Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
19-05-2022 11:10
Static task
static1
Behavioral task
behavioral1
Sample
37710c8c1faa69416e6fd5ef93bff1b2.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
37710c8c1faa69416e6fd5ef93bff1b2.exe
Resource
win10v2004-20220414-en
General
-
Target
37710c8c1faa69416e6fd5ef93bff1b2.exe
-
Size
1.2MB
-
MD5
37710c8c1faa69416e6fd5ef93bff1b2
-
SHA1
65457baa7458cafd4e1e69c17e05f897fb75f6d5
-
SHA256
a11547298e187eb98cb99e5fbaa66260ce912a398252adf09da4ae816045961f
-
SHA512
0c709ee122c950d4da796caecfc44beeaab5954bd8dcec44799f2715cb4f30e3493d02bfba35273510015158bc059496a21ee463be9265ac099d41b639cbb61a
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2512 created 3256 2512 Sia.exe.pif 54 -
suricata: ET MALWARE Arechclient2 Backdoor CnC Init
suricata: ET MALWARE Arechclient2 Backdoor CnC Init
-
Executes dropped EXE 1 IoCs
pid Process 2512 Sia.exe.pif -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ayzpVWmiSi.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ayzpVWmiSi.url cmd.exe -
Loads dropped DLL 6 IoCs
pid Process 2512 Sia.exe.pif 2512 Sia.exe.pif 2512 Sia.exe.pif 2512 Sia.exe.pif 2512 Sia.exe.pif 2512 Sia.exe.pif -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 37710c8c1faa69416e6fd5ef93bff1b2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 37710c8c1faa69416e6fd5ef93bff1b2.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 19 eth0.me -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2512 set thread context of 112 2512 Sia.exe.pif 103 -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2728 tasklist.exe 920 tasklist.exe -
Kills process with taskkill 1 IoCs
pid Process 4320 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3396 PING.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2512 Sia.exe.pif 2512 Sia.exe.pif 112 jsc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2728 tasklist.exe Token: SeDebugPrivilege 920 tasklist.exe Token: SeDebugPrivilege 112 jsc.exe Token: SeDebugPrivilege 4320 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2512 Sia.exe.pif 2512 Sia.exe.pif 2512 Sia.exe.pif -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2512 Sia.exe.pif 2512 Sia.exe.pif 2512 Sia.exe.pif -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1212 wrote to memory of 888 1212 37710c8c1faa69416e6fd5ef93bff1b2.exe 82 PID 1212 wrote to memory of 888 1212 37710c8c1faa69416e6fd5ef93bff1b2.exe 82 PID 1212 wrote to memory of 888 1212 37710c8c1faa69416e6fd5ef93bff1b2.exe 82 PID 1212 wrote to memory of 1420 1212 37710c8c1faa69416e6fd5ef93bff1b2.exe 84 PID 1212 wrote to memory of 1420 1212 37710c8c1faa69416e6fd5ef93bff1b2.exe 84 PID 1212 wrote to memory of 1420 1212 37710c8c1faa69416e6fd5ef93bff1b2.exe 84 PID 1420 wrote to memory of 2348 1420 cmd.exe 86 PID 1420 wrote to memory of 2348 1420 cmd.exe 86 PID 1420 wrote to memory of 2348 1420 cmd.exe 86 PID 2348 wrote to memory of 2728 2348 cmd.exe 87 PID 2348 wrote to memory of 2728 2348 cmd.exe 87 PID 2348 wrote to memory of 2728 2348 cmd.exe 87 PID 2348 wrote to memory of 3372 2348 cmd.exe 88 PID 2348 wrote to memory of 3372 2348 cmd.exe 88 PID 2348 wrote to memory of 3372 2348 cmd.exe 88 PID 2348 wrote to memory of 920 2348 cmd.exe 89 PID 2348 wrote to memory of 920 2348 cmd.exe 89 PID 2348 wrote to memory of 920 2348 cmd.exe 89 PID 2348 wrote to memory of 1628 2348 cmd.exe 90 PID 2348 wrote to memory of 1628 2348 cmd.exe 90 PID 2348 wrote to memory of 1628 2348 cmd.exe 90 PID 2348 wrote to memory of 2272 2348 cmd.exe 91 PID 2348 wrote to memory of 2272 2348 cmd.exe 91 PID 2348 wrote to memory of 2272 2348 cmd.exe 91 PID 2348 wrote to memory of 2512 2348 cmd.exe 92 PID 2348 wrote to memory of 2512 2348 cmd.exe 92 PID 2348 wrote to memory of 2512 2348 cmd.exe 92 PID 2348 wrote to memory of 3396 2348 cmd.exe 93 PID 2348 