Analysis
-
max time kernel
127s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 01:06
Behavioral task
behavioral1
Sample
0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe
Resource
win10v2004-20240802-en
General
-
Target
0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe
-
Size
158KB
-
MD5
7ab781bc4eaef1e1dc3d04fffe3fb893
-
SHA1
96a304b8b5f50a3666ee41d212771cb7b71abea7
-
SHA256
0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216
-
SHA512
e53b4cb0621e673c06dd84d89e1dd7161e91f062415ae0cbf52e40e61213bdc1aa238b66f31b14d826716848dbb20f8a6dd68a970ca83f63c4110d0e186ea542
-
SSDEEP
3072:TbziH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPoFO8Y:Tbzie0ODhTEPgnjuIJzo+PPcfPoo8
Malware Config
Extracted
arrowrat
r00t
necessary-sick.gl.at.ply.gg:32835
DsCbljCVL
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
explorer.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies registry class 5 IoCs
Processes:
explorer.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exepid Process 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exeexplorer.exedescription pid Process Token: SeDebugPrivilege 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe Token: SeShutdownPrivilege 2000 explorer.exe Token: SeShutdownPrivilege 2000 explorer.exe Token: SeShutdownPrivilege 2000 explorer.exe Token: SeShutdownPrivilege 2000 explorer.exe Token: SeShutdownPrivilege 2000 explorer.exe Token: SeShutdownPrivilege 2000 explorer.exe Token: SeShutdownPrivilege 2000 explorer.exe Token: SeShutdownPrivilege 2000 explorer.exe Token: SeShutdownPrivilege 2000 explorer.exe Token: SeShutdownPrivilege 2000 explorer.exe Token: SeShutdownPrivilege 2000 explorer.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
Processes:
explorer.exepid Process 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
Processes:
explorer.exepid Process 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe 2000 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exepid Process 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exeexplorer.exedescription pid Process procid_target PID 2384 wrote to memory of 2000 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 30 PID 2384 wrote to memory of 2000 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 30 PID 2384 wrote to memory of 2000 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 30 PID 2384 wrote to memory of 2324 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 31 PID 2384 wrote to memory of 2324 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 31 PID 2384 wrote to memory of 2324 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 31 PID 2384 wrote to memory of 2324 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 31 PID 2384 wrote to memory of 2376 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 32 PID 2384 wrote to memory of 2376 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 32 PID 2384 wrote to memory of 2376 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 32 PID 2384 wrote to memory of 2376 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 32 PID 2384 wrote to memory of 276 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 33 PID 2384 wrote to memory of 276 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 33 PID 2384 wrote to memory of 276 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 33 PID 2384 wrote to memory of 276 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 33 PID 2384 wrote to memory of 1400 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 34 PID 2384 wrote to memory of 1400 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 34 PID 2384 wrote to memory of 1400 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 34 PID 2384 wrote to memory of 1400 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 34 PID 2384 wrote to memory of 3036 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 35 PID 2384 wrote to memory of 3036 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 35 PID 2384 wrote to memory of 3036 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 35 PID 2384 wrote to memory of 3036 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 35 PID 2384 wrote to memory of 264 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 36 PID 2384 wrote to memory of 264 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 36 PID 2384 wrote to memory of 264 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 36 PID 2384 wrote to memory of 264 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 36 PID 2384 wrote to memory of 440 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 37 PID 2384 wrote to memory of 440 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 37 PID 2384 wrote to memory of 440 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 37 PID 2384 wrote to memory of 440 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 37 PID 2384 wrote to memory of 948 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 38 PID 2384 wrote to memory of 948 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 38 PID 2384 wrote to memory of 948 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 38 PID 2384 wrote to memory of 948 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 38 PID 2384 wrote to memory of 2228 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 39 PID 2384 wrote to memory of 2228 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 39 PID 2384 wrote to memory of 2228 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 39 PID 2384 wrote to memory of 2228 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 39 PID 2384 wrote to memory of 2240 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 40 PID 2384 wrote to memory of 2240 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 40 PID 2384 wrote to memory of 2240 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 40 PID 2384 wrote to memory of 2240 2384 0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe 40 PID 2000 wrote to memory of 568 2000 explorer.exe 41 PID 2000 wrote to memory of 568 2000 explorer.exe 41 PID 2000 wrote to memory of 568 2000 explorer.exe 41 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe"C:\Users\Admin\AppData\Local\Temp\0d765dc413009ddb31ab0685ee4eb1a1dd9e68d415c0f75df36fd08c195bc216.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\system32\ctfmon.exectfmon.exe3⤵PID:568
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" r00t necessary-sick.gl.at.ply.gg 32835 DsCbljCVL2⤵PID:2324
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" r00t necessary-sick.gl.at.ply.gg 32835 DsCbljCVL2⤵PID:2376
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" r00t necessary-sick.gl.at.ply.gg 32835 DsCbljCVL2⤵PID:276
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" r00t necessary-sick.gl.at.ply.gg 32835 DsCbljCVL2⤵PID:1400
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" r00t necessary-sick.gl.at.ply.gg 32835 DsCbljCVL2⤵PID:3036
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" r00t necessary-sick.gl.at.ply.gg 32835 DsCbljCVL2⤵PID:264
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" r00t necessary-sick.gl.at.ply.gg 32835 DsCbljCVL2⤵PID:440
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" r00t necessary-sick.gl.at.ply.gg 32835 DsCbljCVL2⤵PID:948
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" r00t necessary-sick.gl.at.ply.gg 32835 DsCbljCVL2⤵PID:2228
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" r00t necessary-sick.gl.at.ply.gg 32835 DsCbljCVL2⤵PID:2240
-