Threat name:
Arcane, SheetRat, Xmrig
Alert
Classification:
evad.troj.adwa.spyw.mine
.NET source code contains a sample name check
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Contains functionality to inject threads in other processes
Creates a thread in another existing process (thread injection)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Drops executables to the windows directory (C:\Windows) and starts them
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found strings related to Crypto-Mining
Injects code into the Windows Explorer (explorer.exe)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the windows firewall
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Mutes Antivirus updates and installments via hosts file black listing
Queries memory information (via WMI often done to detect virtual machines)
Queries pointing device information (via WMI, Win32_PointingDevice, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive printer information (via WMI, Win32_Printer, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive sound device information (via WMI, Win32_SoundDevice, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Reads the Security eventlog
Reads the System eventlog
Sample uses string decryption to hide its real strings
Sigma detected: Capture Wi-Fi password
Sigma detected: Execution from Suspicious Folder
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal WLAN passwords
Tries to steal communication platform credentials (via file / registry access)
Tries to steal Mail credentials (via file / registry access)
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Arcane Stealer
Yara detected Powershell decode and execute
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1703346
Sample:
SecuriteInfo.com.PossibleTh...
Startdate:
01/06/2025
Architecture:
WINDOWS
Score:
100
134
z8hd74jqpxt19zq.hopto.org
2->134
136
xqpw71fnqtwe81v.hopto.org
2->136
138
22 other IPs or domains
2->138
174
Suricata IDS alerts
for network traffic
2->174
176
Found malware configuration
2->176
178
Malicious sample detected
(through community Yara
rule)
2->178
180
22 other signatures
2->180
12
SecuriteInfo.com.PossibleThreat.31868.23078.exe
2
2->12
started
15
svunkost.exe
2->15
started
18
SystemDiagnosticsHost.exe
2->18
started
20
9 other processes
2->20
signatures3
process4
file5
120
SecuriteInfo.com.P...31868.23078.exe.log, CSV
12->120
dropped
22
cmd.exe
1
12->22
started
220
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
15->220
222
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
15->222
224
Queries sensitive Plug
and Play Device Information
(via WMI, Win32_PnPEntity,
often done to detect
virtual machines)
15->224
226
Multi AV Scanner detection
for dropped file
18->226
228
Reads the Security eventlog
18->228
230
Reads the System eventlog
18->230
232
Tries to steal communication
platform credentials
(via file / registry
access)
20->232
234
Queries memory information
(via WMI often done
to detect virtual machines)
20->234
signatures6
process7
signatures8
182
Uses schtasks.exe or
at.exe to add and modify
task schedules
22->182
184
Uses netsh to modify
the Windows network
and firewall settings
22->184
186
Tries to harvest and
steal WLAN passwords
22->186
25
powershell.exe
18
42
22->25
started
30
conhost.exe
22->30
started
process9
dnsIp10
148
silentclickteam.co
104.21.20.15, 443, 49749, 49750
CLOUDFLARENETUS
United States
25->148
150
0avxwqpqjtwkq21.hopto.org
25->150
108
C:\Users\user\AppData\Local\...\nmk0gofb.exe, PE32
25->108
dropped
110
C:\Users\user\AppData\Local\...\k5cnfvo2.exe, PE32
25->110
dropped
112
C:\Users\user\AppData\Local\...\3ddkrnyk.exe, PE32
25->112
dropped
114
C:\Users\user\AppData\Local\...\31laffos.exe, PE32
25->114
dropped
192
Disables Windows Defender
(deletes autostart)
25->192
194
Disable Windows Defender
real time protection
(registry)
25->194
196
Queries memory information
(via WMI often done
to detect virtual machines)
25->196
198
2 other signatures
25->198
32
31laffos.exe
14
21
25->32
started
37
3ddkrnyk.exe
1
9
25->37
started
39
nmk0gofb.exe
25->39
started
41
3 other processes
25->41
file11
signatures12
process13
dnsIp14
122
icanhazip.com
104.16.184.241, 49751, 80
CLOUDFLARENETUS
United States
32->122
94
C:\Users\user\AppData\Local\Temp\xaitx.exe, PE32+
32->94
dropped
96
C:\Users\user\AppData\...\31laffos.exe.log, ASCII
32->96
dropped
152
Queries sensitive sound
device information (via
WMI, Win32_SoundDevice,
often done to detect
virtual machines)
32->152
154
Queries sensitive printer
information (via WMI,
Win32_Printer, often
done to detect virtual
machines)
32->154
156
Queries sensitive physical
memory information (via
WMI, Win32_PhysicalMemory,
often done to detect
virtual machines)
32->156
172
9 other signatures
32->172
43
xaitx.exe
32->43
started
47
cmd.exe
32->47
started
58
4 other processes
32->58
98
C:\Windows\...\SystemDiagnosticsHost.exe, PE32
37->98
dropped
100
C:\Windows\Media\msldriver.dll, PE32+
37->100
dropped
102
C:\Windows\Media\mppr.exe, PE32
37->102
dropped
106
3 other malicious files
37->106
dropped
158
Modifies the windows
firewall
37->158
160
Queries memory information
(via WMI often done
to detect virtual machines)
37->160
49
mppr.exe
37->49
started
52
cmd.exe
37->52
started
60
7 other processes
37->60
104
C:\Users\user\AppData\Local\...\svunkost.exe, PE32
39->104
dropped
162
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
39->162
164
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
39->164
166
Queries sensitive Plug
and Play Device Information
(via WMI, Win32_PnPEntity,
often done to detect
virtual machines)
39->166
168
Drops large PE files
39->168
54
svunkost.exe
39->54
started
62
2 other processes
39->62
170
Tries to steal communication
platform credentials
(via file / registry
access)
41->170
56
svunkost.exe
41->56
started
file15
signatures16
process17
dnsIp18
116
C:\Users\user\AppData\...\chrome_decrypt.dll, PE32+
43->116
dropped
200
Contains functionality
to inject threads in
other processes
43->200
202
Allocates memory in
foreign processes
43->202
204
Creates a thread in
another existing process
(thread injection)
43->204
64
chrome.exe
43->64
started
67
conhost.exe
43->67
started
206
Tries to harvest and
steal WLAN passwords
47->206
76
4 other processes
47->76
126
tyqwpnfqht82qlo.hopto.org
49->126
128
pristolmag32dds.hopto.org
185.100.157.232, 443, 49766, 49771
M247GB
Poland
49->128
132
2 other IPs or domains
49->132
118
C:\Windows\System32\drivers\etc\hosts, ASCII
49->118
dropped
208
Mutes Antivirus updates
and installments via
hosts file black listing
49->208
210
Injects code into the
Windows Explorer (explorer.exe)
49->210
212
Writes to foreign memory
regions
49->212
218
2 other signatures
49->218
69
explorer.exe
49->69
injected
71
schtasks.exe
52->71
started
74
conhost.exe
52->74
started
130
85.192.29.88, 49769, 54631, 54661
LINEGROUP-ASRU
Russian Federation
54->130
214
Tries to steal communication
platform credentials
(via file / registry
access)
54->214
216
Loading BitLocker PowerShell
Module
58->216
78
8 other processes
58->78
80
12 other processes
60->80
82
3 other processes
62->82
file19
signatures20
process21
dnsIp22
124
192.168.11.20, 137, 138, 1900
unknown
unknown
64->124
84
chrome.exe
64->84
started
87
chrome.exe
64->87
started
89
msedge.exe
69->89
started
188
Queries memory information
(via WMI often done
to detect virtual machines)
71->188
92
msedge.exe
78->92
started
signatures23
process24
dnsIp25
140
mqlw8tj29dlqt91.hopto.org
84->140
142
7nvweq9tqyweo91.hopto.org
84->142
146
8 other IPs or domains
84->146
144
239.255.255.250, 1900
unknown
Reserved
89->144
190
Maps a DLL or memory
area into another process
89->190
signatures26
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.