Analysis

  • max time kernel
    160s
  • max time network
    170s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-05-2022 20:03

General

  • Target

    MarsSamples/70afcf1b0507e851f3a9ac434129fce707de39ebb8e09a956d2d41e065d409f4.exe

  • Size

    159KB

  • MD5

    1111df3ee04b98521fd3f4144db25bf7

  • SHA1

    52b9f3f7c063b62d365839362916f65401e18987

  • SHA256

    70afcf1b0507e851f3a9ac434129fce707de39ebb8e09a956d2d41e065d409f4

  • SHA512

    57d8171f15f8684ebcf67bab645bb8c6a6098c554f1f10a9ed4cbd329507d49ac8b8a1c156697eb3c8e0a647629463dec2b9563050d875a14fb7d0575a960d58

Score
10/10

Malware Config

Extracted

Family

arkei

Botnet

Default

Signatures

  • Arkei

    Arkei is an infostealer written in C++.

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MarsSamples\70afcf1b0507e851f3a9ac434129fce707de39ebb8e09a956d2d41e065d409f4.exe
    "C:\Users\Admin\AppData\Local\Temp\MarsSamples\70afcf1b0507e851f3a9ac434129fce707de39ebb8e09a956d2d41e065d409f4.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:684
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 684 -s 908
      2⤵
      • Program crash
      PID:572

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/684-54-0x00000000753B1000-0x00000000753B3000-memory.dmp

    Filesize

    8KB

  • memory/684-56-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB