Malware Analysis Report

2025-08-05 15:59

Sample ID 240610-jqlspaeh23
Target AROTutorial.zip
SHA256 1f733a59d0984b6eeeafc88b72d148840cbc52fedb0c73655bfa329a6fe97101
Tags
persistence
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

1f733a59d0984b6eeeafc88b72d148840cbc52fedb0c73655bfa329a6fe97101

Threat Level: Shows suspicious behavior

The file AROTutorial.zip was found to be: Shows suspicious behavior.

Malicious Activity Summary

persistence

Loads dropped DLL

Executes dropped EXE

Adds Run key to start application

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Modifies registry class

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-10 07:52

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-10 07:52

Reported

2024-06-10 08:06

Platform

win10v2004-20240508-en

Max time kernel

448s

Max time network

491s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\AROTutorial\aross.dll,#1

Signatures

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 228 wrote to memory of 536 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 228 wrote to memory of 536 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 228 wrote to memory of 536 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\AROTutorial\aross.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\AROTutorial\aross.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 152.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 64.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 203.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 18.173.189.20.in-addr.arpa udp

Files

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-10 07:52

Reported

2024-06-10 08:03

Platform

win10v2004-20240426-en

Max time kernel

599s

Max time network

600s

Command Line

"C:\Users\Admin\AppData\Local\Temp\AROTutorial\AROTutorial.exe"

Signatures

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AROTutorial Update Module\AROTutorial.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AROTutorial Update Module\AROTutorial.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AROTutorial Update Module = "\"C:\\Users\\Admin\\AROTutorial Update Module\\AROTutorial.exe\" 600 0" C:\Users\Admin\AppData\Local\Temp\AROTutorial\AROTutorial.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\CLASSES\KET.FAST C:\Windows\SysWOW64\svchost.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\KET.FAST\CLSID = 38004100340037003900450031004600410045003600450036003700370030000000 C:\Windows\SysWOW64\svchost.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\svchost.exe N/A
N/A N/A C:\Windows\SysWOW64\svchost.exe N/A
N/A N/A C:\Windows\SysWOW64\svchost.exe N/A
N/A N/A C:\Windows\SysWOW64\svchost.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\svchost.exe N/A
N/A N/A C:\Windows\SysWOW64\svchost.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\svchost.exe N/A
N/A N/A C:\Windows\SysWOW64\svchost.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\svchost.exe N/A
N/A N/A C:\Windows\SysWOW64\svchost.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\svchost.exe N/A
N/A N/A C:\Windows\SysWOW64\svchost.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\svchost.exe N/A
N/A N/A C:\Windows\SysWOW64\svchost.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\svchost.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\AROTutorial\AROTutorial.exe N/A
Token: SeTcbPrivilege N/A C:\Users\Admin\AppData\Local\Temp\AROTutorial\AROTutorial.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AROTutorial Update Module\AROTutorial.exe N/A
Token: SeTcbPrivilege N/A C:\Users\Admin\AROTutorial Update Module\AROTutorial.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeTcbPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\rundll32.exe N/A
Token: SeTcbPrivilege N/A C:\Windows\SysWOW64\rundll32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1864 wrote to memory of 1468 N/A C:\Users\Admin\AppData\Local\Temp\AROTutorial\AROTutorial.exe C:\Users\Admin\AROTutorial Update Module\AROTutorial.exe
PID 1864 wrote to memory of 1468 N/A C:\Users\Admin\AppData\Local\Temp\AROTutorial\AROTutorial.exe C:\Users\Admin\AROTutorial Update Module\AROTutorial.exe
PID 1864 wrote to memory of 1468 N/A C:\Users\Admin\AppData\Local\Temp\AROTutorial\AROTutorial.exe C:\Users\Admin\AROTutorial Update Module\AROTutorial.exe
PID 1468 wrote to memory of 3256 N/A C:\Users\Admin\AROTutorial Update Module\AROTutorial.exe C:\Windows\SysWOW64\svchost.exe
PID 1468 wrote to memory of 3256 N/A C:\Users\Admin\AROTutorial Update Module\AROTutorial.exe C:\Windows\SysWOW64\svchost.exe
PID 1468 wrote to memory of 3256 N/A C:\Users\Admin\AROTutorial Update Module\AROTutorial.exe C:\Windows\SysWOW64\svchost.exe
PID 1468 wrote to memory of 3256 N/A C:\Users\Admin\AROTutorial Update Module\AROTutorial.exe C:\Windows\SysWOW64\svchost.exe
PID 1468 wrote to memory of 3256 N/A C:\Users\Admin\AROTutorial Update Module\AROTutorial.exe C:\Windows\SysWOW64\svchost.exe
PID 1468 wrote to memory of 3256 N/A C:\Users\Admin\AROTutorial Update Module\AROTutorial.exe C:\Windows\SysWOW64\svchost.exe
PID 1468 wrote to memory of 3256 N/A C:\Users\Admin\AROTutorial Update Module\AROTutorial.exe C:\Windows\SysWOW64\svchost.exe
PID 1468 wrote to memory of 3256 N/A C:\Users\Admin\AROTutorial Update Module\AROTutorial.exe C:\Windows\SysWOW64\svchost.exe
PID 3256 wrote to memory of 3196 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\rundll32.exe
PID 3256 wrote to memory of 3196 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\rundll32.exe
PID 3256 wrote to memory of 3196 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\rundll32.exe
PID 3256 wrote to memory of 3196 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\rundll32.exe
PID 3256 wrote to memory of 3196 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\rundll32.exe
PID 3256 wrote to memory of 3196 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\rundll32.exe
PID 3256 wrote to memory of 3196 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\rundll32.exe
PID 3256 wrote to memory of 3196 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Users\Admin\AppData\Local\Temp\AROTutorial\AROTutorial.exe

