Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-05-2023 12:31

General

  • Target

    arrow/54a0a1cf6b5fb30614ff4a2a7757cadf23fa539b4a352137dfc3292c6ceffa24.exe

  • Size

    361KB

  • MD5

    8fa43d91b2fbf126d65bdb8520b57f79

  • SHA1

    1de09d6a5f44169c6c0fe0290dbaca04d13789cc

  • SHA256

    54a0a1cf6b5fb30614ff4a2a7757cadf23fa539b4a352137dfc3292c6ceffa24

  • SHA512

    63086eb0f61cbc8f240d332ab09342bf0abc449a2a6d94ba13ce4cfff62832eee7193aa71c3eaa0ea5edb260169c8aba4deade1db5dab0aae0c5d6f3f9dd0bf5

  • SSDEEP

    6144:5bRq0OWdltyB7dWY0J6ddKwpgouYj8IbHCLb7tkm+RsMRBvc:m0OEltc7dyEv97jYfRk1mMRB

Malware Config

Extracted

Family

arrowrat

Botnet

company

C2

103.178.236.127:1337

Mutex

pKfaPMMUE

Signatures

  • ArrowRat

    Remote access tool with various capabilities first seen in late 2021.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 22 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 35 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of FindShellTrayWindow 48 IoCs
  • Suspicious use of SendNotifyMessage 20 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\arrow\54a0a1cf6b5fb30614ff4a2a7757cadf23fa539b4a352137dfc3292c6ceffa24.exe
    "C:\Users\Admin\AppData\Local\Temp\arrow\54a0a1cf6b5fb30614ff4a2a7757cadf23fa539b4a352137dfc3292c6ceffa24.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4896
      • C:\Windows\explorer.exe
        "C:\Windows\explorer.exe"
        3⤵
        • Modifies Installed Components in the registry
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3568
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" company 103.178.236.127 1337 pKfaPMMUE
        3⤵
          PID:1980
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" company 103.178.236.127 1337 pKfaPMMUE
          3⤵
            PID:2444
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:1624
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:2888

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133277369532131235.txt

        Filesize

        75KB

        MD5

        65019a5db517d9fb830d8a57406a03ea

        SHA1

        817faf2ffe8461f653519e7bd96e7ee75021c891

        SHA256

        3ae88b3a99e6b785bdb44760790bc03ac722ef5b673ad5b3ca49b5cc5eecf84f

        SHA512

        bcc985d3fa48efcbb4a334b1a341a6686ef6c69f237d6d9bdcd9885696d148519ab824b9150194d783cb03189c1cc00a483f1b73ebce323f1f6a303a05b8ea62

      • memory/1680-133-0x0000000000A20000-0x0000000000A80000-memory.dmp

        Filesize

        384KB

      • memory/1680-134-0x0000000005450000-0x00000000054EC000-memory.dmp

        Filesize

        624KB

      • memory/2444-145-0x0000000006230000-0x0000000006280000-memory.dmp

        Filesize

        320KB

      • memory/2444-149-0x00000000054C0000-0x00000000054D0000-memory.dmp

        Filesize

        64KB

      • memory/2444-285-0x00000000054C0000-0x00000000054D0000-memory.dmp

        Filesize

        64KB

      • memory/2444-138-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/2444-142-0x0000000005980000-0x00000000059E6000-memory.dmp

        Filesize

        408KB

      • memory/2888-157-0x000002986EFC0000-0x000002986EFE0000-memory.dmp

        Filesize

        128KB

      • memory/2888-160-0x000002986EF80000-0x000002986EFA0000-memory.dmp

        Filesize

        128KB

      • memory/2888-163-0x000002986F5A0000-0x000002986F5C0000-memory.dmp

        Filesize

        128KB

      • memory/3568-151-0x00000000033A0000-0x00000000033A1000-memory.dmp

        Filesize

        4KB

      • memory/4896-137-0x00000000058E0000-0x0000000005E84000-memory.dmp

        Filesize

        5.6MB

      • memory/4896-148-0x00000000053B0000-0x00000000053C0000-memory.dmp

        Filesize

        64KB

      • memory/4896-141-0x0000000005570000-0x000000000557A000-memory.dmp

        Filesize

        40KB

      • memory/4896-135-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/4896-284-0x00000000053B0000-0x00000000053C0000-memory.dmp

        Filesize

        64KB

      • memory/4896-140-0x0000000005610000-0x00000000056A2000-memory.dmp

        Filesize

        584KB