Analysis

  • max time kernel
    141s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    19-05-2022 11:10

General

  • Target

    37710c8c1faa69416e6fd5ef93bff1b2.exe

  • Size

    1.2MB

  • MD5

    37710c8c1faa69416e6fd5ef93bff1b2

  • SHA1

    65457baa7458cafd4e1e69c17e05f897fb75f6d5

  • SHA256

    a11547298e187eb98cb99e5fbaa66260ce912a398252adf09da4ae816045961f

  • SHA512

    0c709ee122c950d4da796caecfc44beeaab5954bd8dcec44799f2715cb4f30e3493d02bfba35273510015158bc059496a21ee463be9265ac099d41b639cbb61a

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • UAC bypass 3 TTPs
  • suricata: ET MALWARE Arechclient2 Backdoor CnC Init

    suricata: ET MALWARE Arechclient2 Backdoor CnC Init

  • Executes dropped EXE 1 IoCs
  • Drops startup file 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Kills process with taskkill 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3256
      • C:\Users\Admin\AppData\Local\Temp\37710c8c1faa69416e6fd5ef93bff1b2.exe
        "C:\Users\Admin\AppData\Local\Temp\37710c8c1faa69416e6fd5ef93bff1b2.exe"
        2⤵
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1212
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c 888
          3⤵
            PID:888
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c cmd < Bisogna.xltx
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1420
            • C:\Windows\SysWOW64\cmd.exe
              cmd
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2348
              • C:\Windows\SysWOW64\tasklist.exe
                tasklist /FI "imagename eq BullGuardCore.exe"
                5⤵
                • Enumerates processes with tasklist
                • Suspicious use of AdjustPrivilegeToken
                PID:2728
              • C:\Windows\SysWOW64\find.exe
                find /I /N "bullguardcore.exe"
                5⤵
                  PID:3372
                • C:\Windows\SysWOW64\tasklist.exe
                  tasklist /FI "imagename eq PSUAService.exe"
                  5⤵
                  • Enumerates processes with tasklist
                  • Suspicious use of AdjustPrivilegeToken
                  PID:920
                • C:\Windows\SysWOW64\find.exe
                  find /I /N "psuaservice.exe"
                  5⤵
                    PID:1628
                  • C:\Windows\SysWOW64\findstr.exe
                    findstr /V /R "^QlYYGayeJrJMVaFucCpjnLjXjfCAOcjSVkPrFqRcTeOzyFebtlQOryCyXqLdPEhgQRRJCCBxLOzvXSSHh$" Vederlo.xltx
                    5⤵
                      PID:2272
                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sia.exe.pif
                      Sia.exe.pif o
                      5⤵
                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      • Suspicious use of WriteProcessMemory
                      PID:2512
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
                        6⤵
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:112
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /im chrome.exe /f
                          7⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4320
                    • C:\Windows\SysWOW64\PING.EXE
                      ping localhost -n 5
                      5⤵
                      • Runs ping.exe
                      PID:3396
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ayzpVWmiSi.url" & echo URL="C:\Users\Admin\AppData\Local\Temp\rYrhtCJypf\iIvLPClunfOCW.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ayzpVWmiSi.url"
                2⤵
                • Drops startup file
                PID:2344
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
              1⤵
                PID:5012

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Bisogna.xltx

                Filesize

                9KB

                MD5

                3dc4a3ab1f072e3596ab62442a8895f5

                SHA1

                87888d06ed28a9139afe0986ef230fb80c2ad35a

                SHA256

                fae92ed3d0ecaa46a0b7aebbc75f3268824068dec93f2ce8d0df3c38b279f046

                SHA512

                0215d031307f1c6cd55dca966fdab8387f70a50e2734e6fca4176892c4f3d33b1bb02ddaefb8cd6f79e9f122d0162f9ac010a287f15201b5938fd1f84709143a

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Giacche.xltx

                Filesize

                1.8MB

                MD5

                0adef5c57cf8c90d23e956595826726e

                SHA1

                8732d83dd37f4b1745d96175ab66edc9b5ec7281

                SHA256

                02e454b2b7dd43d262fd3c3ff8a8baded76a556653d17bfd2dba5457bc8c22d5

                SHA512

                72cc8591e6994938d0c28b34617bc0218004a1e4cf2e9e0783bbc804527d837bcbe0f0310c392d92ae4ed9d4555d3637e821613d16a2e91592f4b34c5ee57645

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sia.exe.pif

                Filesize

                924KB

                MD5

                6987e4cd3f256462f422326a7ef115b9

                SHA1

                71672a495b4603ecfec40a65254cb3ba8766bbe0

                SHA256

                3e26723394ade92f8163b5643960189cb07358b0f96529a477d37176d68aa0a0

                SHA512

                4b1d7f7ffee39a2d65504767beeddd4c3374807a93889b14e7e73db11e478492dec349aedca03ce828f21a66bb666a68d3735443f4249556e10825a4cd7dfeb4

