Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20/01/2025, 03:44
Behavioral task
behavioral1
Sample
6af6a0a413641069fc7338e1683a1b73b4400459efd8f6c681f57590ee0a250b.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
6af6a0a413641069fc7338e1683a1b73b4400459efd8f6c681f57590ee0a250b.dll
Resource
win10v2004-20241007-en
General
-
Target
6af6a0a413641069fc7338e1683a1b73b4400459efd8f6c681f57590ee0a250b.dll
-
Size
81KB
-
MD5
6bb30576e16ec5c1d1e9d47ed79843b6
-
SHA1
6ffa3c6d61ee1b2410327621ceb35910ce55c8a2
-
SHA256
6af6a0a413641069fc7338e1683a1b73b4400459efd8f6c681f57590ee0a250b
-
SHA512
aa4bd5cb6d465c05443d84c1ff589d09c3a8a77f72db5de35406f59b16549ae711846ac1c5f410fa891601b3626d8dfb4ef56630a28c2281d2e66c962e4c3c40
-
SSDEEP
1536:T2RW5De37NXJNnuMJldOdZ+PgE056PRhIZj1C0McIMMjBwySXX:CRW5DUuIdP/s6ZhIZjMRcsjKySn
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 4 2848 rundll32.exe 8 2848 rundll32.exe 9 2848 rundll32.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: rundll32.exe -
pid Process 2456 arp.exe 3044 arp.exe 3032 arp.exe 2796 arp.exe 2180 arp.exe 2916 arp.exe 2060 arp.exe 2640 arp.exe 3064 arp.exe -
resource yara_rule behavioral1/memory/2848-1-0x0000000010000000-0x0000000010032000-memory.dmp upx behavioral1/memory/2848-0-0x0000000010000000-0x0000000010032000-memory.dmp upx behavioral1/memory/2180-2-0x0000000010000000-0x0000000010032000-memory.dmp upx behavioral1/memory/2180-4-0x0000000010000000-0x0000000010032000-memory.dmp upx behavioral1/memory/2456-5-0x0000000010000000-0x0000000010032000-memory.dmp upx behavioral1/memory/2796-12-0x0000000010000000-0x0000000010032000-memory.dmp upx behavioral1/memory/2640-11-0x0000000010000000-0x0000000010032000-memory.dmp upx behavioral1/memory/3044-10-0x0000000010000000-0x0000000010032000-memory.dmp upx behavioral1/memory/3064-9-0x0000000010000000-0x0000000010032000-memory.dmp upx behavioral1/memory/2916-8-0x0000000010000000-0x0000000010032000-memory.dmp upx behavioral1/memory/2060-7-0x0000000010000000-0x0000000010032000-memory.dmp upx behavioral1/memory/3032-6-0x0000000010000000-0x0000000010032000-memory.dmp upx behavioral1/memory/3032-13-0x0000000010000000-0x0000000010032000-memory.dmp upx behavioral1/memory/2060-18-0x0000000010000000-0x0000000010032000-memory.dmp upx behavioral1/memory/2916-27-0x0000000010000000-0x0000000010032000-memory.dmp upx behavioral1/memory/2640-26-0x0000000010000000-0x0000000010032000-memory.dmp upx behavioral1/memory/2796-23-0x0000000010000000-0x0000000010032000-memory.dmp upx behavioral1/memory/2456-22-0x0000000010000000-0x0000000010032000-memory.dmp upx behavioral1/memory/3044-19-0x0000000010000000-0x0000000010032000-memory.dmp upx behavioral1/memory/3064-15-0x0000000010000000-0x0000000010032000-memory.dmp upx behavioral1/memory/2848-29-0x0000000010000000-0x0000000010032000-memory.dmp upx behavioral1/memory/980-31-0x0000000010000000-0x0000000010032000-memory.dmp upx behavioral1/memory/980-33-0x0000000010000000-0x0000000010032000-memory.dmp upx behavioral1/memory/2848-38-0x0000000010000000-0x0000000010032000-memory.dmp upx behavioral1/memory/2848-40-0x0000000010000000-0x0000000010032000-memory.dmp upx behavioral1/memory/2848-42-0x0000000010000000-0x0000000010032000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 468 Process not Found 468 Process not Found -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 2848 rundll32.exe Token: SeDebugPrivilege 2180 arp.exe Token: SeDebugPrivilege 3032 arp.exe Token: SeDebugPrivilege 2060 arp.exe Token: SeDebugPrivilege 2916 arp.exe Token: SeDebugPrivilege 3064 arp.exe Token: SeDebugPrivilege 3044 arp.exe Token: SeDebugPrivilege 2796 arp.exe Token: SeDebugPrivilege 2640 arp.exe Token: SeDebugPrivilege 2456 arp.exe Token: SeDebugPrivilege 980 arp.