Overview
overview
7Static
static
3ArmCord-3....64.exe
windows7-x64
7ArmCord-3....64.exe
windows10-2004-x64
7$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3ArmCord.exe
windows10-2004-x64
7LICENSES.c...m.html
windows7-x64
3LICENSES.c...m.html
windows10-2004-x64
3d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows10-2004-x64
1resources/elevate.exe
windows7-x64
3resources/elevate.exe
windows10-2004-x64
3vk_swiftshader.dll
windows10-2004-x64
1vulkan-1.dll
windows10-2004-x64
1$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...7z.dll
windows7-x64
3$PLUGINSDI...7z.dll
windows10-2004-x64
3$R0/Uninst...rd.exe
windows7-x64
7$R0/Uninst...rd.exe
windows10-2004-x64
7Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 15:36
Static task
static1
Behavioral task
behavioral1
Sample
ArmCord-3.3.0-win-x64.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ArmCord-3.3.0-win-x64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
ArmCord.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
LICENSES.chromium.html
Resource
win7-20240704-en
Behavioral task
behavioral13
Sample
LICENSES.chromium.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
d3dcompiler_47.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
ffmpeg.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
libEGL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
libGLESv2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
resources/elevate.exe
Resource
win7-20240708-en
Behavioral task
behavioral19
Sample
resources/elevate.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
vk_swiftshader.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
vulkan-1.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240704-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240708-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win7-20240729-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral28
Sample
$R0/Uninstall ArmCord.exe
Resource
win7-20240705-en
Behavioral task
behavioral29
Sample
$R0/Uninstall ArmCord.exe
Resource
win10v2004-20240802-en
General
-
Target
ArmCord.exe
-
Size
177.5MB
-
MD5
37ad423794d29d45ddbb276a47c7e52d
-
SHA1
fab43bd04729ce7e59cbbf410f8d3477c613f6f9
-
SHA256
f799b7ae4286d43d5bd17f88a8a9a9f84bafdf2ce4f6bc3da71ba90a8b83a6fe
-
SHA512
9ae61055db018aa3851bc62af230809617076a26ca03b641378ef0ac792a31f3ee14132d34c55939560e0d71476a50ac855a6e54f9a71e1d959cd049569d23a7
-
SSDEEP
1572864:l6SlyW//ASwc0eKrtjR3QelIHvSfIc7ro6f1cVYc+lj3PVXaC2DPLTCncMHzNHt9:A4KZxQrFQl
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation ArmCord.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation ArmCord.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 raw.githubusercontent.com 10 raw.githubusercontent.com -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2360 ArmCord.exe 2360 ArmCord.exe 1528 ArmCord.exe 1528 ArmCord.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2360 ArmCord.exe Token: SeCreatePagefilePrivilege 2360 ArmCord.exe Token: SeShutdownPrivilege 2360 ArmCord.exe Token: SeCreatePagefilePrivilege 2360 ArmCord.exe Token: SeShutdownPrivilege 2360 ArmCord.exe Token: SeCreatePagefilePrivilege 2360 ArmCord.exe Token: SeShutdownPrivilege 2360 ArmCord.exe Token: SeCreatePagefilePrivilege 2360 ArmCord.exe Token: SeShutdownPrivilege 2360 ArmCord.exe Token: SeCreatePagefilePrivilege 2360 ArmCord.exe Token: SeShutdownPrivilege 2360 ArmCord.exe Token: SeCreatePagefilePrivilege 2360 ArmCord.exe Token: SeShutdownPrivilege 2360 ArmCord.exe Token: SeCreatePagefilePrivilege 2360 ArmCord.exe Token: SeShutdownPrivilege 2360 ArmCord.exe Token: SeCreatePagefilePrivilege 2360 ArmCord.exe Token: SeShutdownPrivilege 2360 ArmCord.exe Token: SeCreatePagefilePrivilege 2360 ArmCord.exe Token: SeShutdownPrivilege 2360 ArmCord.exe Token: SeCreatePagefilePrivilege 2360 ArmCord.exe Token: SeShutdownPrivilege 2360 ArmCord.exe Token: SeCreatePagefilePrivilege 2360 ArmCord.exe Token: SeShutdownPrivilege 2360 ArmCord.exe Token: SeCreatePagefilePrivilege 2360 