Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    74s
  • max time network
    291s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16/09/2022, 10:32

General

  • Target

    c4122524776c195199816a4e57635c7d32f15aa2e9080feb32ae0c2b05446a23.exe

  • Size

    1.3MB

  • MD5

    e87958faafc944de105df5d77166543f

  • SHA1

    a6624993a89299038e5cda27b48f77313d02dfd5

  • SHA256

    c4122524776c195199816a4e57635c7d32f15aa2e9080feb32ae0c2b05446a23

  • SHA512

    56b886f4e9dcf9629242b07e46c6619d7f7ed716c9738438c4973f1c951ff5da0be51babb7d6b49f7f1555a4810c3974d9fd6a3d591992d91b9f78f32413836f

  • SSDEEP

    24576:+yIOTaHGeTylZra0y3uZIy+o87vbvLBq97N/3KjLOTR8:N3aHGeu7Py+Bf87TvLA97JsD

Malware Config

Signatures

  • Detects Arechclient2 RAT 1 IoCs

    Arechclient2.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops startup file 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Kills process with taskkill 1 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:8
      • C:\Users\Admin\AppData\Local\Temp\c4122524776c195199816a4e57635c7d32f15aa2e9080feb32ae0c2b05446a23.exe
        "C:\Users\Admin\AppData\Local\Temp\c4122524776c195199816a4e57635c7d32f15aa2e9080feb32ae0c2b05446a23.exe"
        2⤵
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2416
        • C:\Windows\SysWOW64\robocopy.exe
          robocopy 8927387376487263745672673846276374982938486273568279384982384972834
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4008
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c cmd < Fold.xltm & ping -n 5 localhost
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3408
          • C:\Windows\SysWOW64\cmd.exe
            cmd
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4932
            • C:\Windows\SysWOW64\tasklist.exe
              tasklist /FI "imagename eq AvastUI.exe"
              5⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:1348
            • C:\Windows\SysWOW64\find.exe
              find /I /N "avastui.exe"
              5⤵
                PID:1128
              • C:\Windows\SysWOW64\tasklist.exe
                tasklist /FI "imagename eq AVGUI.exe"
                5⤵
                • Enumerates processes with tasklist
                • Suspicious use of AdjustPrivilegeToken
                PID:4016
              • C:\Windows\SysWOW64\find.exe
                find /I /N "avgui.exe"
                5⤵
                  PID:4088
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /V /R "^fnEMjhsMHNjDK$" Moments.xltm
                  5⤵
                    PID:3600
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Secure.exe.pif
                    Secure.exe.pif v
                    5⤵
                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of WriteProcessMemory
                    PID:4100
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
                      6⤵
                      • UAC bypass
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:536
                      • C:\Windows\SysWOW64\taskkill.exe
                        "taskkill.exe" /im chrome.exe /f
                        7⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4292
                  • C:\Windows\SysWOW64\PING.EXE
                    ping localhost -n 5
                    5⤵
                    • Runs ping.exe
                    PID:4544
                • C:\Windows\SysWOW64\PING.EXE
                  ping -n 5 localhost
                  4⤵
                  • Runs ping.exe
                  PID:928
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VOURxLBXVe.url" & echo URL="C:\Users\Admin\AppData\Local\Temp\CXKBMOwtux\xjofqU.vbs" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VOURxLBXVe.url"
              2⤵
              • Drops startup file
              PID:1156

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Fold.xltm

            Filesize

            11KB

            MD5

            90d8f5e3ac6018518f62e956d2880e7b

            SHA1

            0c990d51199f360b1b92b2ecf59e2fcbf271370d

            SHA256

            2d94baac5ea323a4c8e5b85086b3d633bc0665cf519b9125e54d21f23bdca29a

            SHA512

            6cec14f3814fe2663fdac8018c96e751f7e3dcb0352e675965a5ea608f50f48674cc271875ae1ac3a4bf7a29dbdab7447afc7c9f8dc718869b7f2f0a21678593

