Analysis
-
max time kernel
93s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/01/2025, 03:44
Behavioral task
behavioral1
Sample
6af6a0a413641069fc7338e1683a1b73b4400459efd8f6c681f57590ee0a250b.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
6af6a0a413641069fc7338e1683a1b73b4400459efd8f6c681f57590ee0a250b.dll
Resource
win10v2004-20241007-en
General
-
Target
6af6a0a413641069fc7338e1683a1b73b4400459efd8f6c681f57590ee0a250b.dll
-
Size
81KB
-
MD5
6bb30576e16ec5c1d1e9d47ed79843b6
-
SHA1
6ffa3c6d61ee1b2410327621ceb35910ce55c8a2
-
SHA256
6af6a0a413641069fc7338e1683a1b73b4400459efd8f6c681f57590ee0a250b
-
SHA512
aa4bd5cb6d465c05443d84c1ff589d09c3a8a77f72db5de35406f59b16549ae711846ac1c5f410fa891601b3626d8dfb4ef56630a28c2281d2e66c962e4c3c40
-
SSDEEP
1536:T2RW5De37NXJNnuMJldOdZ+PgE056PRhIZj1C0McIMMjBwySXX:CRW5DUuIdP/s6ZhIZjMRcsjKySn
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
pid Process 756 arp.exe 4764 arp.exe 3084 arp.exe 2688 arp.exe 4140 arp.exe 1772 arp.exe 4620 arp.exe 4600 arp.exe 1996 arp.exe -
resource yara_rule behavioral2/memory/4352-0-0x0000000010000000-0x0000000010032000-memory.dmp upx behavioral2/memory/4352-1-0x0000000010000000-0x0000000010032000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3436 4352 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4352 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3656 wrote to memory of 4352 3656 rundll32.exe 82 PID 3656 wrote to memory of 4352 3656 rundll32.exe 82 PID 3656 wrote to memory of 4352 3656 rundll32.exe 82 PID 4352 wrote to memory of 1996 4352 rundll32.exe 83 PID 4352 wrote to memory of 1996 4352 rundll32.exe 83 PID 4352 wrote to memory of 1996 4352 rundll32.exe 83 PID 4352 wrote to memory of 4600 4352 rundll32.exe 87 PID 4352 wrote to memory of 4600 4352 rundll32.exe 87 PID 4352 wrote to memory of 4600 4352 rundll32.exe 87 PID 4352 wrote to memory of 3084 4352 rundll32.exe 88 PID 4352 wrote to memory of 3084 4352 rundll32.exe 88 PID 4352 wrote to memory of 3084 4352 rundll32.exe 88 PID 4352 wrote to memory of 4620 4352 rundll32.exe 89 PID 4352 wrote to memory of 4620 4352 rundll32.exe 89 PID 4352 wrote to memory of 4620 4352 rundll32.exe 89 PID 4352 wrote to memory of 4764 4352 rundll32.exe 90 PID 4352 wrote to memory of 4764 4352 rundll32.exe 90 PID 4352 wrote to memory of 4764 4352 rundll32.exe 90 PID 4352 wrote to memory of 1772 4352 rundll32.exe 91 PID 4352 wrote to memory of 1772 4352 rundll32.exe 91 PID 4352 wrote to memory of 1772 4352 rundll32.exe 91 PID 4352 wrote to memory of 756 4352 rundll32.exe 92 PID 4352 wrote to memory of 756 4352 rundll32.exe 92 PID 4352 wrote to memory of 756 4352 rundll32.exe 92 PID 4352 wrote to memory of 2688 4352 rundll32.exe 93 PID 4352 wrote to memory of 2688 4352 rundll32.exe 93 PID 4352 wrote to memory of 2688 4352 rundll32.exe 93 PID 4352 wrote to memory of 4140 4352 rundll32.exe 94 PID 4352 wrote to memory of 4140 4352 rundll32.exe 94 PID 4352 wrote to memory of 4140 4352 rundll32.exe 94
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6af6a0a413641069fc7338e1683a1b73b4400459efd8f6c681f57590ee0a250b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6af6a0a413641069fc7338e1683a1b73b4400459efd8f6c681f57590ee0a250b.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1996
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 ce-21-ab-c1-7a-f73⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4600
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 e9-bf-bb-4b-5f-843⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3084
-
-
C:\Windows\SysWOW64\arp.exearp -s 136.243.69.123 a4-44-1f-2f-72-3e3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4620
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 2a-e8-3c-ea-6e-0b3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4764
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 49-f0-21-db-4d-033⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1772
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 ad-73-75-1f-76-dd3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:756
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 fc-22-02-8e-99-d23⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2688
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 4d-50-8f-43-ff-af3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4352 -s 7283⤵
- Program crash
PID:3436
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4352 -ip 43521⤵PID:4656