Analysis Overview
SHA256
1f733a59d0984b6eeeafc88b72d148840cbc52fedb0c73655bfa329a6fe97101
Threat Level: Shows suspicious behavior
The file AROTutorial.zip was found to be: Shows suspicious behavior.
Malicious Activity Summary
Loads dropped DLL
Executes dropped EXE
Adds Run key to start application
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Modifies registry class
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-10 07:52
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-10 07:52
Reported
2024-06-10 08:06
Platform
win10v2004-20240508-en
Max time kernel
448s
Max time network
491s
Command Line
Signatures
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 228 wrote to memory of 536 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 228 wrote to memory of 536 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 228 wrote to memory of 536 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\AROTutorial\aross.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\AROTutorial\aross.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 152.107.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 64.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.210.23.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 203.107.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.173.189.20.in-addr.arpa | udp |
Files
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-10 07:52
Reported
2024-06-10 08:03
Platform
win10v2004-20240426-en
Max time kernel
599s
Max time network
600s
Command Line
Signatures
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AROTutorial Update Module\AROTutorial.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AROTutorial Update Module\AROTutorial.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AROTutorial Update Module = "\"C:\\Users\\Admin\\AROTutorial Update Module\\AROTutorial.exe\" 600 0" | C:\Users\Admin\AppData\Local\Temp\AROTutorial\AROTutorial.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\Software\CLASSES\KET.FAST | C:\Windows\SysWOW64\svchost.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Classes\KET.FAST\CLSID = 38004100340037003900450031004600410045003600450036003700370030000000 | C:\Windows\SysWOW64\svchost.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\svchost.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\AROTutorial\AROTutorial.exe | N/A |
| Token: SeTcbPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\AROTutorial\AROTutorial.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AROTutorial Update Module\AROTutorial.exe | N/A |
| Token: SeTcbPrivilege | N/A | C:\Users\Admin\AROTutorial Update Module\AROTutorial.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\svchost.exe | N/A |
| Token: SeTcbPrivilege | N/A | C:\Windows\SysWOW64\svchost.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Token: SeTcbPrivilege | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\AROTutorial\AROTutorial.exe
"C:\Users\Admin\AppData\Local\Temp\AROTutorial\AROTutorial.exe"
C:\Users\Admin\AROTutorial Update Module\AROTutorial.exe
"C:\Users\Admin\AROTutorial Update Module\AROTutorial.exe" 600 0
C:\Windows\SysWOW64\svchost.exe
C:\Windows\system32\svchost.exe 601 0
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\system32\rundll32.exe 609 3256
Network
| Country | Destination | Domain | Proto |
| N/A | 10.124.0.9:15000 | tcp | |
| N/A | 10.127.255.255:63 | udp | |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 140.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 203.107.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.165.165.52.in-addr.arpa | udp |
| N/A | 10.124.0.9:1433 | tcp | |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| N/A | 10.124.0.89:15000 | tcp | |
