Analysis

  • max time kernel
    30s
  • max time network
    51s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11-11-2022 03:41

General

  • Target

    b559413c43d76b67e8b068c842a0a615b04d6d687be860e18da1adc43dfe5b5e.exe

  • Size

    8.1MB

  • MD5

    e08805d6085d6402dcaeb253e4375a09

  • SHA1

    2c79a1203c135aa1a7d5fbed566c94983278b40c

  • SHA256

    b559413c43d76b67e8b068c842a0a615b04d6d687be860e18da1adc43dfe5b5e

  • SHA512

    517d723f46c11a10eb303d655ffca77b1bc3f863450208e659cfea70276f15a7d921d52c04597d035faebb7278e66ff55bbb45b451568f11bc176650bd149db9

  • SSDEEP

    98304:iFBz9bmxmtOfP7TI/OKIdSOwSmGrjvvLYq5dkcDNckgHDJHZt:qBzQxmtOfzsWKgwS1jvvH5uFHn

Malware Config

Extracted

Family

arrowrat

Botnet

Client

C2

65.108.204.97:1337

Mutex

PreIzXewwN

Signatures

  • ArrowRat

    Remote access tool with various capabilities first seen in late 2021.

  • Pandora hVNC Loader 1 IoCs

    Pandora hVNC Loader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 22 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry class 29 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 20 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b559413c43d76b67e8b068c842a0a615b04d6d687be860e18da1adc43dfe5b5e.exe
    "C:\Users\Admin\AppData\Local\Temp\b559413c43d76b67e8b068c842a0a615b04d6d687be860e18da1adc43dfe5b5e.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4068
      • C:\Windows\explorer.exe
        "C:\Windows\explorer.exe"
        3⤵
        • Modifies Installed Components in the registry
        • Enumerates connected drives
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:3532
        • C:\Windows\system32\ctfmon.exe
          ctfmon.exe
          4⤵
            PID:4832
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 65.108.204.97 1337 PreIzXewwN
          3⤵
            PID:3604
      • C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca
        1⤵
        • Drops file in Windows directory
        • Enumerates system info in registry
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:4232

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3068-129-0x0000000000DB0000-0x00000000015D0000-memory.dmp

        Filesize

        8.1MB

      • memory/3068-121-0x00007FFD582D0000-0x00007FFD584AB000-memory.dmp

        Filesize

        1.9MB

      • memory/3068-122-0x0000000000DB0000-0x00000000015D0000-memory.dmp

        Filesize

        8.1MB

      • memory/3068-123-0x0000000000DB0000-0x00000000015D0000-memory.dmp

        Filesize

        8.1MB

      • memory/3068-124-0x000002E56DD60000-0x000002E56DDCA000-memory.dmp

        Filesize

        424KB

      • memory/3068-120-0x0000000000DB0000-0x00000000015D0000-memory.dmp

        Filesize

        8.1MB

      • memory/3068-131-0x00007FFD582D0000-0x00007FFD584AB000-memory.dmp

        Filesize

        1.9MB

      • memory/3604-246-0x000000000A0A0000-0x000000000A0F0000-memory.dmp

        Filesize

        320KB

      • memory/3604-196-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/3604-198-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/3604-197-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/3604-195-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/3604-185-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/3604-187-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/3604-189-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/3604-183-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/3604-181-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/3604-179-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/3604-243-0x0000000009DE0000-0x0000000009E46000-memory.dmp

        Filesize

        408KB

      • memory/4068-141-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-170-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-143-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-144-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-145-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-146-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-147-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-148-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-149-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-150-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-151-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-152-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-153-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-154-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-155-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-156-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-157-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-158-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-159-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-160-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-161-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-162-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-163-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-164-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-165-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-166-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-167-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-168-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-169-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-140-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-171-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-172-0x0000000005690000-0x0000000005B8E000-memory.dmp

        Filesize

        5.0MB

      • memory/4068-173-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-174-0x00000000052A0000-0x000000000533C000-memory.dmp

        Filesize

        624KB

      • memory/4068-142-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-176-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-177-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-178-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-139-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-138-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-137-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-182-0x00000000054E0000-0x0000000005572000-memory.dmp

        Filesize

        584KB

      • memory/4068-136-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-125-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/4068-191-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-188-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-186-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-135-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-134-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-184-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-133-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-192-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-193-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-194-0x0000000005440000-0x000000000544A000-memory.dmp

        Filesize

        40KB

      • memory/4068-132-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-130-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-128-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB

      • memory/4068-127-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

        Filesize

        1.6MB