Analysis

  • max time kernel
    142s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-09-2023 02:31

General

  • Target

    fa4a6f5d8a6d50893f37a8dc5b33cf78.exe

  • Size

    244KB

  • MD5

    fa4a6f5d8a6d50893f37a8dc5b33cf78

  • SHA1

    01d3a6b05db6ab86b1d2725efa320a54ad0db2d9

  • SHA256

    09ae018ad25a48649ee3824aaa4251b388adc0c5f36c2355e28202adc737d353

  • SHA512

    479b4d927c21993a623b6fbaf0c044a0563d70a9d7e588086e7a9c4e0bb07d806b39fc77058f9e505230700f71258f2b62361015b7e2e1e6441131985e7ea158

  • SSDEEP

    1536:UYz/E8hW9NdYAygNlvhIoOl9SAKD7PNch1ZmmImh1ADN8blGe5SagvHLNaV8KJ3t:Um/E8k9ZjpIL+zNch12KbAwSaSCJSp8

Score
10/10

Malware Config

Signatures

  • Arkei

    Arkei is an infostealer written in C++.

  • Drops file in System32 directory 1 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p
    1⤵
    • Drops file in System32 directory
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:3416
  • C:\Users\Admin\AppData\Local\Temp\fa4a6f5d8a6d50893f37a8dc5b33cf78.exe
    "C:\Users\Admin\AppData\Local\Temp\fa4a6f5d8a6d50893f37a8dc5b33cf78.exe"
    1⤵
      PID:2080
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 216
        2⤵
        • Program crash
        PID:3372
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2080 -ip 2080
      1⤵
        PID:1608

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2080-0-0x0000000000400000-0x000000000043D000-memory.dmp

        Filesize

        244KB