Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-04-2024 23:01
Static task
static1
Behavioral task
behavioral1
Sample
ArmDotSetup_2023.12.0.0_1.exe
Resource
win11-20240426-en
General
-
Target
ArmDotSetup_2023.12.0.0_1.exe
-
Size
4.8MB
-
MD5
e21d4b09e78cc32858917210629d1d93
-
SHA1
590a07a7a7a3eebd7d5d49cb34788b25bbcd2018
-
SHA256
da109f5ec326e3298fa0eea86201166aec6432cdc64ac94c200d0145b810f55b
-
SHA512
4fac88d6ac76bebc9419d16696599a3edf95f222d8a57f8e43b2d1633b827bc44923fc7aa14ec6b69a533dff1ca8b9112bb3328252047818d9e8bfc37e94cc5d
-
SSDEEP
98304:Ym8T2zeeTtdOzFbl8ZQbJIGmYef9ikWAQ0f7WbqErX0:AazXbZQbKv/9SAHTCqEQ
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 41 IoCs
description ioc Process File created C:\Program Files (x86)\ArmDot\is-J906V.tmp ArmDotSetup_2023.12.0.0_1.tmp File opened for modification C:\Program Files (x86)\ArmDot\unins000.dat ArmDotSetup_2023.12.0.0_1.tmp File opened for modification C:\Program Files (x86)\ArmDot\ArmDot.chm ArmDotSetup_2023.12.0.0_1.tmp File created C:\Program Files (x86)\ArmDot\is-TJRM2.tmp ArmDotSetup_2023.12.0.0_1.tmp File opened for modification C:\Program Files (x86)\ArmDot\Newtonsoft.Json.dll ArmDotSetup_2023.12.0.0_1.tmp File created C:\Program Files (x86)\ArmDot\unins000.dat ArmDotSetup_2023.12.0.0_1.tmp File created C:\Program Files (x86)\ArmDot\keygens\cpp\is-B741S.tmp ArmDotSetup_2023.12.0.0_1.tmp File created C:\Program Files (x86)\ArmDot\keygens\php\is-FSH53.tmp ArmDotSetup_2023.12.0.0_1.tmp File created C:\Program Files (x86)\ArmDot\is-SMLC6.tmp ArmDotSetup_2023.12.0.0_1.tmp File created C:\Program Files (x86)\ArmDot\is-HGKPN.tmp ArmDotSetup_2023.12.0.0_1.tmp File opened for modification C:\Program Files (x86)\ArmDot\ArmDot.Client.dll ArmDotSetup_2023.12.0.0_1.tmp File opened for modification C:\Program Files (x86)\ArmDot\ArmDot.EmbeddedCode.dll ArmDotSetup_2023.12.0.0_1.tmp File created C:\Program Files (x86)\ArmDot\is-1VP2B.tmp ArmDotSetup_2023.12.0.0_1.tmp File created C:\Program Files (x86)\ArmDot\is-EBOCJ.tmp ArmDotSetup_2023.12.0.0_1.tmp File created C:\Program Files (x86)\ArmDot\is-N0MLA.tmp ArmDotSetup_2023.12.0.0_1.tmp File created C:\Program Files (x86)\ArmDot\is-KUNAP.tmp ArmDotSetup_2023.12.0.0_1.tmp File created C:\Program Files (x86)\ArmDot\is-QPG64.tmp ArmDotSetup_2023.12.0.0_1.tmp File created C:\Program Files (x86)\ArmDot\is-1E9N0.tmp ArmDotSetup_2023.12.0.0_1.tmp File opened for modification C:\Program Files (x86)\ArmDot\ArmDot.exe ArmDotSetup_2023.12.0.0_1.tmp File created C:\Program Files (x86)\ArmDot\is-KGF9N.tmp ArmDotSetup_2023.12.0.0_1.tmp File created C:\Program Files (x86)\ArmDot\is-IFMF6.tmp ArmDotSetup_2023.12.0.0_1.tmp File created C:\Program Files (x86)\ArmDot\is-9KFVF.tmp ArmDotSetup_2023.12.0.0_1.tmp File created C:\Program Files (x86)\ArmDot\unins000.msg ArmDotSetup_2023.12.0.0_1.tmp File opened for modification C:\Program Files (x86)\ArmDot\ArmDot.Shared.dll ArmDotSetup_2023.12.0.0_1.tmp File opened for modification C:\Program