Analysis
-
max time kernel
144s -
max time network
299s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
20-05-2022 22:15
Static task
static1
Behavioral task
behavioral1
Sample
bf5ac731a613d7ed4c1f304252c33affcee5ac48d6b74c0955fa9ccca7e35659.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
bf5ac731a613d7ed4c1f304252c33affcee5ac48d6b74c0955fa9ccca7e35659.exe
Resource
win10-20220414-en
General
-
Target
bf5ac731a613d7ed4c1f304252c33affcee5ac48d6b74c0955fa9ccca7e35659.exe
-
Size
1.2MB
-
MD5
c257adbfd6c6ca7d12197eb2a843af29
-
SHA1
5388b0214498f81785859ef5b8ad886af8090cb1
-
SHA256
bf5ac731a613d7ed4c1f304252c33affcee5ac48d6b74c0955fa9ccca7e35659
-
SHA512
797c631248612fd9190ac06c8badc9c78d212c1284cbec5da6a6b57b3606e1a5e9307bffe41a0cdd2dbd32670260d778850d7636a26292c79c375481bcf43eec
Malware Config
Signatures
-
Detects Arechclient2 RAT 1 IoCs
Arechclient2.
Processes:
resource yara_rule behavioral2/memory/188-135-0x0000000000540000-0x00000000005E2000-memory.dmp MALWARE_Win_Arechclient -
suricata: ET MALWARE Arechclient2 Backdoor CnC Init
suricata: ET MALWARE Arechclient2 Backdoor CnC Init
-
Executes dropped EXE 1 IoCs
Processes:
Venir.exe.pifpid process 752 Venir.exe.pif -
Loads dropped DLL 6 IoCs
Processes:
Venir.exe.pifpid process 752 Venir.exe.pif 752 Venir.exe.pif 752 Venir.exe.pif 752 Venir.exe.pif 752 Venir.exe.pif 752 Venir.exe.pif -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
bf5ac731a613d7ed4c1f304252c33affcee5ac48d6b74c0955fa9ccca7e35659.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bf5ac731a613d7ed4c1f304252c33affcee5ac48d6b74c0955fa9ccca7e35659.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bf5ac731a613d7ed4c1f304252c33affcee5ac48d6b74c0955fa9ccca7e35659.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 eth0.me -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Venir.exe.pifdescription pid process target process PID 752 set thread context of 188 752 Venir.exe.pif jsc.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 3960 taskkill.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
jsc.exepid process 188 jsc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
tasklist.exejsc.exetaskkill.exedescription pid process Token: SeDebugPrivilege 2116 tasklist.exe Token: SeDebugPrivilege 188 jsc.exe Token: SeDebugPrivilege 3960 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
Venir.exe.pifpid process 752 Venir.exe.pif 752 Venir.exe.pif 752 Venir.exe.pif -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
Venir.exe.pifpid process 752 Venir.exe.pif 752 Venir.exe.pif 752 Venir.exe.pif -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
