Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2023, 05:24
Static task
static1
Behavioral task
behavioral1
Sample
Arrau.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Arrau.exe
Resource
win10v2004-20230915-en
General
-
Target
Arrau.exe
-
Size
1.0MB
-
MD5
2e8676a03e932238cd66ae2b694616a4
-
SHA1
8d691b2ba0710ffe56aa7d92281126ec316e196a
-
SHA256
f3b42984e87c2a8ce917732513c7ff6ec06f0298331c4ad60f63f000a0d240a2
-
SHA512
78b3810abc503caafa649696118b131ccb544fb86d4dbd66775ed1d6942df02f82f6caf476ba0d46a995cc9730d301410b95a1183cc516662a011eaeb74e3177
-
SSDEEP
24576:9hbv27In4nug1bM6mfcIuBFo7WCBYR06Nu0wzw:X27I4ug9MjkIYo7FS0H8
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Loads dropped DLL 1 IoCs
pid Process 5048 Arrau.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 51 api.ipify.org 52 api.ipify.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2648 caspol.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 5048 Arrau.exe 2648 caspol.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5048 set thread context of 2648 5048 Arrau.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2648 caspol.exe 2648 caspol.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 5048 Arrau.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2648 caspol.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2648 caspol.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 5048 wrote to memory of 2648 5048 Arrau.exe 96 PID 5048 wrote to memory of 2648 5048 Arrau.exe 96 PID 5048 wrote to memory of 2648 5048 Arrau.exe 96 PID 5048 wrote to memory of 2648 5048 Arrau.exe 96 PID 5048 wrote to memory of 2648 5048 Arrau.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\Arrau.exe"C:\Users\Admin\AppData\Local\Temp\Arrau.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe"C:\Users\Admin\AppData\Local\Temp\Arrau.exe"2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD58cf2ac271d7679b1d68eefc1ae0c5618
SHA17cc1caaa747ee16dc894a600a4256f64fa65a9b8
SHA2566950991102462d84fdc0e3b0ae30c95af8c192f77ce3d78e8d54e6b22f7c09ba
SHA512ce828fb9ecd7655cc4c974f78f209d3326ba71ced60171a45a437fc3fff3bd0d69a0997adaca29265c7b5419bdea2b17f8cc8ceae1b8ce6b22b7ed9120bb5ad3