Analysis

  • max time kernel
    137s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2023 08:45

General

  • Target

    Client.exe

  • Size

    158KB

  • MD5

    ae1a31fccddf3c728479e181ee16c74b

  • SHA1

    767c87adcd18546e3ae40d781579071f7f8035a2

  • SHA256

    279e15cb4ddbb440f1dbffe4f8af8430201971d59c1f40a58a12f81e4f59b342

  • SHA512

    9343ad9da7db4a6f8eb2bd78505bcce18d026de7cdc520864090b130d8d395b0edfc26c456bb4ec554cbd7473ea8cb14302b5a4e91a2072f81f219c97cc81905

  • SSDEEP

    3072:TbzmH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPP1O8Y:Tbzme0ODhTEPgnjuIJzo+PPcfPPY8

Malware Config

Extracted

Family

arrowrat

Botnet

Client

C2

6.tcp.eu.ngrok.io:19154

Mutex

Runtime Broker

Signatures

  • ArrowRat

    Remote access tool with various capabilities first seen in late 2021.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 6 IoCs
  • Registers COM server for autorun 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 19 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client.exe
    "C:\Users\Admin\AppData\Local\Temp\Client.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      2⤵
      • Modifies Installed Components in the registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1164
      • C:\Windows\system32\ctfmon.exe
        ctfmon.exe
        3⤵
          PID:1828
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 6.tcp.eu.ngrok.io 19154 Runtime Broker
        2⤵
          PID:868
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 6.tcp.eu.ngrok.io 19154 Runtime Broker
          2⤵
            PID:568
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 6.tcp.eu.ngrok.io 19154 Runtime Broker
            2⤵
              PID:580
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 6.tcp.eu.ngrok.io 19154 Runtime Broker
              2⤵
                PID:668
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 6.tcp.eu.ngrok.io 19154 Runtime Broker
                2⤵
                  PID:1512
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 6.tcp.eu.ngrok.io 19154 Runtime Broker
                  2⤵
                    PID:1560
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 6.tcp.eu.ngrok.io 19154 Runtime Broker
                    2⤵
                      PID:332
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 6.tcp.eu.ngrok.io 19154 Runtime Broker
                      2⤵
                        PID:1120
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 6.tcp.eu.ngrok.io 19154 Runtime Broker
                        2⤵
                          PID:1308
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 6.tcp.eu.ngrok.io 19154 Runtime Broker
                          2⤵
                            PID:472
                          • C:\Windows\System32\ComputerDefaults.exe
                            "C:\Windows\System32\ComputerDefaults.exe"
                            2⤵
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of WriteProcessMemory
                            PID:1428
                            • C:\Windows\System32\ie4uinit.exe
                              "C:\Windows\System32\ie4uinit.exe" -reinstall
                              3⤵
                              • Modifies Installed Components in the registry
                              • Registers COM server for autorun
                              • Modifies Internet Explorer settings
                              • Modifies registry class
                              PID:912
                            • C:\Windows\system32\unregmp2.exe
                              C:\Windows\system32\unregmp2.exe /SetWMPAsDefault
                              3⤵
                              • Modifies Internet Explorer settings
                              • Modifies registry class
                              PID:1496
                        • C:\Windows\system32\AUDIODG.EXE
                          C:\Windows\system32\AUDIODG.EXE 0x574
                          1⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1540

                        Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Internet Explorer.lnk

                          Filesize

                          1KB

                          MD5

                          21fb25bdede2db44cec42866d94ccc49

                          SHA1

                          fd7824cf84a6cb00120a82f3cfd175dda78c75e3

                          SHA256

                          d9d6056104788843b1f4b4a9dbd9ab2c7dab60082fb3adc747c6d756b30c6904

                          SHA512

                          c55cbd768d67db844aef8347de2193a4f05b986ccaeac578e13f8fe30156b44d9f699f4c48ad14f62dd248fe5d46669c128f4c837421037d82f74f25efef8a4f

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Internet Explorer (No Add-ons).lnk

                          Filesize

                          1KB

                          MD5

                          3b6c9bd85045c331bf3d38bd0949d564

                          SHA1

                          95637ee7af9f8fb252121843adfc295c24c05fa4

                          SHA256

                          6cc411a2e468daf61257910f39256d4e8028b71fb8634b342c6783fd38def7ba

                          SHA512

                          e5e63a40aefe343c105941113c33f2616f3504c08d978b1d329f67000d90e4184c4d46734cde13b5bb5590823bbcb7475ef9227de3feea955ff8a160518ef0f3

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Internet Explorer.lnk

                          Filesize

                          1KB

                          MD5

                          b6fbd956832757c37e201cd35cdc2088

                          SHA1

                          af775ed37dce7f19351401c59bc73f8fae2b1ffd

                          SHA256

                          e5a0e82b3aefd7e3a25dca0b1d70f8bc9f45c22855bb96adb1ea6ece22d34419

                          SHA512

                          47a2a928cc1d4989408aeb858b3e47ff375b6083d061697acc971eb7ed725a3d4ec2079c2e64de1377483d0657f980f9744a1c064a092ae57ae1d438fd478b10

                        • memory/1164-58-0x0000000004110000-0x0000000004111000-memory.dmp

                          Filesize

                          4KB

                        • memory/1164-65-0x0000000004110000-0x0000000004111000-memory.dmp

                          Filesize

                          4KB

                        • memory/1164-69-0x00000000025D0000-0x00000000025E0000-memory.dmp

                          Filesize

                          64KB

                        • memory/1240-54-0x0000000001160000-0x000000000118E000-memory.dmp

                          Filesize

                          184KB

                        • memory/1240-57-0x000000001AAE0000-0x000000001AB60000-memory.dmp

                          Filesize

                          512KB

                        • memory/1428-56-0x0000000001C80000-0x0000000001C81000-memory.dmp

                          Filesize

                          4KB