Files (x86)\ArmDot\ArmDot.Api.Keys.dll ArmDotSetup_2023.12.0.0_1.tmp File created C:\Program Files (x86)\ArmDot\is-AS5C3.tmp ArmDotSetup_2023.12.0.0_1.tmp File created C:\Program Files (x86)\ArmDot\keygens\cpp\is-T8FBI.tmp ArmDotSetup_2023.12.0.0_1.tmp File created C:\Program Files (x86)\ArmDot\is-DUF3D.tmp ArmDotSetup_2023.12.0.0_1.tmp File opened for modification C:\Program Files (x86)\ArmDot\ArmDotConsole.exe ArmDotSetup_2023.12.0.0_1.tmp File opened for modification C:\Program Files (x86)\ArmDot\Mono.Cecil.dll ArmDotSetup_2023.12.0.0_1.tmp File opened for modification C:\Program Files (x86)\ArmDot\BoxedAppSDK.Managed.dll ArmDotSetup_2023.12.0.0_1.tmp File created C:\Program Files (x86)\ArmDot\is-T9UVC.tmp ArmDotSetup_2023.12.0.0_1.tmp File created C:\Program Files (x86)\ArmDot\is-5T2KK.tmp ArmDotSetup_2023.12.0.0_1.tmp File opened for modification C:\Program Files (x86)\ArmDot\ArmDot.Engine.dll ArmDotSetup_2023.12.0.0_1.tmp File opened for modification C:\Program Files (x86)\ArmDot\Mono.Cecil.Pdb.dll ArmDotSetup_2023.12.0.0_1.tmp File created C:\Program Files (x86)\ArmDot\keygens\cpp\is-TL01P.tmp ArmDotSetup_2023.12.0.0_1.tmp File created C:\Program Files (x86)\ArmDot\keygens\cpp\is-U2KFP.tmp ArmDotSetup_2023.12.0.0_1.tmp File created C:\Program Files (x86)\ArmDot\is-KPNGS.tmp ArmDotSetup_2023.12.0.0_1.tmp File created C:\Program Files (x86)\ArmDot\is-KVII0.tmp ArmDotSetup_2023.12.0.0_1.tmp File opened for modification C:\Program Files (x86)\ArmDot\Mono.Cecil.Rocks.dll ArmDotSetup_2023.12.0.0_1.tmp File created C:\Program Files (x86)\ArmDot\is-2FFNE.tmp ArmDotSetup_2023.12.0.0_1.tmp -
Executes dropped EXE 2 IoCs
pid Process 4872 ArmDotSetup_2023.12.0.0_1.tmp 2260 ArmDot.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ArmDotProject\ = "ArmDot Project" ArmDotSetup_2023.12.0.0_1.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ArmDotProject\DefaultIcon ArmDotSetup_2023.12.0.0_1.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ArmDotProject\shell\open\command\ = "\"C:\\Program Files (x86)\\ArmDot\\ArmDot.exe\" \"%1\"" ArmDotSetup_2023.12.0.0_1.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ArmDotProject\shell\open\command ArmDotSetup_2023.12.0.0_1.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ArmDotProject\shell ArmDotSetup_2023.12.0.0_1.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ArmDotProject\shell\open ArmDotSetup_2023.12.0.0_1.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.armdotproj ArmDotSetup_2023.12.0.0_1.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.armdotproj\ = "ArmDotProject" ArmDotSetup_2023.12.0.0_1.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ArmDotProject ArmDotSetup_2023.12.0.0_1.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ArmDotProject\DefaultIcon\ = "C:\\Program Files (x86)\\ArmDot\\ArmDot.exe,0" ArmDotSetup_2023.12.0.0_1.tmp -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 ArmDot.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 ArmDot.