| US | 8.8.8.8:53 | 152.107.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 22.236.111.52.in-addr.arpa | udp |
| N/A | 10.124.0.89:1433 | tcp | |
| N/A | 10.124.0.9:15000 | tcp | |
| US | 8.8.8.8:53 | 210.143.182.52.in-addr.arpa | udp |
| N/A | 10.124.0.9:1433 | tcp | |
| N/A | 10.124.0.89:15000 | tcp | |
| N/A | 10.124.0.89:1433 | tcp | |
| N/A | 10.124.0.9:15000 | tcp | |
| N/A | 10.124.0.9:1433 | tcp | |
| N/A | 10.124.0.89:15000 | tcp | |
| N/A | 10.124.0.89:1433 | tcp | |
| N/A | 10.124.0.9:15000 | tcp | |
| N/A | 10.124.0.9:1433 | tcp | |
| N/A | 10.124.0.89:15000 | tcp | |
| N/A | 10.124.0.89:1433 | tcp | |
| N/A | 10.124.0.9:15000 | tcp | |
| N/A | 10.124.0.9:1433 | tcp | |
| N/A | 10.124.0.89:15000 | tcp | |
| N/A | 10.124.0.89:1433 | tcp |
Files
memory/1864-3-0x0000000000500000-0x000000000051F000-memory.dmp
memory/1864-4-0x00000000020E0000-0x0000000002115000-memory.dmp
memory/1864-17-0x00000000020E0000-0x0000000002115000-memory.dmp
C:\Users\Admin\AROTutorial Update Module\AROTutorial.exe
| MD5 | 64ff0a8730472e36e62ce29a20f61529 |
| SHA1 | 6e8165999acf896e27db0da266a96189efd335e8 |
| SHA256 | 18a98c2d905a1da1d9d855e86866921e543f4bf8621faea05eb14d8e5b23b60c |
| SHA512 | 46375849a493445f3ac1e757321a02d19822d79e866fac6ab19a99c01f0ec38e70b5c8eb6bf32ddef8d86f046b22a036ded4929a6a0b5b123261d9828b675c6d |
memory/1864-19-0x00000000020E0000-0x0000000002115000-memory.dmp
C:\Users\Admin\AROTutorial Update Module\aross.dll
| MD5 | 69b34eeaa93884d81b1445a272cd27df |
| SHA1 | a10312b366b76d39d45d571ed37e6768ab1429df |
| SHA256 | 22f591d6df14cc97acd2922cb4f63479e080a3760e750ee34ffd1890e29745a4 |
| SHA512 | 20872067ed4617a1b5ccb27202b783df8edbee210cd699efb092003ab24eabe4a4cd81149064ffcc231bb16745908a93721fb299b4dc76643d674681d1348a47 |
memory/1468-28-0x0000000002120000-0x0000000002155000-memory.dmp
memory/1468-29-0x0000000002120000-0x0000000002155000-memory.dmp
C:\Users\Admin\AROTutorial Update Module\aross.dat
| MD5 | 4adc19f40f1fd3ec6149c1a1ac895445 |
| SHA1 | 4d47cdecd1d634b5b27d9a5447c7c911ed37d2dd |
| SHA256 | d8e69e479dbf5e478306e9b1593678b30ff9f454ae094ba4f377101390b0c06e |
| SHA512 | 28230876ccafe2f40125a7f15ac18da68a060d9a81202706a0afc02303434cde8c6262ffed2f05687859cace855ffa8340a132346fdd478ac8292db6b949cdc8 |
memory/3256-32-0x00000000012E0000-0x00000000012E2000-memory.dmp
memory/1468-47-0x0000000002120000-0x0000000002155000-memory.dmp
memory/3256-48-0x0000000001900000-0x0000000001935000-memory.dmp
memory/3256-49-0x0000000001900000-0x0000000001935000-memory.dmp
memory/3256-51-0x0000000001900000-0x0000000001935000-memory.dmp
memory/3256-50-0x0000000001900000-0x0000000001935000-memory.dmp
memory/3256-46-0x0000000001900000-0x0000000001935000-memory.dmp
memory/3256-45-0x0000000001900000-0x0000000001935000-memory.dmp
memory/3256-44-0x00000000012E0000-0x00000000012E1000-memory.dmp
memory/3256-34-0x0000000001900000-0x0000000001935000-memory.dmp
memory/3256-33-0x0000000001900000-0x0000000001935000-memory.dmp
memory/3256-30-0x0000000001900000-0x0000000001935000-memory.dmp
memory/3196-54-0x0000000000820000-0x0000000000855000-memory.dmp
memory/3196-56-0x0000000000820000-0x0000000000855000-memory.dmp
memory/3196-57-0x0000000000820000-0x0000000000855000-memory.dmp
memory/3196-59-0x0000000000820000-0x0000000000855000-memory.dmp
memory/3196-58-0x0000000000130000-0x0000000000132000-memory.dmp
memory/3196-55-0x0000000000080000-0x0000000000081000-memory.dmp
memory/3256-60-0x00000000012E0000-0x00000000012E2000-memory.dmp
memory/3256-61-0x0000000001900000-0x0000000001935000-memory.dmp
memory/3196-62-0x0000000000130000-0x0000000000132000-memory.dmp
memory/3196-63-0x0000000000820000-0x0000000000855000-memory.dmp