Analysis

  • max time kernel
    144s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-10-2024 08:12

General

  • Target

    ARBINFOBOT.scr

  • Size

    2.7MB

  • MD5

    cf7ed26ab265ec92a94327b5db086c50

  • SHA1

    0b3ddada345a9855d702d166c5ffd6550ad55a09

  • SHA256

    976fd87b32905a84e2de2f2de3ed53999dba3c1451645e9137a57fa92e2582af

  • SHA512

    dbf23647193145df52941b2cf4814b113ba38732caf7b90b65b9febea56ea68c7496677c1b21e54ae77f4ee35115b7b614b4f843d49e4e2f405fdcf504933c05

  • SSDEEP

    49152:bXz+zBRt59hTkRjttbC2auuHx5oHXpnNj0uWRSS1kJUBCqI:bXz+NRN6tquuHn4XFNouoSS12UQl

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 43 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Control Panel 3 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ARBINFOBOT.scr
    "C:\Users\Admin\AppData\Local\Temp\ARBINFOBOT.scr" /S
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:776
    • C:\Program Files (x86)\Èíôîðìàöèîííûå Ðåøåíèÿ\Ñïðàâî÷íàÿ èíôîðìàöèÿ!\svchost.exe
      "C:\Program Files (x86)\Èíôîðìàöèîííûå Ðåøåíèÿ\Ñïðàâî÷íàÿ èíôîðìàöèÿ!\svchost.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2424
      • C:\Program Files (x86)\Èíôîðìàöèîííûå Ðåøåíèÿ\Ñïðàâî÷íàÿ èíôîðìàöèÿ!\svchost.exe
        "C:\Program Files (x86)\Èíôîðìàöèîííûå Ðåøåíèÿ\Ñïðàâî÷íàÿ èíôîðìàöèÿ!\svchost.exe"
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        • Sets desktop wallpaper using registry
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies Control Panel
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:3680
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c mmm.bat
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4900
    • C:\Program Files (x86)\Èíôîðìàöèîííûå Ðåøåíèÿ\Ñïðàâî÷íàÿ èíôîðìàöèÿ!\UPDATE.exe
      "C:\Program Files (x86)\Èíôîðìàöèîííûå Ðåøåíèÿ\Ñïðàâî÷íàÿ èíôîðìàöèÿ!\UPDATE.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1808
      • C:\Program Files (x86)\Èíôîðìàöèîííûå Ðåøåíèÿ\Ñïðàâî÷íàÿ èíôîðìàöèÿ!\UPDATE.exe
        "C:\Program Files (x86)\Èíôîðìàöèîííûå Ðåøåíèÿ\Ñïðàâî÷íàÿ èíôîðìàöèÿ!\UPDATE.exe"
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Èíôîðìàöèîííûå Ðåøåíèÿ\Ñïðàâî÷íàÿ èíôîðìàöèÿ!\UPDATE.exe

    Filesize

    2.9MB

    MD5

    749812a4fad05c39d16c4c26528905da

    SHA1

    b6139178549afccd0861c2130c16137a72855a19

    SHA256

    1c205f065a7e2b74c573a4d87dbf31ae3125a25bdeb704f249477c46b6480635

    SHA512

    10de9b25a9ed34cebe99da1967cfccb7ce7c229f0e99968924ca8ee5e69a4c26829237fad9e3e4f5f02d62546b137f42281ff50aaf9e29dc70975c34225a06e0

  • C:\Program Files (x86)\Èíôîðìàöèîííûå Ðåøåíèÿ\Ñïðàâî÷íàÿ èíôîðìàöèÿ!\mmm.bat

    Filesize

    17B

    MD5

    bf55292f19b02c6dd1934f2ea2c6ae9d

    SHA1

    0dc0e99b63b557bd0eef88422a98bdd944bc0d86

    SHA256

    0a233cde4c8f447e9de44205506e62fee592a625f9c4e1ee1394a5de9712902e

    SHA512

    e570ce99327527cd3d63256eac3763ba88e33ff4110bbcbeddce0860e88b45afb8180ef82a01669a6e5205a28353a9fce95a1cd9906da10670f9a7c9d947c500

  • C:\Program Files (x86)\Èíôîðìàöèîííûå Ðåøåíèÿ\Ñïðàâî÷íàÿ èíôîðìàöèÿ!\svchost.exe

    Filesize

    3.6MB

    MD5

    833d7a44854f4dc805a801699cab2ceb

    SHA1

    8c79119b3a272c724e56e105a47966c1f36ad2f1

    SHA256

    e0938a38290966a19ab178adea743538f9e3e3530f5d2618afcc6a402a91c6d6

    SHA512

    58b6258447487de6ba48c1d2f2d45ba9aab8a52028202a86aa8d31af2184a1e98969ace0b2b35d8c49180a6205786f6eddbd6bf39676889283e300ea0f0383ab

  • C:\Program Files (x86)\Èíôîðìàöèîííûå Ðåøåíèÿ\Ñïðàâî÷íàÿ èíôîðìàöèÿ!\ufr_reports\NO_PWDS_report_20-10-2024_08-12-55-6B5B38CC3E6639642E59985BD6DA8BD8-PCEJ.bin

    Filesize

    1KB

    MD5

    c9f1ed52623b4a2db03c9c329bc9f83d

    SHA1

    9f07bf8ab8802ab53e34fbf7aba0d9a03e23a2a7

    SHA256

    6accf680e8528d96747df671f570ef14999004509e1ed08b436f38a19c4644ff

    SHA512

    65dd637b24b47de2340cb670370fc34b22278cf290a324dc259864dda33557f24b509f64b582de39fef15030d25c10750b3db56814aa3c22dfc456df34501e6d

  • memory/776-36-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/1808-38-0x0000000000400000-0x000000000077C000-memory.dmp

    Filesize

    3.5MB

  • memory/1808-73-0x0000000000400000-0x000000000077C000-memory.dmp

    Filesize

    3.5MB

  • memory/2424-30-0x0000000000400000-0x000000000082D000-memory.dmp

    Filesize

    4.2MB

  • memory/2424-845-0x0000000000400000-0x000000000082D000-memory.dmp

    Filesize

    4.2MB

  • memory/3216-61-0x0000000003450000-0x0000000003654000-memory.dmp

    Filesize

    2.0MB

  • memory/3216-55-0x0000000003450000-0x0000000003654000-memory.dmp

    Filesize

    2.0MB

  • memory/3216-58-0x0000000000400000-0x000000000077C000-memory.dmp

    Filesize

    3.5MB

  • memory/3216-51-0x0000000003450000-0x0000000003654000-memory.dmp

    Filesize

    2.0MB

  • memory/3216-59-0x0000000000400000-0x000000000077C000-memory.dmp

    Filesize

    3.5MB

  • memory/3216-60-0x0000000000400000-0x000000000077C000-memory.dmp

    Filesize

    3.5MB

  • memory/3216-43-0x0000000000400000-0x000000000077C000-memory.dmp

    Filesize

    3.5MB

  • memory/3216-72-0x0000000003450000-0x0000000003654000-memory.dmp

    Filesize

    2.0MB

  • memory/3680-77-0x0000000000400000-0x000000000082D000-memory.dmp

    Filesize

    4.2MB

  • memory/3680-49-0x0000000003200000-0x0000000003404000-memory.dmp

    Filesize

    2.0MB

  • memory/3680-76-0x0000000000400000-0x000000000082D000-memory.dmp

    Filesize

    4.2MB

  • memory/3680-75-0x0000000000400000-0x000000000082D000-memory.dmp

    Filesize

    4.2MB

  • memory/3680-78-0x0000000003200000-0x0000000003404000-memory.dmp

    Filesize

    2.0MB

  • memory/3680-79-0x0000000003200000-0x0000000003404000-memory.dmp

    Filesize

    2.0MB

  • memory/3680-45-0x0000000003200000-0x0000000003404000-memory.dmp

    Filesize

    2.0MB

  • memory/3680-844-0x0000000003200000-0x0000000003404000-memory.dmp

    Filesize

    2.0MB

  • memory/3680-44-0x0000000000400000-0x000000000082D000-memory.dmp

    Filesize

    4.2MB