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 ArmDot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 ArmDot.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e ArmDot.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4872 ArmDotSetup_2023.12.0.0_1.tmp 4872 ArmDotSetup_2023.12.0.0_1.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4872 ArmDotSetup_2023.12.0.0_1.tmp -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3888 wrote to memory of 4872 3888 ArmDotSetup_2023.12.0.0_1.exe 81 PID 3888 wrote to memory of 4872 3888 ArmDotSetup_2023.12.0.0_1.exe 81 PID 3888 wrote to memory of 4872 3888 ArmDotSetup_2023.12.0.0_1.exe 81 PID 4872 wrote to memory of 2260 4872 ArmDotSetup_2023.12.0.0_1.tmp 84 PID 4872 wrote to memory of 2260 4872 ArmDotSetup_2023.12.0.0_1.tmp 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ArmDotSetup_2023.12.0.0_1.exe"C:\Users\Admin\AppData\Local\Temp\ArmDotSetup_2023.12.0.0_1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\is-NNQ7U.tmp\ArmDotSetup_2023.12.0.0_1.tmp"C:\Users\Admin\AppData\Local\Temp\is-NNQ7U.tmp\ArmDotSetup_2023.12.0.0_1.tmp" /SL5="$6004E,4617382,121344,C:\Users\Admin\AppData\Local\Temp\ArmDotSetup_2023.12.0.0_1.exe"2⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Program Files (x86)\ArmDot\ArmDot.exe"C:\Program Files (x86)\ArmDot\ArmDot.exe"3⤵
- Executes dropped EXE
- Modifies system certificate store
PID:2260
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD532baf8bf82e643bab2ec0367de91d791
SHA1ea1d7fb5d3cf2c0ba8b4a318dd32a71d640beb4b
SHA2568c1fdc6e6c5f37de3b99b3aa3a146433199e494a1a170ccd06552db105a17fcd
SHA512a59e463d9876fb146f5d3655d5faee05aeee36050dbd5dbc63d9d6b8fe6606976b1379b777cce0d29fa58ff61b8b5e288f41978a214fd0e7f4ea547e219d5aec
-
Filesize
4.4MB
MD5ab7a92faefc2d0d4414bbbd5834ae253
SHA1acf33224b23cf1ebc4af822796e069de38fc81f1
SHA256dcdbbc96f989f63f708b98613ebca1fc649ea8b86c79d2721012c4ca56c211b9
SHA5129866d013392317de51e433aeea2dd87cf92e1b1fc93ab1fc7504ebbc6b905e61000f213d72f33af2117b65699be8e1a0e59f92e273975001629b421efd0449ae
-
Filesize
30KB
MD5a0d14dd586a868ecc9f6ed766589bf5c
SHA18962415374eb1ab85d343f9f9232bd040aa62b86
SHA256ff1648320770e5bbd8e3b643ca0f8704af2024318760898a6bac5c0b99e4ad12
SHA51218037f3a9cb9c68b57c6f0179541aa0c457d8a4f366ff45b5dd30258607f3630dc65a14d4e74c2b401f319500a11e4e6f57b3ecc412cc9307db45f6392a2d05b
-
Filesize
1.1MB
MD523bfdad33bfe792bd460fd6acfa2d3ed
SHA1103da1be89e5d57da1321c81c0c52d3c090695ab
SHA25673957ff9ae5b206a795468fc2d4066c120aeb3c8c4f59c69f4520fc7fb03980f
SHA5126dde66bed04f63b95be7798e274a58ab92e93a52a1d7ba2f25dc0e8c48dddc956e86957dd885b3e8619ca45f67b75cffa9a15a850be73a30ec84588ca6a3d147
-
Filesize
1.1MB
MD54fde42661df3627858f8b1d7139a89cb
SHA11dda6af214bbc58ae1c375708b22aa772aab1582
SHA256a840f30a4b4d8814c5ba184cfeb22670adb7e2a99e27dfd575c9840183cd8adb
SHA512ac0b47469ba92b12c1bf62de5371e1b7a1dfa0534ba824ce473124cc1592f58f323256156c94ea7ae57256761ea1996a8253b1310875362c7f6500c60c48cb8b