Analysis
-
max time kernel
127s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24-09-2024 16:53
Behavioral task
behavioral1
Sample
0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe
Resource
win10v2004-20240802-en
General
-
Target
0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe
-
Size
158KB
-
MD5
7ab781bc4eaef1e1dc3d04fffe3fb893
-
SHA1
96a304b8b5f50a3666ee41d212771cb7b71abea7
-
SHA256
0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216
-
SHA512
e53b4cb0621e673c06dd84d89e1dd7161e91f062415ae0cbf52e40e61213bdc1aa238b66f31b14d826716848dbb20f8a6dd68a970ca83f63c4110d0e186ea542
-
SSDEEP
3072:TbziH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPoFO8Y:Tbzie0ODhTEPgnjuIJzo+PPcfPoo8
Malware Config
Extracted
arrowrat
r00t
necessary-sick.gl.at.ply.gg:32835
DsCbljCVL
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe Token: SeShutdownPrivilege 2984 explorer.exe Token: SeShutdownPrivilege 2984 explorer.exe Token: SeShutdownPrivilege 2984 explorer.exe Token: SeShutdownPrivilege 2984 explorer.exe Token: SeShutdownPrivilege 2984 explorer.exe Token: SeShutdownPrivilege 2984 explorer.exe Token: SeShutdownPrivilege 2984 explorer.exe Token: SeShutdownPrivilege 2984 explorer.exe Token: SeShutdownPrivilege 2984 explorer.exe Token: SeShutdownPrivilege 2984 explorer.exe Token: SeShutdownPrivilege 2984 explorer.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2984 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 30 PID 2844 wrote to memory of 2984 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 30 PID 2844 wrote to memory of 2984 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 30 PID 2984 wrote to memory of 2832 2984 explorer.exe 32 PID 2984 wrote to memory of 2832 2984 explorer.exe 32 PID 2984 wrote to memory of 2832 2984 explorer.exe 32 PID 2844 wrote to memory of 2712 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 31 PID 2844 wrote to memory of 2712 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 31 PID 2844 wrote to memory of 2712 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 31 PID 2844 wrote to memory of 2712 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 31 PID 2844 wrote to memory of 2912 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 33 PID 2844 wrote to memory of 2912 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 33 PID 2844 wrote to memory of 2912 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 33 PID 2844 wrote to memory of 2912 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 33 PID 2844 wrote to memory of 2072 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 34 PID 2844 wrote to memory of 2072 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 34 PID 2844 wrote to memory of 2072 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 34 PID 2844 wrote to memory of 2072 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 34 PID 2844 wrote to memory of 2676 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 35 PID 2844 wrote to memory of 2676 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 35 PID 2844 wrote to memory of 2676 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 35 PID 2844 wrote to memory of 2676 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 35 PID 2844 wrote to memory of 2612 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 36 PID 2844 wrote to memory of 2612 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 36 PID 2844 wrote to memory of 2612 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 36 PID 2844 wrote to memory of 2612 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 36 PID 2844 wrote to memory of 3060 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 37 PID 2844 wrote to memory of 3060 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 37 PID 2844 wrote to memory of 3060 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 37 PID 2844 wrote to memory of 3060 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 37 PID 2844 wrote to memory of 2724 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 38 PID 2844 wrote to memory of 2724 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 38 PID 2844 wrote to memory of 2724 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 38 PID 2844 wrote to memory of 2724 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 38 PID 2844 wrote to memory of 2632 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 39 PID 2844 wrote to memory of 2632 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 39 PID 2844 wrote to memory of 2632 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 39 PID 2844 wrote to memory of 2632 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 39 PID 2844 wrote to memory of 2884 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 40 PID 2844 wrote to memory of 2884 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 40 PID 2844 wrote to memory of 2884 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 40 PID 2844 wrote to memory of 2884 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 40 PID 2844 wrote to memory of 2644 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 41 PID 2844 wrote to memory of 2644 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 41 PID 2844 wrote to memory of 2644 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 41 PID 2844 wrote to memory of 2644 2844 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 41 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe"C:\Users\Admin\AppData\Local\Temp\0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\system32\ctfmon.exectfmon.exe3⤵PID:2832
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" r00t necessary-sick.gl.at.ply.gg 32835 DsCbljCVL2⤵PID:2712
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" r00t necessary-sick.gl.at.ply.gg 32835 DsCbljCVL2⤵PID:2912
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" r00t necessary-sick.gl.at.ply.gg 32835 DsCbljCVL2⤵PID:2072
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" r00t necessary-sick.gl.at.ply.gg 32835 DsCbljCVL2⤵PID:2676
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" r00t necessary-sick.gl.at.ply.gg 32835 DsCbljCVL2⤵PID:2612
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" r00t necessary-sick.gl.at.ply.gg 32835 DsCbljCVL2⤵PID:3060
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" r00t necessary-sick.gl.at.ply.gg 32835 DsCbljCVL2⤵PID:2724
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" r00t necessary-sick.gl.at.ply.gg 32835 DsCbljCVL2⤵PID:2632
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" r00t necessary-sick.gl.at.ply.gg 32835 DsCbljCVL2⤵PID:2884
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" r00t necessary-sick.gl.at.ply.gg 32835 DsCbljCVL2⤵PID:2644
-