Analysis
-
max time kernel
113s -
max time network
74s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
07-01-2025 03:28
Behavioral task
behavioral1
Sample
8bdd484400f707cb401b4d354039dc08b4d5603f75799a1374100c1bfb7d031bN.dll
Resource
win7-20240729-en
General
-
Target
8bdd484400f707cb401b4d354039dc08b4d5603f75799a1374100c1bfb7d031bN.dll
-
Size
80KB
-
MD5
c7f3377444bf889f1e0ed4943f0a6650
-
SHA1
cc528788fac8a5f1db4635abd21bce83c16ef786
-
SHA256
8bdd484400f707cb401b4d354039dc08b4d5603f75799a1374100c1bfb7d031b
-
SHA512
feb5062fb4a28d69ac109fd9c01a53c648e2e7a8fccf967ef18806faf13d26a69448555eba7f9ac430c189e99bed845fc3404d3882b7e61d56292a6ddd87b883
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEd:5dbwovEVyqgoZmZXWfIdQdRaefPC
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 5 828 rundll32.exe 8 828 rundll32.exe 9 828 rundll32.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: rundll32.exe -
pid Process 1684 arp.exe 1884 arp.exe 2712 arp.exe 2428 arp.exe 1672 arp.exe 492 arp.exe 2820 arp.exe 2236 arp.exe 2352 arp.exe -
resource yara_rule behavioral1/memory/828-1-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/828-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1684-2-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1684-3-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1884-5-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2712-7-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/492-8-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1672-6-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2428-4-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2352-9-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2236-10-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2820-11-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2428-13-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/492-17-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2712-18-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1672-16-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2236-21-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2820-26-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2352-25-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1884-22-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/828-28-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1104-30-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1104-32-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/828-33-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/828-39-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/828-41-0x0000000010000000-0x0000000010033000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 828 rundll32.exe 828 rundll32.exe 828 rundll32.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 480 Process not Found 480 Process not Found -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 828 rundll32.exe Token: SeDebugPrivilege 1684 arp.exe Token: SeDebugPrivilege 2428 arp.exe Token: SeDebugPrivilege 1672 arp.exe Token: SeDebugPrivilege 2712 arp.exe Token: SeDebugPrivilege 492 arp.exe Token: SeDebugPrivilege 1884 arp.exe Token: SeDebugPrivilege 2352 arp.exe Token: SeDebugPrivilege 2236 arp.exe Token: SeDebugPrivilege 2820 arp.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2500 wrote to memory of 828 2500 rundll32.exe 30 PID 2500 wrote to memory of 828 2500 rundll32.exe 30 PID 2500 wrote to memory of 828 2500 rundll32.exe 30 PID 2500 wrote to memory of 828 2500 rundll32.exe 30 PID 2500 wrote to memory of 828 2500 rundll32.exe 30 PID 2500 wrote to memory of 828 2500 rundll32.exe 30 PID 2500 wrote to memory of 828 2500 rundll32.exe 30 PID 828 wrote to memory of 1684 828 rundll32.exe 31 PID 828 wrote to memory of 1684 828 rundll32.exe 31 PID 828 wrote to memory of 1684 828 rundll32.exe 31 PID 828 wrote to memory of 1684 828 rundll32.exe 31 PID 828 wrote to memory of 1884 828 rundll32.exe 33 PID 828 wrote to memory of 1884 828 rundll32.exe 33 PID 828 wrote to memory of 1884 828 rundll32.exe 33 PID 828 wrote to memory of 1884 828 rundll32.exe 33 PID 828 wrote to memory of 2428 828 rundll32.exe 34 PID 828 wrote to memory of 2428 828 rundll32.exe 34 PID 828 wrote to memory of 2428 828 rundll32.exe 34 PID 828 wrote to memory of 2428 828 rundll32.exe 34 PID 828 wrote to memory of 1672 828 rundll32.exe 36 PID 828 wrote to memory of 1672 828 rundll32.exe 36 PID 828 wrote to memory of 1672 828 rundll32.exe 36 PID 828 wrote to memory of 1672 828 rundll32.exe 36 PID 828 wrote to memory of 492 828 rundll32.exe 38 PID 828 wrote to memory of 492 828 rundll32.exe 38 PID 828 wrote to memory of 492 828 rundll32.exe 38 PID 828 wrote to memory of 492 828 rundll32.exe 38 PID 828 wrote to memory of 2712 828 rundll32.exe 40 PID 828 wrote to memory of 2712 828 rundll32.exe 40 PID 828 wrote to memory of 2712 828 rundll32.exe 40 PID 828 wrote to memory of 2712 828 rundll32.exe 40 PID 828 wrote to memory of 2820 828 rundll32.exe 42 PID 828 wrote to memory of 2820 828 rundll32.exe 42 PID 828 wrote to memory of 2820 828 rundll32.exe 42 PID 828 wrote to memory of 2820 828 rundll32.exe 42 PID 828 wrote to memory of 2236 828 rundll32.exe 44 PID 828 wrote to memory of 2236 828 rundll32.exe 44 PID 828 wrote to memory of 2236 828 rundll32.exe 44 PID 828 wrote to memory of 2236 828 rundll32.exe 44 PID 828 wrote to memory of 2352 828 rundll32.exe 46 PID 828 wrote to memory of 2352 828 rundll32.exe 46 PID 828 wrote to memory of 2352 828 rundll32.exe 46 PID 828 wrote to memory of 2352 828 rundll32.exe 46 PID 828 wrote to memory of 1104 828 rundll32.exe 50 PID 828 wrote to memory of 1104 828 rundll32.exe 50 PID 828 wrote to memory of 1104 828 rundll32.exe 50 PID 828 wrote to memory of 1104 828 rundll32.exe 50
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8bdd484400f707cb401b4d354039dc08b4d5603f75799a1374100c1bfb7d031bN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8bdd484400f707cb401b4d354039dc08b4d5603f75799a1374100c1bfb7d031bN.dll,#12⤵
- Blocklisted process makes network request
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 55-b3-b0-69-d3-f33⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1884
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 d0-5f-ac-55-97-e13⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-
C:\Windows\SysWOW64\arp.exearp -s 136.243.76.21 b4-64-0c-2e-06-d03⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 a0-cc-7e-7d-41-2b3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:492
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 9d-ee-c8-61-3a-da3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 0b-4a-50-87-39-9a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 4e-cd-e0-6a-46-ad3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 42-83-e4-17-17-613⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
C:\Windows\SysWOW64\arp.exearp -d3⤵
- System Location Discovery: System Language Discovery
PID:1104
-
-