Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-12-2024 04:37

General

  • Target

    98c70efff4675dd2ef3f9a90afb155c4fdbee2aa1f0f2e1641f9c0b8f432407a.exe

  • Size

    1.2MB

  • MD5

    4542c9e57e9d955244262c035aaffe94

  • SHA1

    3dfade02ec7892ebdfa977c25354a352e0c55f56

  • SHA256

    98c70efff4675dd2ef3f9a90afb155c4fdbee2aa1f0f2e1641f9c0b8f432407a

  • SHA512

    ac1a22980f414a1b81700c88cd298ad039fd66e563067d14f5a8ea979e0cb2004d63b1246d1a0378ec883d9c3432789b2e3bcff963358e81010c55ee562e2ad9

  • SSDEEP

    24576:INA3R5drXPU/S9abXnZZKBlxr89Wvz4csbmDEbOBVXLzR6t2oE+Lyjx:h52LGBlxRJsiDV7V60onud

Malware Config

Extracted

Family

arrowrat

Botnet

Client01

C2

127.0.0.1:1338

Mutex

OSHPAW

Signatures

  • ArrowRat

    Remote access tool with various capabilities first seen in late 2021.

  • Arrowrat family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 9 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 16 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\98c70efff4675dd2ef3f9a90afb155c4fdbee2aa1f0f2e1641f9c0b8f432407a.exe
    "C:\Users\Admin\AppData\Local\Temp\98c70efff4675dd2ef3f9a90afb155c4fdbee2aa1f0f2e1641f9c0b8f432407a.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\oxfhxtr.cmd" "
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2400
      • C:\Users\Admin\AppData\Local\Temp\dfbzdfb.sfx.exe
        dfbzdfb.sfx.exe -dC:\Users\Admin\AppData\Local\Temp -pepouidalfszfugyRhvqxsdfHbgnmeUtyadfhmxvfofnglfyjfodyehal
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2428
        • C:\Users\Admin\AppData\Local\Temp\dfbzdfb.exe
          "C:\Users\Admin\AppData\Local\Temp\dfbzdfb.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2708
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Roaming\zdsthsxu.bat" "
            5⤵
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1520
            • C:\Users\Admin\AppData\Roaming\zdfhrgzd.sfx.exe
              zdfhrgzd.sfx.exe -dC:\Users\Admin\AppData\Roaming -pesgujhbotoqxqegtpsadelifsujhmwxgthutjkdewsqwngjMiczafugybsbBbsdhdqbqeku
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1904
              • C:\Users\Admin\AppData\Roaming\zdfhrgzd.exe
                "C:\Users\Admin\AppData\Roaming\zdfhrgzd.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:776
                • C:\Users\Admin\AppData\Roaming\zdfhrgzd.exe
                  C:\Users\Admin\AppData\Roaming\zdfhrgzd.exe
                  8⤵
                  • Modifies WinLogon for persistence
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:444
                  • C:\Windows\explorer.exe
                    "C:\Windows\explorer.exe"
                    9⤵
                      PID:300
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client01 127.0.0.1 1338 OSHPAW
                      9⤵
                      • System Location Discovery: System Language Discovery
                      PID:1716
                  • C:\Users\Admin\AppData\Roaming\zdfhrgzd.exe
                    C:\Users\Admin\AppData\Roaming\zdfhrgzd.exe
                    8⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2516
                    • C:\Windows\explorer.exe
                      "C:\Windows\explorer.exe"
                      9⤵
                      • Boot or Logon Autostart Execution: Active Setup
                      • Modifies Internet Explorer settings
                      • Modifies registry class
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      • Suspicious use of WriteProcessMemory
                      PID:900
                      • C:\Windows\system32\ctfmon.exe
                        ctfmon.exe
                        10⤵
                          PID:1624
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client01 127.0.0.1 1338 OSHPAW
                        9⤵
                        • System Location Discovery: System Language Discovery
                        PID:988
              • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
                "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Roaming\mts103wift.pdf"
                5⤵
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of SetWindowsHookEx
                PID:1568

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\dfbzdfb.exe

        Filesize

        778KB

        MD5

        06eb0777fca570612c196d90f0499213

        SHA1

        047a0a9434594cf652559d0813c5f5c93b58240f

        SHA256

        4802023516756de90b9bf7cf9987eb139bde5a6fa74197096261781584927caf

        SHA512

        43ae3398acdb406102b0f8178fb4eccbe48938601657da626bb89db5a4406c76a2269bd48121b0983e4e0c3e7aa9ca6d87621e7a508a16ace10781e4e2bee155

