Analysis
-
max time kernel
130s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
20-08-2023 22:08
Behavioral task
behavioral1
Sample
PandoraClient.exe
Resource
win7-20230712-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
PandoraClient.exe
Resource
win10v2004-20230703-en
windows10-2004-x64
13 signatures
150 seconds
General
-
Target
PandoraClient.exe
-
Size
138KB
-
MD5
4649bb4b0cb232966683c589150ff119
-
SHA1
d2165c3988dc382fbf1bfec9828f323a9ac9282b
-
SHA256
41940020b7778a380f4d0907d4a95a8afe2108b3df3f7f73d7847d069ff29dcc
-
SHA512
72061b043678530ab19d6d3438c5cfe9e0d1b653899292191e11dc9bae1b70401ca053cc146d9bd3cdae60a28e8451c552f3b880651bfd7cd3531cb2e491d4f9
-
SSDEEP
3072:qbvR5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/Yn:qbv/S7BqjjYHdrqkL/
Score
10/10
Malware Config
Extracted
Family
arrowrat
Botnet
Client
C2
pandoravnc.duckdns.org:4046
Mutex
QMcrubGGd
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2160 PandoraClient.exe 2160 PandoraClient.exe 2160 PandoraClient.exe 2160 PandoraClient.exe 2160 PandoraClient.exe 2160 PandoraClient.exe 2160 PandoraClient.exe 2160 PandoraClient.exe 2160 PandoraClient.exe 2160 PandoraClient.exe 2160 PandoraClient.exe 2160 PandoraClient.exe 2160 PandoraClient.exe 2160 PandoraClient.exe 2160 PandoraClient.exe 2160 PandoraClient.exe 2160 PandoraClient.exe 2160 PandoraClient.exe 2160 PandoraClient.exe 2160 PandoraClient.exe 2160 PandoraClient.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 2160 PandoraClient.exe Token: SeShutdownPrivilege 2100 explorer.exe Token: SeShutdownPrivilege 2100 explorer.exe Token: SeShutdownPrivilege 2100 explorer.exe Token: SeShutdownPrivilege 2100 explorer.exe Token: SeShutdownPrivilege 2100 explorer.exe Token: SeShutdownPrivilege 2100 explorer.exe Token: SeShutdownPrivilege 2100 explorer.exe Token: SeShutdownPrivilege 2100 explorer.exe Token: SeShutdownPrivilege 2100 explorer.exe Token: SeShutdownPrivilege 2100 explorer.exe Token: SeShutdownPrivilege 2100 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe 2100 explorer.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2100 2160 PandoraClient.exe 28 PID 2160 wrote to memory of 2100 2160 PandoraClient.exe 28 PID 2160 wrote to memory of 2100 2160 PandoraClient.exe 28 PID 2160 wrote to memory of 628 2160 PandoraClient.exe 29 PID 2160 wrote to memory of 628 2160 PandoraClient.exe 29 PID 2160 wrote to memory of 628 2160 PandoraClient.exe 29 PID 2160 wrote to memory of 628 2160 PandoraClient.exe 29 PID 2160 wrote to memory of 2920 2160 PandoraClient.exe 30 PID 2160 wrote to memory of 2920 2160 PandoraClient.exe 30 PID 2160 wrote to memory of 2920 2160 PandoraClient.exe 30 PID 2160 wrote to memory of 2920 2160 PandoraClient.exe 30 PID 2160 wrote to memory of 2928 2160 PandoraClient.exe 31 PID 2160 wrote to memory of 2928 2160 PandoraClient.exe 31 PID 2160 wrote to memory of 2928 2160 PandoraClient.exe 31 PID 2160 wrote to memory of 2928 2160 PandoraClient.exe 31 PID 2160 wrote to memory of 2968 2160 PandoraClient.exe 32 PID 2160 wrote to memory of 2968 2160 PandoraClient.exe 32 PID 2160 wrote to memory of 2968 2160 PandoraClient.exe 32 PID 2160 wrote to memory of 2968 2160 PandoraClient.exe 32 PID 2160 wrote to memory of 3040 2160 PandoraClient.exe 33 PID 2160 wrote to memory of 3040 2160 PandoraClient.exe 33 PID 2160 wrote to memory of 3040 2160 PandoraClient.exe 33 PID 2160 wrote to memory of 3040 2160 PandoraClient.exe 33 PID 2160 wrote to memory of 2312 2160 PandoraClient.exe 34 PID 2160 wrote to memory of 2312 2160 PandoraClient.exe 34 PID 2160 wrote to memory of 2312 2160 PandoraClient.exe 34 PID 2160 wrote to memory of 2312 2160 PandoraClient.exe 34 PID 2160 wrote to memory of 2868 2160 PandoraClient.exe 36 PID 2160 wrote to memory of 2868 2160 PandoraClient.exe 36 PID 2160 wrote to memory of 2868 2160 PandoraClient.exe 36 PID 2160 wrote to memory of 2868 2160 PandoraClient.exe 36 PID 2160 wrote to memory of 2864 2160 PandoraClient.exe 35 PID 2160 wrote to memory of 2864 2160 PandoraClient.exe 35 PID 2160 wrote to memory of 2864 2160 PandoraClient.exe 35 PID 2160 wrote to memory of 2864 2160 PandoraClient.exe 35 PID 2160 wrote to memory of 2820 2160 PandoraClient.exe 37 PID 2160 wrote to memory of 2820 2160 PandoraClient.exe 37 PID 2160 wrote to memory of 2820 2160 PandoraClient.exe 37 PID 2160 wrote to memory of 2820 2160 PandoraClient.exe 37 PID 2160 wrote to memory of 1512 2160 PandoraClient.exe 38 PID 2160 wrote to memory of 1512 2160 PandoraClient.exe 38 PID 2160 wrote to memory of 1512 2160 PandoraClient.exe 38 PID 2160 wrote to memory of 1512 2160 PandoraClient.exe 38 PID 2100 wrote to memory of 2040 2100 explorer.exe 39 PID 2100 wrote to memory of 2040 2100 explorer.exe 39 PID 2100 wrote to memory of 2040 2100 explorer.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\PandoraClient.exe"C:\Users\Admin\AppData\Local\Temp\PandoraClient.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\system32\ctfmon.exectfmon.exe3⤵PID:2040
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client pandoravnc.duckdns.org 4046 QMcrubGGd2⤵PID:628
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client pandoravnc.duckdns.org 4046 QMcrubGGd2⤵PID:2920
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client pandoravnc.duckdns.org 4046 QMcrubGGd2⤵PID:2928
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client pandoravnc.duckdns.org 4046 QMcrubGGd2⤵PID:2968
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client pandoravnc.duckdns.org 4046 QMcrubGGd2⤵PID:3040
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client pandoravnc.duckdns.org 4046 QMcrubGGd2⤵PID:2312
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client pandoravnc.duckdns.org 4046 QMcrubGGd2⤵PID:2864
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client pandoravnc.duckdns.org 4046 QMcrubGGd2⤵PID:2868
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client pandoravnc.duckdns.org 4046 QMcrubGGd2⤵PID:2820
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client pandoravnc.duckdns.org 4046 QMcrubGGd2⤵PID:1512
-