Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-02-2025 08:11
Behavioral task
behavioral1
Sample
f9a7636d26a7f815e8be066a51a3682612cdcd7887da1c2363c1a734d7b0f1ac.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f9a7636d26a7f815e8be066a51a3682612cdcd7887da1c2363c1a734d7b0f1ac.dll
Resource
win10v2004-20250217-en
General
-
Target
f9a7636d26a7f815e8be066a51a3682612cdcd7887da1c2363c1a734d7b0f1ac.dll
-
Size
80KB
-
MD5
7b0d572ae529ebe826c10d93d3176ff9
-
SHA1
872d3e48ea0e4507d33bbd529830dee8cb811d32
-
SHA256
f9a7636d26a7f815e8be066a51a3682612cdcd7887da1c2363c1a734d7b0f1ac
-
SHA512
1c03d94fed70494746aa2bdb55459a17a43b673d7f108ccb8b37478dd2e27e45703b62d4dd5162f06afdfe77ba71c739db93392bbbb2b2c6516558ee1f6c2b5f
-
SSDEEP
1536:uIcs6msUvrh8ErMInQ+4cw9NVWfjaRkE4LEl8B60Y2lfxxHZPE1ossZDuN:dcs6v68Erj3w9zWf+SEFuk0/pfPtsc8
Malware Config
Signatures
-
pid Process 2796 arp.exe 1508 arp.exe 3048 arp.exe 2812 arp.exe 2136 arp.exe 2936 arp.exe -
resource yara_rule behavioral1/memory/2940-2-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2940-1-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2940-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2940-10-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2132 2940 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2940 rundll32.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2940 2732 rundll32.exe 30 PID 2732 wrote to memory of 2940 2732 rundll32.exe 30 PID 2732 wrote to memory of 2940 2732 rundll32.exe 30 PID 2732 wrote to memory of 2940 2732 rundll32.exe 30 PID 2732 wrote to memory of 2940 2732 rundll32.exe 30 PID 2732 wrote to memory of 2940 2732 rundll32.exe 30 PID 2732 wrote to memory of 2940 2732 rundll32.exe 30 PID 2940 wrote to memory of 2132 2940 rundll32.exe 31 PID 2940 wrote to memory of 2132 2940 rundll32.exe 31 PID 2940 wrote to memory of 2132 2940 rundll32.exe 31 PID 2940 wrote to memory of 2132 2940 rundll32.exe 31 PID 2940 wrote to memory of 2796 2940 rundll32.exe 32 PID 2940 wrote to memory of 2796 2940 rundll32.exe 32 PID 2940 wrote to memory of 2796 2940 rundll32.exe 32 PID 2940 wrote to memory of 2796 2940 rundll32.exe 32 PID 2940 wrote to memory of 1508 2940 rundll32.exe 34 PID 2940 wrote to memory of 1508 2940 rundll32.exe 34 PID 2940 wrote to memory of 1508 2940 rundll32.exe 34 PID 2940 wrote to memory of 1508 2940 rundll32.exe 34 PID 2940 wrote to memory of 3048 2940 rundll32.exe 35 PID 2940 wrote to memory of 3048 2940 rundll32.exe 35 PID 2940 wrote to memory of 3048 2940 rundll32.exe 35 PID 2940 wrote to memory of 3048 2940 rundll32.exe 35 PID 2940 wrote to memory of 2812 2940 rundll32.exe 36 PID 2940 wrote to memory of 2812 2940 rundll32.exe 36 PID 2940 wrote to memory of 2812 2940 rundll32.exe 36 PID 2940 wrote to memory of 2812 2940 rundll32.exe 36 PID 2940 wrote to memory of 2936 2940 rundll32.exe 37 PID 2940 wrote to memory of 2936 2940 rundll32.exe 37 PID 2940 wrote to memory of 2936 2940 rundll32.exe 37 PID 2940 wrote to memory of 2936 2940 rundll32.exe 37
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f9a7636d26a7f815e8be066a51a3682612cdcd7887da1c2363c1a734d7b0f1ac.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f9a7636d26a7f815e8be066a51a3682612cdcd7887da1c2363c1a734d7b0f1ac.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2940 -s 2483⤵
- Program crash
PID:2132
-
-
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2796
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 7b-07-d2-92-5a-5e3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1508
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 57-02-81-46-e8-123⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3048
-
-
C:\Windows\SysWOW64\arp.exearp -s 154.61.71.51 f6-aa-fb-08-8e-7c3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2812
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 7a-e6-a4-9b-6a-393⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2936
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 78-fd-04-b9-ba-603⤵
- Network Service Discovery
PID:2136
-
-