Analysis
-
max time kernel
92s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 16:03
Behavioral task
behavioral1
Sample
7a9a3fd578f6afc407adc349f69ce2f3837e32542cede71ca9f6c54bd42240f6.dll
Resource
win7-20240903-en
6 signatures
120 seconds
General
-
Target
7a9a3fd578f6afc407adc349f69ce2f3837e32542cede71ca9f6c54bd42240f6.dll
-
Size
80KB
-
MD5
6093e4f82d4e5eb25e1a0ea94c0c974b
-
SHA1
78ea831fceddb4ceed87aab1da4f4536899609e4
-
SHA256
7a9a3fd578f6afc407adc349f69ce2f3837e32542cede71ca9f6c54bd42240f6
-
SHA512
1e7f04067c053b4cb469baac582b7266cf78c5fedfbb7c675473ddf9091af6320f8bc265cbbb2ccb42e36acaac550336b64d2d2f8f4475f47080957ccf8495cd
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPE6S8X8:5dbwovEVyqgoZmZXWfIdQdRaefPLX8
Malware Config
Signatures
-
pid Process 2848 arp.exe 632 arp.exe 2880 arp.exe 4032 arp.exe 4572 arp.exe 3788 arp.exe 2632 arp.exe 3968 arp.exe 1740 arp.exe -
resource yara_rule behavioral2/memory/708-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/708-2-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4808 708 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 708 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1520 wrote to memory of 708 1520 rundll32.exe 83 PID 1520 wrote to memory of 708 1520 rundll32.exe 83 PID 1520 wrote to memory of 708 1520 rundll32.exe 83 PID 708 wrote to memory of 4572 708 rundll32.exe 84 PID 708 wrote to memory of 4572 708 rundll32.exe 84 PID 708 wrote to memory of 4572 708 rundll32.exe 84 PID 708 wrote to memory of 1740 708 rundll32.exe 88 PID 708 wrote to memory of 1740 708 rundll32.exe 88 PID 708 wrote to memory of 1740 708 rundll32.exe 88 PID 708 wrote to memory of 2848 708 rundll32.exe 89 PID 708 wrote to memory of 2848 708 rundll32.exe 89 PID 708 wrote to memory of 2848 708 rundll32.exe 89 PID 708 wrote to memory of 3788 708 rundll32.exe 90 PID 708 wrote to memory of 3788 708 rundll32.exe 90 PID 708 wrote to memory of 3788 708 rundll32.exe 90 PID 708 wrote to memory of 3968 708 rundll32.exe 91 PID 708 wrote to memory of 3968 708 rundll32.exe 91 PID 708 wrote to memory of 3968 708 rundll32.exe 91 PID 708 wrote to memory of 4032 708 rundll32.exe 92 PID 708 wrote to memory of 4032 708 rundll32.exe 92 PID 708 wrote to memory of 4032 708 rundll32.exe 92 PID 708 wrote to memory of 2880 708 rundll32.exe 93 PID 708 wrote to memory of 2880 708 rundll32.exe 93 PID 708 wrote to memory of 2880 708 rundll32.exe 93 PID 708 wrote to memory of 2632 708 rundll32.exe 94 PID 708 wrote to memory of 2632 708 rundll32.exe 94 PID 708 wrote to memory of 2632 708 rundll32.exe 94 PID 708 wrote to memory of 632 708 rundll32.exe 95 PID 708 wrote to memory of 632 708 rundll32.exe 95 PID 708 wrote to memory of 632 708 rundll32.exe 95
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7a9a3fd578f6afc407adc349f69ce2f3837e32542cede71ca9f6c54bd42240f6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7a9a3fd578f6afc407adc349f69ce2f3837e32542cede71ca9f6c54bd42240f6.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4572
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 e3-d4-26-5e-15-2c3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1740
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 97-a7-3b-6e-2f-dc3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2848
-
-
C:\Windows\SysWOW64\arp.exearp -s 37.27.61.184 93-86-40-a4-c0-1d3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3788
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 33-fc-23-34-6e-403⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3968
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 8a-1c-2b-28-47-3b3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4032
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 b3-93-c5-e9-6a-ee3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2880
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 42-fe-ea-fa-f4-aa3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2632
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 de-90-66-06-cc-6a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 708 -s 7123⤵
- Program crash
PID:4808
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 708 -ip 7081⤵PID:1780