Analysis

  • max time kernel
    139s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-06-2023 01:07

General

  • Target

    cd15fbc9e839dbc2888b3e72c47827e09a8bc50038a509f138c266ebcf2f3ed6.exe

  • Size

    457KB

  • MD5

    288a04f04d9fc3e84ff5b2402c8050b1

  • SHA1

    8e0b920bb33920e298ac9f73ab4b7ea0bbdfdbf2

  • SHA256

    cd15fbc9e839dbc2888b3e72c47827e09a8bc50038a509f138c266ebcf2f3ed6

  • SHA512

    928b111cfb151ad8967e1bde8e1e17ab592f0312f3883b1faf6578401b49cc741dde7ae426ee1ef7d8c985b3e4d4b287ccabaf01ea3841f8438d4dc993d9b5fb

  • SSDEEP

    12288:QkoPbgRuF1R5u7w1eTe5XxLvZNOujzAKv546Q4dPHm:QkEb4E5u7w8Te5XxLhN9l54r4dHm

Malware Config

Extracted

Family

arrowrat

Botnet

Client

C2

212.224.86.109:1337

Mutex

mTiBFWwWe

Signatures

  • ArrowRat

    Remote access tool with various capabilities first seen in late 2021.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 22 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 35 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of FindShellTrayWindow 49 IoCs
  • Suspicious use of SendNotifyMessage 21 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd15fbc9e839dbc2888b3e72c47827e09a8bc50038a509f138c266ebcf2f3ed6.exe
    "C:\Users\Admin\AppData\Local\Temp\cd15fbc9e839dbc2888b3e72c47827e09a8bc50038a509f138c266ebcf2f3ed6.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"
      2⤵
        PID:2868
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"
        2⤵
        • Modifies WinLogon for persistence
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2852
        • C:\Windows\explorer.exe
          "C:\Windows\explorer.exe"
          3⤵
          • Modifies Installed Components in the registry
          • Enumerates connected drives
          • Checks SCSI registry key(s)
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:4916
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 212.224.86.109 1337 mTiBFWwWe
          3⤵
            PID:3708
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:4836
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:436

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133325608637701850.txt

        Filesize

        75KB

        MD5

        45b9fe0c8a715a7e5d787e28d63dfb31

        SHA1

        a10a98a8553958ab2f71f337a89d97daf69af8f0

        SHA256

        b643029e19de2599a5aa951c6dc6b300684d6c1410ae5639fab0b9683fb0480f

        SHA512

        240e899f9fbb71007c0814ea66c824a383c549a97662688945a63406c54631b86ae5b9c9b6271d2bd1c6909bb8ad04d74fa354250b7b540621fc75712415a03a

      • memory/436-160-0x0000017FEAE60000-0x0000017FEAE80000-memory.dmp

        Filesize

        128KB

      • memory/436-158-0x0000017FEAEA0000-0x0000017FEAEC0000-memory.dmp

        Filesize

        128KB

      • memory/436-164-0x0000017FEB2B0000-0x0000017FEB2D0000-memory.dmp

        Filesize

        128KB

      • memory/1368-133-0x000002E3FA3E0000-0x000002E3FA456000-memory.dmp

        Filesize

        472KB

      • memory/1368-134-0x000002E3FC960000-0x000002E3FC970000-memory.dmp

        Filesize

        64KB

      • memory/2852-137-0x0000000005870000-0x0000000005E14000-memory.dmp

        Filesize

        5.6MB

      • memory/2852-142-0x00000000055A0000-0x00000000055AA000-memory.dmp

        Filesize

        40KB

      • memory/2852-141-0x0000000005610000-0x00000000056A2000-memory.dmp

        Filesize

        584KB

      • memory/2852-283-0x0000000005390000-0x00000000053A0000-memory.dmp

        Filesize

        64KB

      • memory/2852-150-0x0000000005390000-0x00000000053A0000-memory.dmp

        Filesize

        64KB

      • memory/2852-138-0x00000000053D0000-0x000000000546C000-memory.dmp

        Filesize

        624KB

      • memory/2852-135-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/3708-143-0x00000000055D0000-0x0000000005636000-memory.dmp

        Filesize

        408KB

      • memory/3708-147-0x00000000050D0000-0x00000000050E0000-memory.dmp

        Filesize

        64KB

      • memory/3708-146-0x0000000005D40000-0x0000000005D90000-memory.dmp

        Filesize

        320KB

      • memory/3708-282-0x00000000050D0000-0x00000000050E0000-memory.dmp

        Filesize

        64KB

      • memory/3708-139-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/4916-152-0x0000000002AD0000-0x0000000002AD1000-memory.dmp

        Filesize

        4KB