988 rundll32.exe 91 PID 1988 wrote to memory of 864 1988 rundll32.exe 91 PID 1988 wrote to memory of 864 1988 rundll32.exe 91 PID 1988 wrote to memory of 1872 1988 rundll32.exe 92 PID 1988 wrote to memory of 1872 1988 rundll32.exe 92 PID 1988 wrote to memory of 1872 1988 rundll32.exe 92 PID 1988 wrote to memory of 2852 1988 rundll32.exe 93 PID 1988 wrote to memory of 2852 1988 rundll32.exe 93 PID 1988 wrote to memory of 2852 1988 rundll32.exe 93 PID 1988 wrote to memory of 2020 1988 rundll32.exe 94 PID 1988 wrote to memory of 2020 1988 rundll32.exe 94 PID 1988 wrote to memory of 2020 1988 rundll32.exe 94 PID 1988 wrote to memory of 3664 1988 rundll32.exe 95 PID 1988 wrote to memory of 3664 1988 rundll32.exe 95 PID 1988 wrote to memory of 3664 1988 rundll32.exe 95
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0fcbdc521de14aa767da0a42245825a1a36c7fb6a00e4521e8fb5b00aaa3556cN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0fcbdc521de14aa767da0a42245825a1a36c7fb6a00e4521e8fb5b00aaa3556cN.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1316
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 f7-75-16-42-14-533⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:5040
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 71-de-22-0e-eb-ff3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4756
-
-
C:\Windows\SysWOW64\arp.exearp -s 37.27.61.182 65-b3-a0-66-02-543⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1944
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 70-b5-8c-70-d0-ff3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:864
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 ab-eb-fa-39-81-8c3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1872
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 5f-90-9f-b5-26-283⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2852
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 ec-a0-73-b1-39-fd3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2020
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 69-72-56-70-8e-003⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 7123⤵
- Program crash
PID:3052
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1988 -ip 19881⤵PID:4808