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sia.exe.pif

                Filesize

                924KB

                MD5

                6987e4cd3f256462f422326a7ef115b9

                SHA1

                71672a495b4603ecfec40a65254cb3ba8766bbe0

                SHA256

                3e26723394ade92f8163b5643960189cb07358b0f96529a477d37176d68aa0a0

                SHA512

                4b1d7f7ffee39a2d65504767beeddd4c3374807a93889b14e7e73db11e478492dec349aedca03ce828f21a66bb666a68d3735443f4249556e10825a4cd7dfeb4

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\TVkTVicneE.dll

                Filesize

                1.6MB

                MD5

                4f3387277ccbd6d1f21ac5c07fe4ca68

                SHA1

                e16506f662dc92023bf82def1d621497c8ab5890

                SHA256

                767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac

                SHA512

                9da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\TVkTVicneE.dll

                Filesize

                1.6MB

                MD5

                4f3387277ccbd6d1f21ac5c07fe4ca68

                SHA1

                e16506f662dc92023bf82def1d621497c8ab5890

                SHA256

                767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac

                SHA512

                9da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\TVkTVicneE.dll

                Filesize

                1.6MB

                MD5

                4f3387277ccbd6d1f21ac5c07fe4ca68

                SHA1

                e16506f662dc92023bf82def1d621497c8ab5890

                SHA256

                767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac

                SHA512

                9da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\TVkTVicneE.dll

                Filesize

                1.6MB

                MD5

                4f3387277ccbd6d1f21ac5c07fe4ca68

                SHA1

                e16506f662dc92023bf82def1d621497c8ab5890

                SHA256

                767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac

                SHA512

                9da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\TVkTVicneE.dll

                Filesize

                1.6MB

                MD5

                4f3387277ccbd6d1f21ac5c07fe4ca68

                SHA1

                e16506f662dc92023bf82def1d621497c8ab5890

                SHA256

                767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac

                SHA512

                9da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\TVkTVicneE.dll

                Filesize

                1.6MB

                MD5

                4f3387277ccbd6d1f21ac5c07fe4ca68

                SHA1

                e16506f662dc92023bf82def1d621497c8ab5890

                SHA256

                767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac

                SHA512

                9da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Vederlo.xltx

                Filesize

                924KB

                MD5

                4f740a8b34570d48a914076ff4785932

                SHA1

                3029a7e0769f2ecc60f2cb46142dea6ff975dd09

                SHA256

                f4515fb1d5ee3db30f1edd3b40ec3d792f9f386091156012d08f1451272e7809

                SHA512

                48640664678a793736582a58ecfc3fc2c6679b6957e0fd81d6e71210c2a1b3ead944229ec3e496383ab3d0905be33b2051b5eb4cc151cdca1f8746e086a57d88

              • memory/112-155-0x0000000005F10000-0x00000000064B4000-memory.dmp

                Filesize

                5.6MB

              • memory/112-151-0x0000000001230000-0x00000000012D0000-memory.dmp

                Filesize

                640KB

              • memory/112-163-0x0000000007FC0000-0x0000000007FFC000-memory.dmp

                Filesize

                240KB

              • memory/112-162-0x0000000007EE0000-0x0000000007EF2000-memory.dmp

                Filesize

                72KB

              • memory/112-161-0x0000000006BC0000-0x0000000006BDE000-memory.dmp

                Filesize

                120KB

              • memory/112-146-0x0000000000000000-mapping.dmp

              • memory/112-160-0x0000000007330000-0x000000000785C000-memory.dmp

                Filesize

                5.2MB

              • memory/112-157-0x00000000066C0000-0x0000000006752000-memory.dmp

                Filesize

                584KB

              • memory/112-159-0x0000000006B10000-0x0000000006B86000-memory.dmp

                Filesize

                472KB

              • memory/112-158-0x0000000006C30000-0x0000000006DF2000-memory.dmp

                Filesize

                1.8MB

              • memory/112-156-0x0000000005890000-0x00000000058F6000-memory.dmp

                Filesize

                408KB

              • memory/888-130-0x0000000000000000-mapping.dmp

              • memory/920-136-0x0000000000000000-mapping.dmp

              • memory/1420-131-0x0000000000000000-mapping.dmp

              • memory/1628-137-0x0000000000000000-mapping.dmp

              • memory/2272-138-0x0000000000000000-mapping.dmp

              • memory/2344-145-0x0000000000000000-mapping.dmp

              • memory/2348-133-0x0000000000000000-mapping.dmp

              • memory/2512-141-0x0000000000000000-mapping.dmp

              • memory/2728-134-0x0000000000000000-mapping.dmp

              • memory/3372-135-0x0000000000000000-mapping.dmp

              • memory/3396-143-0x0000000000000000-mapping.dmp

              • memory/4320-164-0x0000000000000000-mapping.dmp