Analysis

  • max time kernel
    4265058s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    15-01-2022 06:50

General

  • Target

    df17f6f93bf7a187f675f7246a862dac1eef92b6ecfb4d3c99aea573f3492f23.exe

  • Size

    322KB

  • MD5

    f21c3cdf44c7c0f5c380dcd447a26f09

  • SHA1

    b1c0dd60ced6f57fb81e8bcee096aa6d20a6455e

  • SHA256

    df17f6f93bf7a187f675f7246a862dac1eef92b6ecfb4d3c99aea573f3492f23

  • SHA512

    66cf4e6eb78c58e7c8336ae162c66de40a9b6dbdfecd06d8b8f684ef4e39007c1b6cac71729c6e27d19c4eb5e65fb5a5a884c672cc6d3e4ee748a289e5abd76e

Score
10/10

Malware Config

Extracted

Family

arkei

Botnet

Default

C2

http://file-file-host4.com/tratata.php

Signatures

  • Arkei

    Arkei is an infostealer written in C++.

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Arkei Stealer Payload 2 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df17f6f93bf7a187f675f7246a862dac1eef92b6ecfb4d3c99aea573f3492f23.exe
    "C:\Users\Admin\AppData\Local\Temp\df17f6f93bf7a187f675f7246a862dac1eef92b6ecfb4d3c99aea573f3492f23.exe"
    1⤵
      PID:1728
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 552
        2⤵
        • Program crash
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2384
    • C:\Windows\system32\MusNotification.exe
      C:\Windows\system32\MusNotification.exe
      1⤵
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:1996
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1728 -ip 1728
      1⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Suspicious use of WriteProcessMemory
      PID:3632

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1728-130-0x000000000084E000-0x000000000085F000-memory.dmp

      Filesize

      68KB

    • memory/1728-132-0x0000000000400000-0x0000000000560000-memory.dmp

      Filesize

      1.4MB

    • memory/1728-131-0x0000000000700000-0x000000000071C000-memory.dmp

      Filesize

      112KB