ArmCord.exe Token: SeShutdownPrivilege 2360 ArmCord.exe Token: SeCreatePagefilePrivilege 2360 ArmCord.exe Token: SeShutdownPrivilege 2360 ArmCord.exe Token: SeCreatePagefilePrivilege 2360 ArmCord.exe Token: SeShutdownPrivilege 2360 ArmCord.exe Token: SeCreatePagefilePrivilege 2360 ArmCord.exe Token: SeShutdownPrivilege 2360 ArmCord.exe Token: SeCreatePagefilePrivilege 2360 ArmCord.exe Token: SeShutdownPrivilege 2360 ArmCord.exe Token: SeCreatePagefilePrivilege 2360 ArmCord.exe Token: SeShutdownPrivilege 2360 ArmCord.exe Token: SeCreatePagefilePrivilege 2360 ArmCord.exe Token: SeShutdownPrivilege 2360 ArmCord.exe Token: SeCreatePagefilePrivilege 2360 ArmCord.exe Token: SeShutdownPrivilege 2360 ArmCord.exe Token: SeCreatePagefilePrivilege 2360 ArmCord.exe Token: SeShutdownPrivilege 2360 ArmCord.exe Token: SeCreatePagefilePrivilege 2360 ArmCord.exe Token: SeShutdownPrivilege 2360 ArmCord.exe Token: SeCreatePagefilePrivilege 2360 ArmCord.exe Token: SeShutdownPrivilege 2360 ArmCord.exe Token: SeCreatePagefilePrivilege 2360 ArmCord.exe Token: SeShutdownPrivilege 2360 ArmCord.exe Token: SeCreatePagefilePrivilege 2360 ArmCord.exe Token: SeShutdownPrivilege 2360 ArmCord.exe Token: SeCreatePagefilePrivilege 2360 ArmCord.exe Token: SeShutdownPrivilege 2360 ArmCord.exe Token: SeCreatePagefilePrivilege 2360 ArmCord.exe Token: SeShutdownPrivilege 2360 ArmCord.exe Token: SeCreatePagefilePrivilege 2360 ArmCord.exe Token: SeShutdownPrivilege 2360 ArmCord.exe Token: SeCreatePagefilePrivilege 2360 ArmCord.exe Token: SeShutdownPrivilege 2360 ArmCord.exe Token: SeCreatePagefilePrivilege 2360 ArmCord.exe Token: SeShutdownPrivilege 2360 ArmCord.exe Token: SeCreatePagefilePrivilege 2360 ArmCord.exe Token: SeShutdownPrivilege 2360 ArmCord.exe Token: SeCreatePagefilePrivilege 2360 ArmCord.exe Token: SeShutdownPrivilege 2360 ArmCord.exe Token: SeCreatePagefilePrivilege 2360 ArmCord.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 2360 ArmCord.exe 2360 ArmCord.exe 2360 ArmCord.exe 2360 ArmCord.exe 2360 ArmCord.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 2360 ArmCord.exe 2360 ArmCord.exe 2360 ArmCord.exe 2360 ArmCord.exe 2360 ArmCord.exe 2360 ArmCord.exe 2360 ArmCord.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2360 wrote to memory of 3016 2360 ArmCord.exe 86 PID 2360 wrote to memory of 3016 2360 ArmCord.exe 86 PID 2360 wrote to memory of 2404 2360 ArmCord.exe 87 PID 2360 wrote to memory of 2404 2360 ArmCord.exe 87 PID 2360 wrote to memory of 2404 2360 ArmCord.exe 87 PID 2360 wrote to memory of 2404 2360 ArmCord.exe 87 PID 2360 wrote to memory of 2404 2360 ArmCord.exe 87 PID 2360 wrote to memory of 2404 2360 ArmCord.exe 87 PID 2360 wrote to memory of 2404 2360 ArmCord.exe 87 PID 2360 wrote to memory of 2404 2360 ArmCord.exe 87 PID 2360 wrote to memory of 2404 2360 ArmCord.exe 87 PID 2360 wrote to memory of 2404 2360 ArmCord.exe 87 PID 2360 wrote to memory of 2404 2360 ArmCord.exe 87 PID 2360 wrote to memory of 2404 2360 ArmCord.exe 87 PID 2360 wrote to memory of 2404 2360 ArmCord.exe 87 PID 2360 wrote to memory of 2404 2360 ArmCord.exe 87 PID 2360 wrote to memory of 2404 2360 ArmCord.exe 87 PID 2360 wrote to memory of 2404 2360 ArmCord.exe 87 PID 2360 wrote to memory of 2404 2360 ArmCord.exe 87 PID 2360 wrote to memory of 2404 2360 ArmCord.exe 87 PID 2360 wrote to memory of 2404 2360 ArmCord.exe 87 PID 2360 wrote to memory of 2404 2360 ArmCord.exe 87 PID 2360 wrote to memory of 2404 2360 ArmCord.exe 87 PID 2360 wrote to memory of 2404 2360 ArmCord.exe 87 PID 2360 wrote to memory of 2404 2360 ArmCord.exe 87 PID 2360 wrote to memory of 2404 2360 ArmCord.exe 87 PID 2360 wrote to memory of 2404 2360 ArmCord.exe 87 PID 2360 wrote to memory of 2404 2360 ArmCord.exe 87 PID 2360 wrote to memory of 2404 2360 ArmCord.exe 87 PID 2360 wrote to memory of 2404 2360 ArmCord.exe 87 PID 2360 wrote to memory of 2404 2360 ArmCord.exe 87 PID 2360 wrote to memory of 2404 2360 ArmCord.exe 87 PID 2360 wrote to memory of 1524 2360 ArmCord.exe 88 PID 2360 wrote to memory of 1524 2360 ArmCord.exe 88 PID 2360 wrote to memory of 552 2360 ArmCord.exe 93 PID 2360 wrote to memory of 552 2360 ArmCord.exe 93 PID 2360 wrote to memory of 1528 2360 ArmCord.exe 99 PID 2360 wrote to memory of 1528 2360 ArmCord.