Analysis

  • max time kernel
    142s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • submitted
    09/08/2022, 16:55 UTC

General

  • Target

    4952a2b2bd5b557db6798946e03b8264.exe

  • Size

    158KB

  • MD5

    4952a2b2bd5b557db6798946e03b8264

  • SHA1

    80689d4742b237456dbaf2f5129a9452d18a02b4

  • SHA256

    b20df532e15674feb9da8728664caa14c6447f4473f2d64f6052de6af0737b3f

  • SHA512

    363178c39a43c7048a264a9d6aa0f64bc25a3b4ab752dd411dac40eef4acdec309d11ade25c6ae3e3ef50398d35ac36cecc302582ace0fd2b34b471e1f0b0bcd

  • SSDEEP

    3072:VbRJ+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPl8a8Y:VbR80ODhTEPgnjuIJzo+PPcfPt8

Malware Config

Extracted

Family

arrowrat

Botnet

Client

C2

213.59.119.25:1337

Mutex

SBAyMWVxF

Signatures

  • ArrowRat

    Remote access tool with various capabilities first seen in late 2021.

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of FindShellTrayWindow 24 IoCs
  • Suspicious use of SendNotifyMessage 16 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4952a2b2bd5b557db6798946e03b8264.exe
    "C:\Users\Admin\AppData\Local\Temp\4952a2b2bd5b557db6798946e03b8264.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1604
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      2⤵
      • Modifies Installed Components in the registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1336
      • C:\Windows\system32\ctfmon.exe
        ctfmon.exe
        3⤵
          PID:1224
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 213.59.119.25 1337 SBAyMWVxF
        2⤵
          PID:1332
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 213.59.119.25 1337 SBAyMWVxF
          2⤵
            PID:272
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 213.59.119.25 1337 SBAyMWVxF
            2⤵
              PID:1912
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 213.59.119.25 1337 SBAyMWVxF
              2⤵
                PID:1924
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 213.59.119.25 1337 SBAyMWVxF
                2⤵
                  PID:756
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 213.59.119.25 1337 SBAyMWVxF
                  2⤵
                    PID:468
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 213.59.119.25 1337 SBAyMWVxF
                    2⤵
                      PID:648
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 213.59.119.25 1337 SBAyMWVxF
                      2⤵
                        PID:1168
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 213.59.119.25 1337 SBAyMWVxF
                        2⤵
                          PID:1164
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 213.59.119.25 1337 SBAyMWVxF
                          2⤵
                            PID:1796
                        • C:\Windows\system32\AUDIODG.EXE
                          C:\Windows\system32\AUDIODG.EXE 0x1d0
                          1⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1200

                        Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • memory/1336-56-0x000007FEFBCF1000-0x000007FEFBCF3000-memory.dmp

                          Filesize

                          8KB

                        • memory/1336-58-0x0000000002770000-0x0000000002780000-memory.dmp

                          Filesize

                          64KB

                        • memory/1604-54-0x00000000001B0000-0x00000000001DE000-memory.dmp

                          Filesize

                          184KB

                        We care about your privacy.

                        This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.