Analysis
-
max time kernel
127s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-11-2024 19:44
Behavioral task
behavioral1
Sample
6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe
Resource
win10v2004-20241007-en
General
-
Target
6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe
-
Size
138KB
-
MD5
348c70b182eb53d74fe080f57c7265bc
-
SHA1
42e3e7c848fc8774dd7bd6be1e3bdfe98fc86e06
-
SHA256
6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090
-
SHA512
3b2c3f04443e76371fdd03aae0b4c846bcf585ad69d235ff595612f24a96607b7c44b5182a66c87b589044a5d3b2b77839c384b5ccc7fc65b8b10c40982ada12
-
SSDEEP
3072:Jbvs5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/Yl:JbvES7BqjjYHdrqkL/
Malware Config
Extracted
arrowrat
BRASIL
chromedata.accesscam.org:1338
imfoNeSSi
Signatures
-
Arrowrat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
explorer.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies registry class 5 IoCs
Processes:
explorer.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exepid Process 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exeexplorer.exedescription pid Process Token: SeDebugPrivilege 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe Token: SeShutdownPrivilege 2136 explorer.exe Token: SeShutdownPrivilege 2136 explorer.exe Token: SeShutdownPrivilege 2136 explorer.exe Token: SeShutdownPrivilege 2136 explorer.exe Token: SeShutdownPrivilege 2136 explorer.exe Token: SeShutdownPrivilege 2136 explorer.exe Token: SeShutdownPrivilege 2136 explorer.exe Token: SeShutdownPrivilege 2136 explorer.exe Token: SeShutdownPrivilege 2136 explorer.exe Token: SeShutdownPrivilege 2136 explorer.exe Token: SeShutdownPrivilege 2136 explorer.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
Processes:
explorer.exepid Process 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe -
Suspicious use of SendNotifyMessage 21 IoCs
Processes:
explorer.exepid Process 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe 2136 explorer.exe -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exeexplorer.exedescription pid Process procid_target PID 1016 wrote to memory of 2136 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 30 PID 1016 wrote to memory of 2136 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 30 PID 1016 wrote to memory of 2136 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 30 PID 2136 wrote to memory of 2128 2136 explorer.exe 32 PID 2136 wrote to memory of 2128 2136 explorer.exe 32 PID 2136 wrote to memory of 2128 2136 explorer.exe 32 PID 1016 wrote to memory of 1608 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 31 PID 1016 wrote to memory of 1608 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 31 PID 1016 wrote to memory of 1608 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 31 PID 1016 wrote to memory of 1608 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 31 PID 1016 wrote to memory of 2460 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 33 PID 1016 wrote to memory of 2460 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 33 PID 1016 wrote to memory of 2460 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 33 PID 1016 wrote to memory of 2460 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 33 PID 1016 wrote to memory of 2400 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 34 PID 1016 wrote to memory of 2400 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 34 PID 1016 wrote to memory of 2400 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 34 PID 1016 wrote to memory of 2400 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 34 PID 1016 wrote to memory of 2604 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 35 PID 1016 wrote to memory of 2604 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 35 PID 1016 wrote to memory of 2604 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 35 PID 1016 wrote to memory of 2604 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 35 PID 1016 wrote to memory of 2236 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 36 PID 1016 wrote to memory of 2236 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 36 PID 1016 wrote to memory of 2236 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 36 PID 1016 wrote to memory of 2236 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 36 PID 1016 wrote to memory of 2620 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 37 PID 1016 wrote to memory of 2620 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 37 PID 1016 wrote to memory of 2620 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 37 PID 1016 wrote to memory of 2620 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 37 PID 1016 wrote to memory of 2616 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 38 PID 1016 wrote to memory of 2616 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 38 PID 1016 wrote to memory of 2616 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 38 PID 1016 wrote to memory of 2616 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 38 PID 1016 wrote to memory of 2660 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 39 PID 1016 wrote to memory of 2660 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 39 PID 1016 wrote to memory of 2660 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 39 PID 1016 wrote to memory of 2660 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 39 PID 1016 wrote to memory of 2716 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 40 PID 1016 wrote to memory of 2716 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 40 PID 1016 wrote to memory of 2716 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 40 PID 1016 wrote to memory of 2716 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 40 PID 1016 wrote to memory of 2720 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 41 PID 1016 wrote to memory of 2720 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 41 PID 1016 wrote to memory of 2720 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 41 PID 1016 wrote to memory of 2720 1016 6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe 41 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe"C:\Users\Admin\AppData\Local\Temp\6aad7dead2ff9aa2996314a6c73f3043513ed155ed36507411efb7b38343c090.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\system32\ctfmon.exectfmon.exe3⤵PID:2128
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" BRASIL chromedata.accesscam.org 1338 imfoNeSSi2⤵PID:1608
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" BRASIL chromedata.accesscam.org 1338 imfoNeSSi2⤵PID:2460
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" BRASIL chromedata.accesscam.org 1338 imfoNeSSi2⤵PID:2400
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" BRASIL chromedata.accesscam.org 1338 imfoNeSSi2⤵PID:2604
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" BRASIL chromedata.accesscam.org 1338 imfoNeSSi2⤵PID:2236
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" BRASIL chromedata.accesscam.org 1338 imfoNeSSi2⤵PID:2620
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" BRASIL chromedata.accesscam.org 1338 imfoNeSSi2⤵PID:2616
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" BRASIL chromedata.accesscam.org 1338 imfoNeSSi2⤵PID:2660
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" BRASIL chromedata.accesscam.org 1338 imfoNeSSi2⤵PID:2716
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" BRASIL chromedata.accesscam.org 1338 imfoNeSSi2⤵PID:2720
-