      • C:\Users\Admin\AppData\Local\Temp\oxfhxtr.cmd

        Filesize

        18KB

        MD5

        dabe7144df4dfbd438fc298b12fe4c36

        SHA1

        317542f096111dade642f3037cc315f156502b6c

        SHA256

        341d002e13527d35797fb578b00f936c0dc7160c42bab945d0c8a26ee769f0d3

        SHA512

        f402f5ad42034a9fe8cf846ceb7c0b254b73408d3fb3b54358d37a2591b0ab1be5f236856518e74370ef623eac08f36636253334724b3fa34282f18109c6ac1a

      • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

        Filesize

        3KB

        MD5

        6fbf2661eb1c110b1e3b2c3e4e5dfc6d

        SHA1

        f6f7d797de45f20bf47001b9140add08c9e38b10

        SHA256

        ef316a3438aff38738bc6dca8ac894e3ca40ac1d5d91acc05860178aa4fdf50a

        SHA512

        6bfe0deb97878d82cf88c1596f849750dda58f03584a33531a9ee47f9cff453bb4c5df825a5563425a0af7025e2cb407a23fe135e41a009ead68956095728e81

      • C:\Users\Admin\AppData\Roaming\mts103wift.pdf

        Filesize

        43KB

        MD5

        f10334c1dc5e4aec8fffd10387397af2

        SHA1

        a520e2e581be33181af241dab80799813bda5785

        SHA256

        307dd5cbcabfcbfd86b65b45f70fb5fc349b861593b74f36ff6416dd5aa44d1e

        SHA512

        2da918d25e6c50ac2423951b161b9c84833e1d06a978043c7a2ca88952ee625e4a0d3886135d112c846159c80e4ab59862ed95e14d8de9dd3930c6232bd6aecc

      • C:\Users\Admin\AppData\Roaming\zdfhrgzd.exe

        Filesize

        503KB

        MD5

        ec0967a3e53d490e8e1ce811ce53d003

        SHA1

        8330c2aad5c238a5bdfd07a63349f071d9117e41

        SHA256

        af31317870dc15d70a14de5a05ad945b4b0920738c0c00e9b3d0c06d2b808275

        SHA512

        2d663cab58b3adb893514cec91862f7819390f79e3c83e2a194c0ac7a28fd72efcfe6afe81aad88734180119550128888e918ac5e0290d460f06771fde909a51

      • C:\Users\Admin\AppData\Roaming\zdsthsxu.bat

        Filesize

        16KB

        MD5

        8fc1f8bb8306146a314528098c110ee3

        SHA1

        2330121e717650009b311a2605c68d62e39ca1e2

        SHA256

        ae520ec2cf0a324d9b23b14a9c8c6cc28348f8edd17d7b515d5ee07fea0237f9

        SHA512

        8f233fff9b11738e10dfffd87d1de5905b4c7f4ddf04f8ae5e28d1d6f6265be6898ef31a7ef94f42a38974d4add496dfeb8e0920597140fe0886f5e95fdb6e13

      • \Users\Admin\AppData\Local\Temp\dfbzdfb.sfx.exe

        Filesize

        923KB

        MD5

        3181c79bfcb07a0b43a020f22641f2b2

        SHA1

        a68ad92a42a1ccd8fd48737050a3e5fd459ccd08

        SHA256

        b932bc36f90d2fba9841cdb8bcaff7a0b7ccfecfe41f1d13ac5bfb6dbd241a04

        SHA512

        3ef8c85f12815523dabb865e32ea493f57d5e227aaabcccf96ca1c54eaf09e5bb81fafd18daa9d54121cf7ee20f6f5604e7ecf623c42f3c48df27e60cebe4bc8

      • \Users\Admin\AppData\Roaming\zdfhrgzd.sfx.exe

        Filesize

        609KB

        MD5

        f59872e2fcc71ef9eb742e3792c37a76

        SHA1

        8d1fc98643fae35a3f81a18e20fbfa708f04eca4

        SHA256

        f483a26d822aa187a37651ceb7ac83cb87ae827501add4cb43001a6b84538380

        SHA512

        156c64dcadc098902c0bb238a5f969aec9110ec1f83f6677204e49172461ab1f1fbd57e3b5b19b2f53ed4fd3c9e7568d7dd15dbb961b6c6f5f62b6b16d47eae2

      • memory/444-76-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/444-78-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/444-80-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/776-75-0x0000000000D70000-0x0000000000DF4000-memory.dmp

        Filesize

        528KB

      • memory/900-114-0x00000000044C0000-0x00000000044D0000-memory.dmp

        Filesize

        64KB

      • memory/988-107-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/988-106-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/988-103-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

        Filesize

        4KB

      • memory/1716-91-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/1716-89-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/1716-87-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/1716-85-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/1716-93-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

        Filesize

        4KB

      • memory/1716-94-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB