Analysis
-
max time kernel
1799s -
max time network
1806s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
18-07-2023 10:52
Behavioral task
behavioral1
Sample
ClientH.exe
Resource
win7-20230712-en
windows7-x64
15 signatures
1800 seconds
Behavioral task
behavioral2
Sample
ClientH.exe
Resource
win10v2004-20230703-en
windows10-2004-x64
15 signatures
1800 seconds
General
-
Target
ClientH.exe
-
Size
90KB
-
MD5
5ac5cf4a09a5c6dfd82669a0e24f675d
-
SHA1
4f0993bfd2245da594000bb7c2d2bd7d02b60d53
-
SHA256
6136b0b9b28b52962f090cdf34ac650c4b184f3a65e863e2051cdc1219aff051
-
SHA512
e0317cf9a5a495f5e90a88f4a96517626a30c016b7374db41bc79a8bcb0920fcf7691ca3cf48c712b8bc2db075d734ca7cacc771e8f604297600187afe314d3f
-
SSDEEP
1536:dbRiQMB57SK3bUzZdQ1iIMvnZlbLxjV3AGq5gWlocT1wzySsd9NJ33a:dbRO57SKsstcnZTJQDgWPaySsdH5K
Score
10/10
Malware Config
Extracted
Family
arrowrat
Botnet
VenomHVNC
C2
wasted9sss1-57562.portmap.host:57562
Mutex
uSzDNutNI.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, C:\\Users\\Admin\\AppData\\Roaming\\LbJIPffl\\LbJIPffl" ClientH.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1924 set thread context of 2652 1924 ClientH.exe 29 -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Runs .reg file with regedit 1 IoCs
pid Process 2028 regedit.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3016 vlc.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1924 ClientH.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3016 vlc.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeDebugPrivilege 1924 ClientH.exe Token: SeShutdownPrivilege 1080 explorer.exe Token: SeShutdownPrivilege 1080 explorer.exe Token: SeShutdownPrivilege 1080 explorer.exe Token: SeShutdownPrivilege 1080 explorer.exe Token: SeShutdownPrivilege 1080 explorer.exe Token: SeShutdownPrivilege 1080 explorer.exe Token: SeShutdownPrivilege 1080 explorer.exe Token: SeShutdownPrivilege 1080 explorer.exe Token: SeShutdownPrivilege 1080 explorer.exe Token: SeShutdownPrivilege 1080 explorer.exe Token: SeShutdownPrivilege 1080 explorer.exe Token: SeShutdownPrivilege 1080 explorer.exe Token: SeShutdownPrivilege 1080 explorer.exe Token: SeShutdownPrivilege 1080 explorer.exe Token: SeShutdownPrivilege 1080 explorer.exe Token: SeShutdownPrivilege 1080 explorer.exe Token: SeShutdownPrivilege 1080 explorer.exe Token: SeShutdownPrivilege 1080 explorer.exe Token: SeShutdownPrivilege 1080 explorer.exe -
Suspicious use of FindShellTrayWindow 39 IoCs
pid Process 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 3016 vlc.exe 3016 vlc.exe 3016 vlc.exe 3016 vlc.exe 3016 vlc.exe 3016 vlc.exe 3016 vlc.exe 3016 vlc.exe 3016 vlc.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe -
Suspicious use of SendNotifyMessage 28 IoCs
pid Process 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe 3016 vlc.exe 3016 vlc.exe 3016 vlc.exe 3016 vlc.exe 3016 vlc.exe 3016 vlc.exe 3016 vlc.exe 3016 vlc.exe 1080 explorer.exe 1080 explorer.exe 1080 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3016 vlc.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1924 wrote to memory of 1080 1924 ClientH.exe 28 PID 1924 wrote to memory of 1080 1924 ClientH.exe 28 PID 1924 wrote to memory of 1080 1924 ClientH.exe 28 PID 1924 wrote to memory of 1080 1924 ClientH.exe 28 PID 1924 wrote to memory of 2652 1924 ClientH.exe 29 PID 1924 wrote to memory of 2652 1924 ClientH.exe 29 PID 1924 wrote to memory of 2652 1924 ClientH.exe 29 PID 1924 wrote to memory of 2652 1924 ClientH.exe 29 PID 1924 wrote to memory of 2652 1924 ClientH.exe 29 PID 1924 wrote to memory of 2652 1924 ClientH.exe 29 PID 1924 wrote to memory of 2652 1924 ClientH.exe 29 PID 1924 wrote to memory of 2652 1924 ClientH.exe 29 PID 1924 wrote to memory of 2652 1924 ClientH.exe 29 PID 1080 wrote to memory of 2932 1080 explorer.exe 31 PID 1080 wrote to memory of 2932 1080 explorer.exe 31 PID 1080 wrote to memory of 2932 1080 explorer.exe 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ClientH.exe"C:\Users\Admin\AppData\Local\Temp\ClientH.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\system32\ctfmon.exectfmon.exe3⤵PID:2932
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" VenomHVNC wasted9sss1-57562.portmap.host 57562 uSzDNutNI.exe2⤵PID:2652
-
-
C:\Windows\regedit.exe"regedit.exe" "C:\Users\Admin\Desktop\DenyRestart.reg"1⤵
- Runs .reg file with regedit
PID:2028
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\TraceMount.aiff"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3016