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Moments.xltm

            Filesize

            924KB

            MD5

            fdeac3f6ababd1a476ea5439e32c1644

            SHA1

            567d87f642781f6928652cd7a84e08b490a3d8ba

            SHA256

            9c1c55b4be77c21d1d1cf7976c4db12f7cb7da9651da5acb8fdaebdc2496d824

            SHA512

            5098d26edef958b6e5428dcd83240096012449534a9cf7d35d4cf90beb1770ec729744045c10cf245dc3ea18186790032d879a899399193ddaf009b956f5539a

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Secure.exe.pif

            Filesize

            924KB

            MD5

            6987e4cd3f256462f422326a7ef115b9

            SHA1

            71672a495b4603ecfec40a65254cb3ba8766bbe0

            SHA256

            3e26723394ade92f8163b5643960189cb07358b0f96529a477d37176d68aa0a0

            SHA512

            4b1d7f7ffee39a2d65504767beeddd4c3374807a93889b14e7e73db11e478492dec349aedca03ce828f21a66bb666a68d3735443f4249556e10825a4cd7dfeb4

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Secure.exe.pif

            Filesize

            924KB

            MD5

            6987e4cd3f256462f422326a7ef115b9

            SHA1

            71672a495b4603ecfec40a65254cb3ba8766bbe0

            SHA256

            3e26723394ade92f8163b5643960189cb07358b0f96529a477d37176d68aa0a0

            SHA512

            4b1d7f7ffee39a2d65504767beeddd4c3374807a93889b14e7e73db11e478492dec349aedca03ce828f21a66bb666a68d3735443f4249556e10825a4cd7dfeb4

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Zambia.xltm

            Filesize

            1.6MB

            MD5

            4cc5098b13c4399f6ff959497462f327

            SHA1

            676d5607891bad100eda09913e239b0b0a0024b8

            SHA256

            621e7010c0c2e6b361cb3c2e8cce4c514c91f2fe62e211e1f0992f796bef114f

            SHA512

            614ca78a7aaecc9bb823e644a9f581b9ee95a27023c117ad07d7479bcc7782295146ad4309fddfb159e72181b95dfb325a3162b75a12d181c9f7539e00fe3b20

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\VmUgoYUDbSmYh.dll

            Filesize

            1.5MB

            MD5

            50741b3f2d7debf5d2bed63d88404029

            SHA1

            56210388a627b926162b36967045be06ffb1aad3

            SHA256

            f2f8732ae464738372ff274b7e481366cecdd2337210d4a3cbcd089c958a730c

            SHA512

            fac6bfe35b1ee08b3d42d330516a260d9cdb4a90bbb0491411a583029b92a59d20af3552372ea8fb3f59442b3945bf524ef284127f397ae7179467080be8e9b3

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\VmUgoYUDbSmYh.dll

            Filesize

            1.5MB

            MD5

            50741b3f2d7debf5d2bed63d88404029

            SHA1

            56210388a627b926162b36967045be06ffb1aad3

            SHA256

            f2f8732ae464738372ff274b7e481366cecdd2337210d4a3cbcd089c958a730c

            SHA512

            fac6bfe35b1ee08b3d42d330516a260d9cdb4a90bbb0491411a583029b92a59d20af3552372ea8fb3f59442b3945bf524ef284127f397ae7179467080be8e9b3

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\VmUgoYUDbSmYh.dll

            Filesize

            1.5MB

            MD5

            50741b3f2d7debf5d2bed63d88404029

            SHA1

            56210388a627b926162b36967045be06ffb1aad3

            SHA256

            f2f8732ae464738372ff274b7e481366cecdd2337210d4a3cbcd089c958a730c

            SHA512

            fac6bfe35b1ee08b3d42d330516a260d9cdb4a90bbb0491411a583029b92a59d20af3552372ea8fb3f59442b3945bf524ef284127f397ae7179467080be8e9b3