bf5ac731a613d7ed4c1f304252c33affcee5ac48d6b74c0955fa9ccca7e35659.exenet.execmd.execmd.exeVenir.exe.pifjsc.exedescription pid process target process PID 424 wrote to memory of 2084 424 bf5ac731a613d7ed4c1f304252c33affcee5ac48d6b74c0955fa9ccca7e35659.exe net.exe PID 424 wrote to memory of 2084 424 bf5ac731a613d7ed4c1f304252c33affcee5ac48d6b74c0955fa9ccca7e35659.exe net.exe PID 424 wrote to memory of 2084 424 bf5ac731a613d7ed4c1f304252c33affcee5ac48d6b74c0955fa9ccca7e35659.exe net.exe PID 2084 wrote to memory of 3312 2084 net.exe net1.exe PID 2084 wrote to memory of 3312 2084 net.exe net1.exe PID 2084 wrote to memory of 3312 2084 net.exe net1.exe PID 424 wrote to memory of 984 424 bf5ac731a613d7ed4c1f304252c33affcee5ac48d6b74c0955fa9ccca7e35659.exe cmd.exe PID 424 wrote to memory of 984 424 bf5ac731a613d7ed4c1f304252c33affcee5ac48d6b74c0955fa9ccca7e35659.exe cmd.exe PID 424 wrote to memory of 984 424 bf5ac731a613d7ed4c1f304252c33affcee5ac48d6b74c0955fa9ccca7e35659.exe cmd.exe PID 984 wrote to memory of 3948 984 cmd.exe cmd.exe PID 984 wrote to memory of 3948 984 cmd.exe cmd.exe PID 984 wrote to memory of 3948 984 cmd.exe cmd.exe PID 3948 wrote to memory of 2116 3948 cmd.exe tasklist.exe PID 3948 wrote to memory of 2116 3948 cmd.exe tasklist.exe PID 3948 wrote to memory of 2116 3948 cmd.exe tasklist.exe PID 3948 wrote to memory of 1776 3948 cmd.exe find.exe PID 3948 wrote to memory of 1776 3948 cmd.exe find.exe PID 3948 wrote to memory of 1776 3948 cmd.exe find.exe PID 3948 wrote to memory of 2984 3948 cmd.exe findstr.exe PID 3948 wrote to memory of 2984 3948 cmd.exe findstr.exe PID 3948 wrote to memory of 2984 3948 cmd.exe findstr.exe PID 3948 wrote to memory of 752 3948 cmd.exe Venir.exe.pif PID 3948 wrote to memory of 752 3948 cmd.exe Venir.exe.pif PID 3948 wrote to memory of 752 3948 cmd.exe Venir.exe.pif PID 3948 wrote to memory of 2700 3948 cmd.exe PING.EXE PID 3948 wrote to memory of 2700 3948 cmd.exe PING.EXE PID 3948 wrote to memory of 2700 3948 cmd.exe PING.EXE PID 752 wrote to memory of 3308 752 Venir.exe.pif schtasks.exe PID 752 wrote to memory of 3308 752 Venir.exe.pif schtasks.exe PID 752 wrote to memory of 3308 752 Venir.exe.pif schtasks.exe PID 752 wrote to memory of 188 752 Venir.exe.pif jsc.exe PID 752 wrote to memory of 188 752 Venir.exe.pif jsc.exe PID 752 wrote to memory of 188 752 Venir.exe.pif jsc.exe PID 752 wrote to memory of 188 752 Venir.exe.pif jsc.exe PID 752 wrote to memory of 188 752 Venir.exe.pif jsc.exe PID 188 wrote to memory of 3960 188 jsc.exe taskkill.exe PID 188 wrote to memory of 3960 188 jsc.exe taskkill.exe PID 188 wrote to memory of 3960 188 jsc.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf5ac731a613d7ed4c1f304252c33affcee5ac48d6b74c0955fa9ccca7e35659.exe"C:\Users\Admin\AppData\Local\Temp\bf5ac731a613d7ed4c1f304252c33affcee5ac48d6b74c0955fa9ccca7e35659.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exenet -?2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 -?3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Mio.mpeg2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq PSUAService.exe"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\find.exefind /I /N "psuaservice.exe"4⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^CyeykLUQNXJSDjdLKpQAeXmdxwOyFRjpssKapjdmLVpksUOnZVuYTkTEGLLlXOlWKAAkCXCbSsOuOhZmhdyKKhdubyMbBuCXLhBRzCVeaIuCvNQaMkXGIAkbpxNbkyWMPRcAMiuKxrawiOJKg$" Sul.mpeg4⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Venir.exe.pifVenir.exe.pif t4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "pUWUkVNDpP" /tr "C:\\Users\\Admin\\AppData\\Roaming\\rmsXjBNEEc\\pUWUkVNDpP.exe.pif C:\\Users\\Admin\\AppData\\Roaming\\rmsXjBNEEc\\w" /sc onstart /F /RU SYSTEM5⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /im chrome.exe /f6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 54⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Arcate.mpegFilesize
1.8MB
MD519570c9356c64a6aec328e94846e97ca
SHA10133b60fb4fa78840635cf5b0907b7c6b0f04404
SHA2562695dd08cae46454df5ed300521c84881c399ea1d642a4e770d3511ca4fce427
SHA5123563096c2a0ef155cb8cb4fb233c75f0926445d116ddd25a2ffc03db96ed53d4d7c41c881111c1c7e4a91388b64f193eb8cd4832ac40c97177fe4b826ebac2b7
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Mio.mpegFilesize
8KB
MD537ca0d14ed4efa0b5fc02be1149c9b57
SHA1a33fa850a812b9befc0d582affc9f2b9ecfe1b09
SHA256455b8b81e22200feb8963f862c1132ca37aa1ef6cf92300a97ab446377a9913b
SHA5127889cb39bbb38a3c3f03f6df6290091c70631e7fce6458ca33029a05a88c0743a8d6d904b2c517a3eb35df04e2436aa7d61e16b1729580b96b9872f5b7209a27
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sul.mpegFilesize
924KB
MD56ab3dd0a956b403d92d76f816dd89e38
SHA1d2519741b8e8a9f09fd0c7de64817ad8fc0debd5
SHA2564e70ccedae995ce7d39fcb70eceda2befba258f59fa4a95f7834b0354cc09e96
SHA51232f8c89265b704ffe1b824ac406df3dfe3a496523a459747f42191ab5c8bb1c09745f7c34c662a66242f0517191bea34335b148590a2aac0e29b5dcfb7f2cbd7
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Venir.exe.pifFilesize
924KB
MD56987e4cd3f256462f422326a7ef115b9
SHA171672a495b4603ecfec40a65254cb3ba8766bbe0
SHA2563e26723394ade92f8163b5643960189cb07358b0f96529a477d37176d68aa0a0
SHA5124b1d7f7ffee39a2d65504767beeddd4c3374807a93889b14e7e73db11e478492dec349aedca03ce828f21a66bb666a68d3735443f4249556e10825a4cd7dfeb4
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Venir.exe.pifFilesize
924KB
MD56987e4cd3f256462f422326a7ef115b9
SHA171672a495b4603ecfec40a65254cb3ba8766bbe0
SHA2563e26723394ade92f8163b5643960189cb07358b0f96529a477d37176d68aa0a0
SHA5124b1d7f7ffee39a2d65504767beeddd4c3374807a93889b14e7e73db11e478492dec349aedca03ce828f21a66bb666a68d3735443f4249556e10825a4cd7dfeb4
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\WIJeSO.dllFilesize
1.5MB
MD550741b3f2d7debf5d2bed63d88404029
SHA156210388a627b926162b36967045be06ffb1aad3
SHA256f2f8732ae464738372ff274b7e481366cecdd2337210d4a3cbcd089c958a730c
SHA512fac6bfe35b1ee08b3d42d330516a260d9cdb4a90bbb0491411a583029b92a59d20af3552372ea8fb3f59442b3945bf524ef284127f397ae7179467080be8e9b3
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\WIJeSO.dllFilesize
1.5MB
MD550741b3f2d7debf5d2bed63d88404029
SHA156210388a627b926162b36967045be06ffb1aad3
SHA256f2f8732ae464738372ff274b7e481366cecdd2337210d4a3cbcd089c958a730c
