Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 03:28
Behavioral task
behavioral1
Sample
8bdd484400f707cb401b4d354039dc08b4d5603f75799a1374100c1bfb7d031bN.dll
Resource
win7-20240729-en
10 signatures
120 seconds
General
-
Target
8bdd484400f707cb401b4d354039dc08b4d5603f75799a1374100c1bfb7d031bN.dll
-
Size
80KB
-
MD5
c7f3377444bf889f1e0ed4943f0a6650
-
SHA1
cc528788fac8a5f1db4635abd21bce83c16ef786
-
SHA256
8bdd484400f707cb401b4d354039dc08b4d5603f75799a1374100c1bfb7d031b
-
SHA512
feb5062fb4a28d69ac109fd9c01a53c648e2e7a8fccf967ef18806faf13d26a69448555eba7f9ac430c189e99bed845fc3404d3882b7e61d56292a6ddd87b883
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEd:5dbwovEVyqgoZmZXWfIdQdRaefPC
Malware Config
Signatures
-
pid Process 2708 arp.exe 1456 arp.exe 1884 arp.exe 840 arp.exe 2752 arp.exe 1336 arp.exe 4764 arp.exe 4976 arp.exe 628 arp.exe -
resource yara_rule behavioral2/memory/2368-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/2368-2-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 680 2368 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2368 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3484 wrote to memory of 2368 3484 rundll32.exe 82 PID 3484 wrote to memory of 2368 3484 rundll32.exe 82 PID 3484 wrote to memory of 2368 3484 rundll32.exe 82 PID 2368 wrote to memory of 2708 2368 rundll32.exe 84 PID 2368 wrote to memory of 2708 2368 rundll32.exe 84 PID 2368 wrote to memory of 2708 2368 rundll32.exe 84 PID 2368 wrote to memory of 4764 2368 rundll32.exe 87 PID 2368 wrote to memory of 4764 2368 rundll32.exe 87 PID 2368 wrote to memory of 4764 2368 rundll32.exe 87 PID 2368 wrote to memory of 628 2368 rundll32.exe 88 PID 2368 wrote to memory of 628 2368 rundll32.exe 88 PID 2368 wrote to memory of 628 2368 rundll32.exe 88 PID 2368 wrote to memory of 4976 2368 rundll32.exe 89 PID 2368 wrote to memory of 4976 2368 rundll32.exe 89 PID 2368 wrote to memory of 4976 2368 rundll32.exe 89 PID 2368 wrote to memory of 1336 2368 rundll32.exe 90 PID 2368 wrote to memory of 1336 2368 rundll32.exe 90 PID 2368 wrote to memory of 1336 2368 rundll32.exe 90 PID 2368 wrote to memory of 2752 2368 rundll32.exe 91 PID 2368 wrote to memory of 2752 2368 rundll32.exe 91 PID 2368 wrote to memory of 2752 2368 rundll32.exe 91 PID 2368 wrote to memory of 840 2368 rundll32.exe 92 PID 2368 wrote to memory of 840 2368 rundll32.exe 92 PID 2368 wrote to memory of 840 2368 rundll32.exe 92 PID 2368 wrote to memory of 1456 2368 rundll32.exe 93 PID 2368 wrote to memory of 1456 2368 rundll32.exe 93 PID 2368 wrote to memory of 1456 2368 rundll32.exe 93 PID 2368 wrote to memory of 1884 2368 rundll32.exe 94 PID 2368 wrote to memory of 1884 2368 rundll32.exe 94 PID 2368 wrote to memory of 1884 2368 rundll32.exe 94
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8bdd484400f707cb401b4d354039dc08b4d5603f75799a1374100c1bfb7d031bN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8bdd484400f707cb401b4d354039dc08b4d5603f75799a1374100c1bfb7d031bN.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2708
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 55-b3-b0-69-d3-f33⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4764
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 d0-5f-ac-55-97-e13⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:628
-
-
C:\Windows\SysWOW64\arp.exearp -s 37.27.61.180 b4-64-0c-2e-06-d03⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4976
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 a0-cc-7e-7d-41-2b3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1336
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 9d-ee-c8-61-3a-da3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2752
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 0b-4a-50-87-39-9a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:840
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 4e-cd-e0-6a-46-ad3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1456
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 42-83-e4-17-17-613⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2368 -s 7003⤵
- Program crash
PID:680
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2368 -ip 23681⤵PID:2276