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\VmUgoYUDbSmYh.dll

            Filesize

            1.5MB

            MD5

            50741b3f2d7debf5d2bed63d88404029

            SHA1

            56210388a627b926162b36967045be06ffb1aad3

            SHA256

            f2f8732ae464738372ff274b7e481366cecdd2337210d4a3cbcd089c958a730c

            SHA512

            fac6bfe35b1ee08b3d42d330516a260d9cdb4a90bbb0491411a583029b92a59d20af3552372ea8fb3f59442b3945bf524ef284127f397ae7179467080be8e9b3

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\VmUgoYUDbSmYh.dll

            Filesize

            1.5MB

            MD5

            50741b3f2d7debf5d2bed63d88404029

            SHA1

            56210388a627b926162b36967045be06ffb1aad3

            SHA256

            f2f8732ae464738372ff274b7e481366cecdd2337210d4a3cbcd089c958a730c

            SHA512

            fac6bfe35b1ee08b3d42d330516a260d9cdb4a90bbb0491411a583029b92a59d20af3552372ea8fb3f59442b3945bf524ef284127f397ae7179467080be8e9b3

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\VmUgoYUDbSmYh.dll

            Filesize

            1.5MB

            MD5

            50741b3f2d7debf5d2bed63d88404029

            SHA1

            56210388a627b926162b36967045be06ffb1aad3

            SHA256

            f2f8732ae464738372ff274b7e481366cecdd2337210d4a3cbcd089c958a730c

            SHA512

            fac6bfe35b1ee08b3d42d330516a260d9cdb4a90bbb0491411a583029b92a59d20af3552372ea8fb3f59442b3945bf524ef284127f397ae7179467080be8e9b3

          • memory/536-511-0x0000000005FF0000-0x0000000006066000-memory.dmp

            Filesize

            472KB

          • memory/536-512-0x00000000065A0000-0x0000000006ACC000-memory.dmp

            Filesize

            5.2MB

          • memory/536-480-0x0000000000700000-0x00000000007A6000-memory.dmp

            Filesize

            664KB

          • memory/536-484-0x00000000051D0000-0x00000000056CE000-memory.dmp

            Filesize

            5.0MB

          • memory/536-498-0x0000000004CD0000-0x0000000004D62000-memory.dmp

            Filesize

            584KB

          • memory/536-500-0x0000000004C30000-0x0000000004C96000-memory.dmp

            Filesize

            408KB

          • memory/536-510-0x0000000005E20000-0x0000000005FE2000-memory.dmp

            Filesize

            1.8MB

          • memory/536-581-0x0000000006F20000-0x0000000006F70000-memory.dmp

            Filesize

            320KB

          • memory/536-537-0x0000000007670000-0x00000000076AE000-memory.dmp

            Filesize

            248KB

          • memory/536-515-0x0000000005E00000-0x0000000005E1E000-memory.dmp

            Filesize

            120KB

          • memory/536-536-0x0000000007610000-0x0000000007622000-memory.dmp

            Filesize

            72KB

          • memory/2416-145-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-137-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-149-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-150-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-151-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-153-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-154-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-152-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-155-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-156-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-157-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-158-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-159-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-160-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-161-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-162-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-163-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-164-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-165-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-166-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-121-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-122-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-123-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-125-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-124-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-126-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-127-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-128-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-129-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-130-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-131-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-132-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-133-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-134-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-135-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-136-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-148-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-138-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-139-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-147-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-141-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-146-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-120-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-142-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-144-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-143-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/2416-140-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/4008-180-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/4008-183-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/4008-168-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/4008-169-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/4008-184-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/4008-179-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/4008-182-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/4008-178-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/4008-181-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/4008-170-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/4008-171-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/4008-173-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/4008-176-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/4008-175-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/4008-174-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/4008-177-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB

          • memory/4008-172-0x00000000774F0000-0x000000007767E000-memory.dmp

            Filesize

            1.6MB