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\ArmCord.exe"C:\Users\Admin\AppData\Local\Temp\ArmCord.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\ArmCord.exeC:\Users\Admin\AppData\Local\Temp\ArmCord.exe --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\armcord /prefetch:4 --no-rate-limit --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\armcord\Crashpad --annotation=_productName=armcord --annotation=_version=3.3.0 --annotation=plat=Win64 --annotation=prod=Electron --annotation=ver=32.0.1 --initial-client-data=0x4c0,0x4c4,0x4c8,0x4b8,0x4cc,0x7ff690c7f1b8,0x7ff690c7f1c4,0x7ff690c7f1d02⤵PID:3016
-
-
C:\Users\Admin\AppData\Local\Temp\ArmCord.exe"C:\Users\Admin\AppData\Local\Temp\ArmCord.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\armcord" --gpu-preferences=UAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2024,i,3237345507118835619,10471190587871509906,262144 --disable-features=HardwareMediaKeyHandling,MediaSessionService,SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2008 /prefetch:22⤵PID:2404
-
-
C:\Users\Admin\AppData\Local\Temp\ArmCord.exe"C:\Users\Admin\AppData\Local\Temp\ArmCord.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\armcord" --standard-schemes=armcord --secure-schemes=armcord --bypasscsp-schemes=armcord --fetch-schemes=armcord --streaming-schemes=armcord --field-trial-handle=2336,i,3237345507118835619,10471190587871509906,262144 --disable-features=HardwareMediaKeyHandling,MediaSessionService,SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2328 /prefetch:32⤵PID:1524
-
-
C:\Users\Admin\AppData\Local\Temp\ArmCord.exe"C:\Users\Admin\AppData\Local\Temp\ArmCord.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\armcord" --standard-schemes=armcord --secure-schemes=armcord --bypasscsp-schemes=armcord --fetch-schemes=armcord --streaming-schemes=armcord --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --autoplay-policy=no-user-gesture-required --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --field-trial-handle=3280,i,3237345507118835619,10471190587871509906,262144 --disable-features=HardwareMediaKeyHandling,MediaSessionService,SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=3276 /prefetch:12⤵
- Checks computer location settings
PID:552
-
-
C:\Users\Admin\AppData\Local\Temp\ArmCord.exe"C:\Users\Admin\AppData\Local\Temp\ArmCord.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\armcord" --gpu-preferences=UAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAhAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=3584,i,3237345507118835619,10471190587871509906,262144 --disable-features=HardwareMediaKeyHandling,MediaSessionService,SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2444 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
183B
MD5b068d81ce8f886636b030d62739cc763
SHA179f6fee9a73b4725de53bcfce1bf61a57e7fde30
SHA256071f203d59b917bceef67254bb3d322c2e7e668c5bfd262682d09c4220963ffb
SHA51203beb488d6537a942a8005225221ae0c8347011e648d8d10721200a0d2595c7c49df76bd5f4d5dfe5c993c6dce93d93bb32b8cc470a745e472c852228df88aa0
-
Filesize
59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
57B
MD558127c59cb9e1da127904c341d15372b
SHA162445484661d8036ce9788baeaba31d204e9a5fc
SHA256be4b8924ab38e8acf350e6e3b9f1f63a1a94952d8002759acd6946c4d5d0b5de
SHA5128d1815b277a93ad590ff79b6f52c576cf920c38c4353c24193f707d66884c942f39ff3989530055d2fade540ade243b41b6eb03cd0cc361c3b5d514cca28b50a
-
Filesize
854B
MD5f75907a5c5dfb9792ba3cd6e16b3ccc4
SHA10904045a1ec0961cf745b1236c7c2f656c08e9bd
SHA2562e0a40b21c1ad5a7a8cf00305f4bbd0f293e1097e286662466776d207563f257
SHA51263ab51112f63e87e647c11ddda2ec23511867699c789fcd2b641823554fd09ba409a86c624bb4426a53b0ec7b44bae0fbfd6697a3d8f647989d2ed650909dcba