wrote to memory of 3396 2348 cmd.exe 93 PID 2348 wrote to memory of 3396 2348 cmd.exe 93 PID 2512 wrote to memory of 2344 2512 Sia.exe.pif 94 PID 2512 wrote to memory of 2344 2512 Sia.exe.pif 94 PID 2512 wrote to memory of 2344 2512 Sia.exe.pif 94 PID 2512 wrote to memory of 112 2512 Sia.exe.pif 103 PID 2512 wrote to memory of 112 2512 Sia.exe.pif 103 PID 2512 wrote to memory of 112 2512 Sia.exe.pif 103 PID 2512 wrote to memory of 112 2512 Sia.exe.pif 103 PID 2512 wrote to memory of 112 2512 Sia.exe.pif 103 PID 112 wrote to memory of 4320 112 jsc.exe 104 PID 112 wrote to memory of 4320 112 jsc.exe 104 PID 112 wrote to memory of 4320 112 jsc.exe 104
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3256
-
C:\Users\Admin\AppData\Local\Temp\37710c8c1faa69416e6fd5ef93bff1b2.exe"C:\Users\Admin\AppData\Local\Temp\37710c8c1faa69416e6fd5ef93bff1b2.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\cmd.execmd /c 8883⤵PID:888
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Bisogna.xltx3⤵
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\cmd.execmd4⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq BullGuardCore.exe"5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
C:\Windows\SysWOW64\find.exefind /I /N "bullguardcore.exe"5⤵PID:3372
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq PSUAService.exe"5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:920
-
-
C:\Windows\SysWOW64\find.exefind /I /N "psuaservice.exe"5⤵PID:1628
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^QlYYGayeJrJMVaFucCpjnLjXjfCAOcjSVkPrFqRcTeOzyFebtlQOryCyXqLdPEhgQRRJCCBxLOzvXSSHh$" Vederlo.xltx5⤵PID:2272
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sia.exe.pifSia.exe.pif o5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /im chrome.exe /f7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4320
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 55⤵
- Runs ping.exe
PID:3396
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ayzpVWmiSi.url" & echo URL="C:\Users\Admin\AppData\Local\Temp\rYrhtCJypf\iIvLPClunfOCW.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ayzpVWmiSi.url"2⤵
- Drops startup file
PID:2344
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:5012
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD53dc4a3ab1f072e3596ab62442a8895f5
SHA187888d06ed28a9139afe0986ef230fb80c2ad35a
SHA256fae92ed3d0ecaa46a0b7aebbc75f3268824068dec93f2ce8d0df3c38b279f046
SHA5120215d031307f1c6cd55dca966fdab8387f70a50e2734e6fca4176892c4f3d33b1bb02ddaefb8cd6f79e9f122d0162f9ac010a287f15201b5938fd1f84709143a
-
Filesize
1.8MB
MD50adef5c57cf8c90d23e956595826726e
SHA18732d83dd37f4b1745d96175ab66edc9b5ec7281
SHA25602e454b2b7dd43d262fd3c3ff8a8baded76a556653d17bfd2dba5457bc8c22d5
SHA51272cc8591e6994938d0c28b34617bc0218004a1e4cf2e9e0783bbc804527d837bcbe0f0310c392d92ae4ed9d4555d3637e821613d16a2e91592f4b34c5ee57645
-
Filesize
924KB
MD56987e4cd3f256462f422326a7ef115b9
SHA171672a495b4603ecfec40a65254cb3ba8766bbe0
SHA2563e26723394ade92f8163b5643960189cb07358b0f96529a477d37176d68aa0a0
SHA5124b1d7f7ffee39a2d65504767beeddd4c3374807a93889b14e7e73db11e478492dec349aedca03ce828f21a66bb666a68d3735443f4249556e10825a4cd7dfeb4
-
Filesize
924KB
MD56987e4cd3f256462f422326a7ef115b9
SHA171672a495b4603ecfec40a65254cb3ba8766bbe0
SHA2563e26723394ade92f8163b5643960189cb07358b0f96529a477d37176d68aa0a0
SHA5124b1d7f7ffee39a2d65504767beeddd4c3374807a93889b14e7e73db11e478492dec349aedca03ce828f21a66bb666a68d3735443f4249556e10825a4cd7dfeb4
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
924KB
MD54f740a8b34570d48a914076ff4785932
SHA13029a7e0769f2ecc60f2cb46142dea6ff975dd09
SHA256f4515fb1d5ee3db30f1edd3b40ec3d792f9f386091156012d08f1451272e7809
SHA51248640664678a793736582a58ecfc3fc2c6679b6957e0fd81d6e71210c2a1b3ead944229ec3e496383ab3d0905be33b2051b5eb4cc151cdca1f8746e086a57d88