Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 22:21
Behavioral task
behavioral1
Sample
cdfc0b6a467e423501ec14955242c6040f1cb04d411877246f1333a2b47744c4.dll
Resource
win7-20240708-en
General
-
Target
cdfc0b6a467e423501ec14955242c6040f1cb04d411877246f1333a2b47744c4.dll
-
Size
80KB
-
MD5
cb35f60dc2f19026baa253a2b1f52e5b
-
SHA1
931e5cb9ef1588ea968e8d86292e19dffe61b94e
-
SHA256
cdfc0b6a467e423501ec14955242c6040f1cb04d411877246f1333a2b47744c4
-
SHA512
74b59d4514c492ca496892019c3eb2131950d5d7e28ae7e2ca8e0c4728e336fc09a4131c47adf86b0387d50ec2325bced844e8e9a50970f58fe39cd34f6fd6e4
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEl:5dbwovEVyqgoZmZXWfIdQdRaefPS
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
pid Process 2060 arp.exe 1744 arp.exe 2812 arp.exe 2600 arp.exe 2844 arp.exe 2568 arp.exe 2592 arp.exe 2848 arp.exe 2744 arp.exe -
resource yara_rule behavioral1/memory/2656-2-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2656-1-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2844-3-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2844-5-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2656-7-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2568-11-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2568-16-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2812-15-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2600-13-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2848-12-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1744-10-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2744-9-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2592-8-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2744-22-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1744-20-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2592-19-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2600-26-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2848-25-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2812-28-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2060-29-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2060-30-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2856 2656 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2656 rundll32.exe Token: SeDebugPrivilege 2844 arp.exe Token: SeDebugPrivilege 2592 arp.exe Token: SeDebugPrivilege 1744 arp.exe Token: SeDebugPrivilege 2568 arp.exe Token: SeDebugPrivilege 2848 arp.exe Token: SeDebugPrivilege 2060 arp.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2656 2080 rundll32.exe 30 PID 2080 wrote to memory of 2656 2080 rundll32.exe 30 PID 2080 wrote to memory of 2656 2080 rundll32.exe 30 PID 2080 wrote to memory of 2656 2080 rundll32.exe 30 PID 2080 wrote to memory of 2656 2080 rundll32.exe 30 PID 2080 wrote to memory of 2656 2080 rundll32.exe 30 PID 2080 wrote to memory of 2656 2080 rundll32.exe 30 PID 2656 wrote to memory of 2844 2656 rundll32.exe 31 PID 2656 wrote to memory of 2844 2656 rundll32.exe 31 PID 2656 wrote to memory of 2844 2656 rundll32.exe 31 PID 2656 wrote to memory of 2844 2656 rundll32.exe 31 PID 2656 wrote to memory of 2856 2656 rundll32.exe 32 PID 2656 wrote to memory of 2856 2656 rundll32.exe 32 PID 2656 wrote to memory of 2856 2656 rundll32.exe 32 PID 2656 wrote to memory of 2856 2656 rundll32.exe 32 PID 2656 wrote to memory of 2744 2656 rundll32.exe 34 PID 2656 wrote to memory of 2744 2656 rundll32.exe 34 PID 2656 wrote to memory of 2744 2656 rundll32.exe 34 PID 2656 wrote to memory of 2744 2656 rundll32.exe 34 PID 2656 wrote to memory of 2568 2656 rundll32.exe 35 PID 2656 wrote to memory of 2568 2656 rundll32.exe 35 PID 2656 wrote to memory of 2568 2656 rundll32.exe 35 PID 2656 wrote to memory of 2568 2656 rundll32.exe 35 PID 2656 wrote to memory of 2060 2656 rundll32.exe 36 PID 2656 wrote to memory of 2060 2656 rundll32.exe 36 PID 2656 wrote to memory of 2060 2656 rundll32.exe 36 PID 2656 wrote to memory of 2060 2656 rundll32.exe 36 PID 2656 wrote to memory of 1744 2656 rundll32.exe 37 PID 2656 wrote to memory of 1744 2656 rundll32.exe 37 PID 2656 wrote to memory of 1744 2656 rundll32.exe 37 PID 2656 wrote to memory of 1744 2656 rundll32.exe 37 PID 2656 wrote to memory of 2812 2656 rundll32.exe 38 PID 2656 wrote to memory of 2812 2656 rundll32.exe 38 PID 2656 wrote to memory of 2812 2656 rundll32.exe 38 PID 2656 wrote to memory of 2812 2656 rundll32.exe 38 PID 2656 wrote to memory of 2592 2656 rundll32.exe 39 PID 2656 wrote to memory of 2592 2656 rundll32.exe 39 PID 2656 wrote to memory of 2592 2656 rundll32.exe 39 PID 2656 wrote to memory of 2592 2656 rundll32.exe 39 PID 2656 wrote to memory of 2600 2656 rundll32.exe 40 PID 2656 wrote to memory of 2600 2656 rundll32.exe 40 PID 2656 wrote to memory of 2600 2656 rundll32.exe 40 PID 2656 wrote to memory of 2600 2656 rundll32.exe 40 PID 2656 wrote to memory of 2848 2656 rundll32.exe 41 PID 2656 wrote to memory of 2848 2656 rundll32.exe 41 PID 2656 wrote to memory of 2848 2656 rundll32.exe 41 PID 2656 wrote to memory of 2848 2656 rundll32.exe 41
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cdfc0b6a467e423501ec14955242c6040f1cb04d411877246f1333a2b47744c4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cdfc0b6a467e423501ec14955242c6040f1cb04d411877246f1333a2b47744c4.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 3443⤵
- Program crash
PID:2856
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 58-a7-62-82-3d-8d3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2744
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 36-01-c3-fb-7b-373⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
C:\Windows\SysWOW64\arp.exearp -s 37.27.61.185 4a-7a-25-37-fd-b93⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 5d-b9-04-26-c2-df3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1744
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 5c-74-59-80-32-153⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2812
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 34-fb-9d-eb-98-6c3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 f1-af-70-f1-f9-7c3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2600
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 22-5f-55-ec-ee-9d3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-