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2848 2760 rundll32.exe 30 PID 2760 wrote to memory of 2848 2760 rundll32.exe 30 PID 2760 wrote to memory of 2848 2760 rundll32.exe 30 PID 2760 wrote to memory of 2848 2760 rundll32.exe 30 PID 2760 wrote to memory of 2848 2760 rundll32.exe 30 PID 2760 wrote to memory of 2848 2760 rundll32.exe 30 PID 2760 wrote to memory of 2848 2760 rundll32.exe 30 PID 2848 wrote to memory of 2180 2848 rundll32.exe 31 PID 2848 wrote to memory of 2180 2848 rundll32.exe 31 PID 2848 wrote to memory of 2180 2848 rundll32.exe 31 PID 2848 wrote to memory of 2180 2848 rundll32.exe 31 PID 2848 wrote to memory of 2456 2848 rundll32.exe 33 PID 2848 wrote to memory of 2456 2848 rundll32.exe 33 PID 2848 wrote to memory of 2456 2848 rundll32.exe 33 PID 2848 wrote to memory of 2456 2848 rundll32.exe 33 PID 2848 wrote to memory of 3064 2848 rundll32.exe 34 PID 2848 wrote to memory of 3064 2848 rundll32.exe 34 PID 2848 wrote to memory of 3064 2848 rundll32.exe 34 PID 2848 wrote to memory of 3064 2848 rundll32.exe 34 PID 2848 wrote to memory of 2916 2848 rundll32.exe 36 PID 2848 wrote to memory of 2916 2848 rundll32.exe 36 PID 2848 wrote to memory of 2916 2848 rundll32.exe 36 PID 2848 wrote to memory of 2916 2848 rundll32.exe 36 PID 2848 wrote to memory of 3044 2848 rundll32.exe 38 PID 2848 wrote to memory of 3044 2848 rundll32.exe 38 PID 2848 wrote to memory of 3044 2848 rundll32.exe 38 PID 2848 wrote to memory of 3044 2848 rundll32.exe 38 PID 2848 wrote to memory of 3032 2848 rundll32.exe 40 PID 2848 wrote to memory of 3032 2848 rundll32.exe 40 PID 2848 wrote to memory of 3032 2848 rundll32.exe 40 PID 2848 wrote to memory of 3032 2848 rundll32.exe 40 PID 2848 wrote to memory of 2796 2848 rundll32.exe 42 PID 2848 wrote to memory of 2796 2848 rundll32.exe 42 PID 2848 wrote to memory of 2796 2848 rundll32.exe 42 PID 2848 wrote to memory of 2796 2848 rundll32.exe 42 PID 2848 wrote to memory of 2060 2848 rundll32.exe 44 PID 2848 wrote to memory of 2060 2848 rundll32.exe 44 PID 2848 wrote to memory of 2060 2848 rundll32.exe 44 PID 2848 wrote to memory of 2060 2848 rundll32.exe 44 PID 2848 wrote to memory of 2640 2848 rundll32.exe 46 PID 2848 wrote to memory of 2640 2848 rundll32.exe 46 PID 2848 wrote to memory of 2640 2848 rundll32.exe 46 PID 2848 wrote to memory of 2640 2848 rundll32.exe 46 PID 2848 wrote to memory of 980 2848 rundll32.exe 49 PID 2848 wrote to memory of 980 2848 rundll32.exe 49 PID 2848 wrote to memory of 980 2848 rundll32.exe 49 PID 2848 wrote to memory of 980 2848 rundll32.exe 49
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6af6a0a413641069fc7338e1683a1b73b4400459efd8f6c681f57590ee0a250b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6af6a0a413641069fc7338e1683a1b73b4400459efd8f6c681f57590ee0a250b.dll,#12⤵
- Blocklisted process makes network request
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2180
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 2c-e7-6f-dd-a3-8e3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 c0-85-ff-f6-70-c53⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
C:\Windows\SysWOW64\arp.exearp -s 154.61.71.51 4a-61-4c-a7-8b-9c3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 5d-13-dd-12-93-873⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 f2-84-a9-d0-5e-ae3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3032
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 67-bc-9d-95-e7-1e3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 6c-1d-12-8e-5b-3f3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 69-62-ef-29-58-9e3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
C:\Windows\SysWOW64\arp.exearp -d3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:980
-
-