Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 16:03
Behavioral task
behavioral1
Sample
7a9a3fd578f6afc407adc349f69ce2f3837e32542cede71ca9f6c54bd42240f6.dll
Resource
win7-20240903-en
6 signatures
120 seconds
General
-
Target
7a9a3fd578f6afc407adc349f69ce2f3837e32542cede71ca9f6c54bd42240f6.dll
-
Size
80KB
-
MD5
6093e4f82d4e5eb25e1a0ea94c0c974b
-
SHA1
78ea831fceddb4ceed87aab1da4f4536899609e4
-
SHA256
7a9a3fd578f6afc407adc349f69ce2f3837e32542cede71ca9f6c54bd42240f6
-
SHA512
1e7f04067c053b4cb469baac582b7266cf78c5fedfbb7c675473ddf9091af6320f8bc265cbbb2ccb42e36acaac550336b64d2d2f8f4475f47080957ccf8495cd
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPE6S8X8:5dbwovEVyqgoZmZXWfIdQdRaefPLX8
Malware Config
Signatures
-
pid Process 2480 arp.exe 2656 arp.exe 2860 arp.exe 2696 arp.exe 2684 arp.exe 2832 arp.exe 2792 arp.exe 2764 arp.exe 2396 arp.exe -
resource yara_rule behavioral1/memory/2456-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2456-2-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2292 2456 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2456 rundll32.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2456 2512 rundll32.exe 31 PID 2512 wrote to memory of 2456 2512 rundll32.exe 31 PID 2512 wrote to memory of 2456 2512 rundll32.exe 31 PID 2512 wrote to memory of 2456 2512 rundll32.exe 31 PID 2512 wrote to memory of 2456 2512 rundll32.exe 31 PID 2512 wrote to memory of 2456 2512 rundll32.exe 31 PID 2512 wrote to memory of 2456 2512 rundll32.exe 31 PID 2456 wrote to memory of 2292 2456 rundll32.exe 32 PID 2456 wrote to memory of 2292 2456 rundll32.exe 32 PID 2456 wrote to memory of 2292 2456 rundll32.exe 32 PID 2456 wrote to memory of 2292 2456 rundll32.exe 32 PID 2456 wrote to memory of 2480 2456 rundll32.exe 33 PID 2456 wrote to memory of 2480 2456 rundll32.exe 33 PID 2456 wrote to memory of 2480 2456 rundll32.exe 33 PID 2456 wrote to memory of 2480 2456 rundll32.exe 33 PID 2456 wrote to memory of 2656 2456 rundll32.exe 35 PID 2456 wrote to memory of 2656 2456 rundll32.exe 35 PID 2456 wrote to memory of 2656 2456 rundll32.exe 35 PID 2456 wrote to memory of 2656 2456 rundll32.exe 35 PID 2456 wrote to memory of 2396 2456 rundll32.exe 36 PID 2456 wrote to memory of 2396 2456 rundll32.exe 36 PID 2456 wrote to memory of 2396 2456 rundll32.exe 36 PID 2456 wrote to memory of 2396 2456 rundll32.exe 36 PID 2456 wrote to memory of 2684 2456 rundll32.exe 37 PID 2456 wrote to memory of 2684 2456 rundll32.exe 37 PID 2456 wrote to memory of 2684 2456 rundll32.exe 37 PID 2456 wrote to memory of 2684 2456 rundll32.exe 37 PID 2456 wrote to memory of 2696 2456 rundll32.exe 38 PID 2456 wrote to memory of 2696 2456 rundll32.exe 38 PID 2456 wrote to memory of 2696 2456 rundll32.exe 38 PID 2456 wrote to memory of 2696 2456 rundll32.exe 38 PID 2456 wrote to memory of 2764 2456 rundll32.exe 39 PID 2456 wrote to memory of 2764 2456 rundll32.exe 39 PID 2456 wrote to memory of 2764 2456 rundll32.exe 39 PID 2456 wrote to memory of 2764 2456 rundll32.exe 39 PID 2456 wrote to memory of 2792 2456 rundll32.exe 41 PID 2456 wrote to memory of 2792 2456 rundll32.exe 41 PID 2456 wrote to memory of 2792 2456 rundll32.exe 41 PID 2456 wrote to memory of 2792 2456 rundll32.exe 41 PID 2456 wrote to memory of 2832 2456 rundll32.exe 42 PID 2456 wrote to memory of 2832 2456 rundll32.exe 42 PID 2456 wrote to memory of 2832 2456 rundll32.exe 42 PID 2456 wrote to memory of 2832 2456 rundll32.exe 42 PID 2456 wrote to memory of 2860 2456 rundll32.exe 43 PID 2456 wrote to memory of 2860 2456 rundll32.exe 43 PID 2456 wrote to memory of 2860 2456 rundll32.exe 43 PID 2456 wrote to memory of 2860 2456 rundll32.exe 43
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7a9a3fd578f6afc407adc349f69ce2f3837e32542cede71ca9f6c54bd42240f6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7a9a3fd578f6afc407adc349f69ce2f3837e32542cede71ca9f6c54bd42240f6.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 3083⤵
- Program crash
PID:2292
-
-
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2480
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 bb-7e-dc-5e-4d-2f3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2656
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 1c-7b-cf-72-b0-4c3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2396
-
-
C:\Windows\SysWOW64\arp.exearp -s 49.12.169.208 6c-8d-7e-ea-10-7a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2684
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 28-95-7d-bb-d6-5c3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2696
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 d1-7b-22-cc-0a-093⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2764
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 ab-c0-83-72-ff-5e3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2792
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 26-da-28-b7-11-383⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2832
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 1c-f9-f4-36-30-cb3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2860
-
-