"C:\Users\Admin\AppData\Local\Temp\AROTutorial\AROTutorial.exe"

C:\Users\Admin\AROTutorial Update Module\AROTutorial.exe

"C:\Users\Admin\AROTutorial Update Module\AROTutorial.exe" 600 0

C:\Windows\SysWOW64\svchost.exe

C:\Windows\system32\svchost.exe 601 0

C:\Windows\SysWOW64\rundll32.exe

C:\Windows\system32\rundll32.exe 609 3256

Network

Country Destination Domain Proto
N/A 10.124.0.9:15000 tcp
N/A 10.127.255.255:63 udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 140.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 203.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
N/A 10.124.0.9:1433 tcp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
N/A 10.124.0.89:15000 tcp
US 8.8.8.8:53 152.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
N/A 10.124.0.89:1433 tcp
N/A 10.124.0.9:15000 tcp
US 8.8.8.8:53 210.143.182.52.in-addr.arpa udp
N/A 10.124.0.9:1433 tcp
N/A 10.124.0.89:15000 tcp
N/A 10.124.0.89:1433 tcp
N/A 10.124.0.9:15000 tcp
N/A 10.124.0.9:1433 tcp
N/A 10.124.0.89:15000 tcp
N/A 10.124.0.89:1433 tcp
N/A 10.124.0.9:15000 tcp
N/A 10.124.0.9:1433 tcp
N/A 10.124.0.89:15000 tcp
N/A 10.124.0.89:1433 tcp
N/A 10.124.0.9:15000 tcp
N/A 10.124.0.9:1433 tcp
N/A 10.124.0.89:15000 tcp
N/A 10.124.0.89:1433 tcp

Files

memory/1864-3-0x0000000000500000-0x000000000051F000-memory.dmp

memory/1864-4-0x00000000020E0000-0x0000000002115000-memory.dmp

memory/1864-17-0x00000000020E0000-0x0000000002115000-memory.dmp

C:\Users\Admin\AROTutorial Update Module\AROTutorial.exe

MD5 64ff0a8730472e36e62ce29a20f61529
SHA1 6e8165999acf896e27db0da266a96189efd335e8
SHA256 18a98c2d905a1da1d9d855e86866921e543f4bf8621faea05eb14d8e5b23b60c
SHA512 46375849a493445f3ac1e757321a02d19822d79e866fac6ab19a99c01f0ec38e70b5c8eb6bf32ddef8d86f046b22a036ded4929a6a0b5b123261d9828b675c6d

memory/1864-19-0x00000000020E0000-0x0000000002115000-memory.dmp

C:\Users\Admin\AROTutorial Update Module\aross.dll

MD5 69b34eeaa93884d81b1445a272cd27df
SHA1 a10312b366b76d39d45d571ed37e6768ab1429df
SHA256 22f591d6df14cc97acd2922cb4f63479e080a3760e750ee34ffd1890e29745a4
SHA512 20872067ed4617a1b5ccb27202b783df8edbee210cd699efb092003ab24eabe4a4cd81149064ffcc231bb16745908a93721fb299b4dc76643d674681d1348a47

memory/1468-28-0x0000000002120000-0x0000000002155000-memory.dmp

memory/1468-29-0x0000000002120000-0x0000000002155000-memory.dmp

C:\Users\Admin\AROTutorial Update Module\aross.dat

MD5 4adc19f40f1fd3ec6149c1a1ac895445
SHA1 4d47cdecd1d634b5b27d9a5447c7c911ed37d2dd
SHA256 d8e69e479dbf5e478306e9b1593678b30ff9f454ae094ba4f377101390b0c06e
SHA512 28230876ccafe2f40125a7f15ac18da68a060d9a81202706a0afc02303434cde8c6262ffed2f05687859cace855ffa8340a132346fdd478ac8292db6b949cdc8

memory/3256-32-0x00000000012E0000-0x00000000012E2000-memory.dmp

memory/1468-47-0x0000000002120000-0x0000000002155000-memory.dmp

memory/3256-48-0x0000000001900000-0x0000000001935000-memory.dmp

memory/3256-49-0x0000000001900000-0x0000000001935000-memory.dmp

memory/3256-51-0x0000000001900000-0x0000000001935000-memory.dmp

memory/3256-50-0x0000000001900000-0x0000000001935000-memory.dmp

memory/3256-46-0x0000000001900000-0x0000000001935000-memory.dmp

memory/3256-45-0x0000000001900000-0x0000000001935000-memory.dmp

memory/3256-44-0x00000000012E0000-0x00000000012E1000-memory.dmp

memory/3256-34-0x0000000001900000-0x0000000001935000-memory.dmp

memory/3256-33-0x0000000001900000-0x0000000001935000-memory.dmp

memory/3256-30-0x0000000001900000-0x0000000001935000-memory.dmp

memory/3196-54-0x0000000000820000-0x0000000000855000-memory.dmp

memory/3196-56-0x0000000000820000-0x0000000000855000-memory.dmp

memory/3196-57-0x0000000000820000-0x0000000000855000-memory.dmp

memory/3196-59-0x0000000000820000-0x0000000000855000-memory.dmp

memory/3196-58-0x0000000000130000-0x0000000000132000-memory.dmp

memory/3196-55-0x0000000000080000-0x0000000000081000-memory.dmp

memory/3256-60-0x00000000012E0000-0x00000000012E2000-memory.dmp

memory/3256-61-0x0000000001900000-0x0000000001935000-memory.dmp

memory/3196-62-0x0000000000130000-0x0000000000132000-memory.dmp

memory/3196-63-0x0000000000820000-0x0000000000855000-memory.dmp