SHA512fac6bfe35b1ee08b3d42d330516a260d9cdb4a90bbb0491411a583029b92a59d20af3552372ea8fb3f59442b3945bf524ef284127f397ae7179467080be8e9b3
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\WIJeSO.dllFilesize
1.5MB
MD550741b3f2d7debf5d2bed63d88404029
SHA156210388a627b926162b36967045be06ffb1aad3
SHA256f2f8732ae464738372ff274b7e481366cecdd2337210d4a3cbcd089c958a730c
SHA512fac6bfe35b1ee08b3d42d330516a260d9cdb4a90bbb0491411a583029b92a59d20af3552372ea8fb3f59442b3945bf524ef284127f397ae7179467080be8e9b3
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\WIJeSO.dllFilesize
1.5MB
MD550741b3f2d7debf5d2bed63d88404029
SHA156210388a627b926162b36967045be06ffb1aad3
SHA256f2f8732ae464738372ff274b7e481366cecdd2337210d4a3cbcd089c958a730c
SHA512fac6bfe35b1ee08b3d42d330516a260d9cdb4a90bbb0491411a583029b92a59d20af3552372ea8fb3f59442b3945bf524ef284127f397ae7179467080be8e9b3
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\WIJeSO.dllFilesize
1.5MB
MD550741b3f2d7debf5d2bed63d88404029
SHA156210388a627b926162b36967045be06ffb1aad3
SHA256f2f8732ae464738372ff274b7e481366cecdd2337210d4a3cbcd089c958a730c
SHA512fac6bfe35b1ee08b3d42d330516a260d9cdb4a90bbb0491411a583029b92a59d20af3552372ea8fb3f59442b3945bf524ef284127f397ae7179467080be8e9b3
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\WIJeSO.dllFilesize
1.5MB
MD550741b3f2d7debf5d2bed63d88404029
SHA156210388a627b926162b36967045be06ffb1aad3
SHA256f2f8732ae464738372ff274b7e481366cecdd2337210d4a3cbcd089c958a730c
SHA512fac6bfe35b1ee08b3d42d330516a260d9cdb4a90bbb0491411a583029b92a59d20af3552372ea8fb3f59442b3945bf524ef284127f397ae7179467080be8e9b3
-
memory/188-142-0x0000000005A90000-0x0000000005B22000-memory.dmpFilesize
584KB
-
memory/188-144-0x0000000005F80000-0x0000000005FF6000-memory.dmpFilesize
472KB
-
memory/188-148-0x00000000070C0000-0x00000000070FE000-memory.dmpFilesize
248KB
-
memory/188-147-0x0000000007060000-0x0000000007072000-memory.dmpFilesize
72KB
-
memory/188-146-0x0000000005F40000-0x0000000005F5E000-memory.dmpFilesize
120KB
-
memory/188-145-0x00000000067D0000-0x0000000006CFC000-memory.dmpFilesize
5.2MB
-
memory/188-143-0x00000000060D0000-0x0000000006292000-memory.dmpFilesize
1.8MB
-
memory/188-141-0x0000000004D40000-0x0000000004DA6000-memory.dmpFilesize
408KB
-
memory/188-135-0x0000000000540000-0x00000000005E2000-memory.dmpFilesize
648KB
-
memory/188-140-0x00000000052E0000-0x00000000057DE000-memory.dmpFilesize
5.0MB
-
memory/188-139-0x00000000005DC29E-mapping.dmp
-
memory/752-126-0x0000000000000000-mapping.dmp
-
memory/984-118-0x0000000000000000-mapping.dmp
-
memory/1776-122-0x0000000000000000-mapping.dmp
-
memory/2084-116-0x0000000000000000-mapping.dmp
-
memory/2116-121-0x0000000000000000-mapping.dmp
-
memory/2700-128-0x0000000000000000-mapping.dmp
-
memory/2984-123-0x0000000000000000-mapping.dmp
-
memory/3308-130-0x0000000000000000-mapping.dmp
-
memory/3312-117-0x0000000000000000-mapping.dmp
-
memory/3948-120-0x0000000000000000-mapping.dmp
-
memory/3960-149-0x0000000000000000-mapping.dmp