Analysis
-
max time kernel
142s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220718-en -
submitted
09-08-2022 16:55
Static task
static1
Behavioral task
behavioral1
Sample
4952a2b2bd5b557db6798946e03b8264.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
4952a2b2bd5b557db6798946e03b8264.exe
Resource
win10v2004-20220721-en
General
-
Target
4952a2b2bd5b557db6798946e03b8264.exe
-
Size
158KB
-
MD5
4952a2b2bd5b557db6798946e03b8264
-
SHA1
80689d4742b237456dbaf2f5129a9452d18a02b4
-
SHA256
b20df532e15674feb9da8728664caa14c6447f4473f2d64f6052de6af0737b3f
-
SHA512
363178c39a43c7048a264a9d6aa0f64bc25a3b4ab752dd411dac40eef4acdec309d11ade25c6ae3e3ef50398d35ac36cecc302582ace0fd2b34b471e1f0b0bcd
-
SSDEEP
3072:VbRJ+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPl8a8Y:VbR80ODhTEPgnjuIJzo+PPcfPt8
Malware Config
Extracted
arrowrat
Client
213.59.119.25:1337
SBAyMWVxF
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies registry class 5 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
4952a2b2bd5b557db6798946e03b8264.exepid process 1604 4952a2b2bd5b557db6798946e03b8264.exe 1604 4952a2b2bd5b557db6798946e03b8264.exe 1604 4952a2b2bd5b557db6798946e03b8264.exe 1604 4952a2b2bd5b557db6798946e03b8264.exe 1604 4952a2b2bd5b557db6798946e03b8264.exe 1604 4952a2b2bd5b557db6798946e03b8264.exe 1604 4952a2b2bd5b557db6798946e03b8264.exe 1604 4952a2b2bd5b557db6798946e03b8264.exe 1604 4952a2b2bd5b557db6798946e03b8264.exe 1604 4952a2b2bd5b557db6798946e03b8264.exe 1604 4952a2b2bd5b557db6798946e03b8264.exe 1604 4952a2b2bd5b557db6798946e03b8264.exe 1604 4952a2b2bd5b557db6798946e03b8264.exe 1604 4952a2b2bd5b557db6798946e03b8264.exe 1604 4952a2b2bd5b557db6798946e03b8264.exe 1604 4952a2b2bd5b557db6798946e03b8264.exe 1604 4952a2b2bd5b557db6798946e03b8264.exe 1604 4952a2b2bd5b557db6798946e03b8264.exe 1604 4952a2b2bd5b557db6798946e03b8264.exe 1604 4952a2b2bd5b557db6798946e03b8264.exe 1604 4952a2b2bd5b557db6798946e03b8264.exe 1604 4952a2b2bd5b557db6798946e03b8264.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
4952a2b2bd5b557db6798946e03b8264.exeexplorer.exeAUDIODG.EXEdescription pid process Token: SeDebugPrivilege 1604 4952a2b2bd5b557db6798946e03b8264.exe Token: SeShutdownPrivilege 1336 explorer.exe Token: SeShutdownPrivilege 1336 explorer.exe Token: SeShutdownPrivilege 1336 explorer.exe Token: SeShutdownPrivilege 1336 explorer.exe Token: SeShutdownPrivilege 1336 explorer.exe Token: SeShutdownPrivilege 1336 explorer.exe Token: SeShutdownPrivilege 1336 explorer.exe Token: SeShutdownPrivilege 1336 explorer.exe Token: 33 1200 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1200 AUDIODG.EXE Token: 33 1200 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1200 AUDIODG.EXE Token: SeShutdownPrivilege 1336 explorer.exe Token: SeShutdownPrivilege 1336 explorer.exe Token: SeShutdownPrivilege 1336 explorer.exe -
Suspicious use of FindShellTrayWindow 24 IoCs
Processes:
explorer.exepid process 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe -
Suspicious use of SendNotifyMessage 16 IoCs
Processes:
explorer.exepid process 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
4952a2b2bd5b557db6798946e03b8264.exepid process 1604 4952a2b2bd5b557db6798946e03b8264.exe -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
4952a2b2bd5b557db6798946e03b8264.exeexplorer.exedescription pid process target process PID 1604 wrote to memory of 1336 1604 4952a2b2bd5b557db6798946e03b8264.exe explorer.exe PID 1604 wrote to memory of 1336 1604 4952a2b2bd5b557db6798946e03b8264.exe explorer.exe PID 1604 wrote to memory of 1336 1604 4952a2b2bd5b557db6798946e03b8264.exe explorer.exe PID 1336 wrote to memory of 1224 1336 explorer.exe ctfmon.exe PID 1336 wrote to memory of 1224 1336 explorer.exe ctfmon.exe PID 1336 wrote to memory of 1224 1336 explorer.exe ctfmon.exe PID 1604 wrote to memory of 1332 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 1332 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 1332 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 1332 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 272 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 272 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 272 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 272 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 1912 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 1912 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 1912 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 1912 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 1924 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 1924 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 1924 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 1924 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 756 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 756 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 756 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 756 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 468 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 468 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 468 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 468 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 648 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 648 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 648 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 648 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 1168 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 1168 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 1168 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 1168 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 1164 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 1164 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 1164 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 1164 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 1796 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 1796 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 1796 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe PID 1604 wrote to memory of 1796 1604 4952a2b2bd5b557db6798946e03b8264.exe cvtres.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4952a2b2bd5b557db6798946e03b8264.exe"C:\Users\Admin\AppData\Local\Temp\4952a2b2bd5b557db6798946e03b8264.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\system32\ctfmon.exectfmon.exe3⤵PID:1224
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 213.59.119.25 1337 SBAyMWVxF2⤵PID:1332
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 213.59.119.25 1337 SBAyMWVxF2⤵PID:272
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 213.59.119.25 1337 SBAyMWVxF2⤵PID:1912
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 213.59.119.25 1337 SBAyMWVxF2⤵PID:1924
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 213.59.119.25 1337 SBAyMWVxF2⤵PID:756
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 213.59.119.25 1337 SBAyMWVxF2⤵PID:468
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 213.59.119.25 1337 SBAyMWVxF2⤵PID:648
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 213.59.119.25 1337 SBAyMWVxF2⤵PID:1168
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 213.59.119.25 1337 SBAyMWVxF2⤵PID:1164
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 213.59.119.25 1337 SBAyMWVxF2⤵PID:1796
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1d01⤵
- Suspicious use of AdjustPrivilegeToken
PID:1200