Analysis

  • max time kernel
    142s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-11-2023 19:30

General

  • Target

    1704-14-0x0000000000400000-0x000000000043D000-memory.exe

  • Size

    244KB

  • MD5

    f91104d14df581873fcf6f303e53feeb

  • SHA1

    55f079e88518220c15c41e4dd88348ce24928285

  • SHA256

    def6c030f46e8d7a9988942b704e41882da8584ef6456ec8358a9e8334f0a7f9

  • SHA512

    448c5438136b85b4fcb39ace49a1eb94e8d46f3f355941ad4e002373c3c26d04ad0476e4cf47b747f2770934809407fc7fd6c02ce11afb6f483ea2fbc2701c91

  • SSDEEP

    3072:Um/E8k9ZjpIL+zNch12KbAwSaSgJSp87b8EG:N/E8k91zz6/tR8EG

Score
10/10

Malware Config

Signatures

  • Arkei

    Arkei is an infostealer written in C++.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1704-14-0x0000000000400000-0x000000000043D000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\1704-14-0x0000000000400000-0x000000000043D000-memory.exe"
    1⤵
      PID:4968
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:4332
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1068

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.jfm

        Filesize

        16KB

        MD5

        33b2ba134395de308b182166b9f64b77

        SHA1

        936beaf6ebca4389bbbee2aa061703cc0c086b03

        SHA256

        f8693905daa402c88f88ec9c8c241aff783735166c511199fd91f3bda124cc80

        SHA512

        c4f880b2616ff2541b53f021d180a7d0bd517deec196035850fba9275498f28db9f53dff920c5ec4a4ce6dcfb9d13a6e8a44d2ff497de0a30612f303be81fa5a

      • memory/1068-42-0x000001F8ACA90000-0x000001F8ACA91000-memory.dmp

        Filesize

        4KB

      • memory/1068-69-0x000001F8AC910000-0x000001F8AC911000-memory.dmp

        Filesize

        4KB

      • memory/1068-41-0x000001F8ACA90000-0x000001F8ACA91000-memory.dmp

        Filesize

        4KB

      • memory/1068-34-0x000001F8ACA90000-0x000001F8ACA91000-memory.dmp

        Filesize

        4KB

      • memory/1068-35-0x000001F8ACA90000-0x000001F8ACA91000-memory.dmp

        Filesize

        4KB

      • memory/1068-36-0x000001F8ACA90000-0x000001F8ACA91000-memory.dmp

        Filesize

        4KB

      • memory/1068-37-0x000001F8ACA90000-0x000001F8ACA91000-memory.dmp

        Filesize

        4KB

      • memory/1068-38-0x000001F8ACA90000-0x000001F8ACA91000-memory.dmp

        Filesize

        4KB

      • memory/1068-39-0x000001F8ACA90000-0x000001F8ACA91000-memory.dmp

        Filesize

        4KB

      • memory/1068-43-0x000001F8ACA90000-0x000001F8ACA91000-memory.dmp

        Filesize

        4KB

      • memory/1068-33-0x000001F8ACA70000-0x000001F8ACA71000-memory.dmp

        Filesize

        4KB

      • memory/1068-17-0x000001F8A4480000-0x000001F8A4490000-memory.dmp

        Filesize

        64KB

      • memory/1068-40-0x000001F8ACA90000-0x000001F8ACA91000-memory.dmp

        Filesize

        4KB

      • memory/1068-44-0x000001F8AC6C0000-0x000001F8AC6C1000-memory.dmp

        Filesize

        4KB

      • memory/1068-45-0x000001F8AC6B0000-0x000001F8AC6B1000-memory.dmp

        Filesize

        4KB

      • memory/1068-47-0x000001F8AC6C0000-0x000001F8AC6C1000-memory.dmp

        Filesize

        4KB

      • memory/1068-50-0x000001F8AC6B0000-0x000001F8AC6B1000-memory.dmp

        Filesize

        4KB

      • memory/1068-53-0x000001F8AC5F0000-0x000001F8AC5F1000-memory.dmp

        Filesize

        4KB

      • memory/1068-1-0x000001F8A4380000-0x000001F8A4390000-memory.dmp

        Filesize

        64KB

      • memory/1068-65-0x000001F8AC7F0000-0x000001F8AC7F1000-memory.dmp

        Filesize

        4KB

      • memory/1068-67-0x000001F8AC800000-0x000001F8AC801000-memory.dmp

        Filesize

        4KB

      • memory/1068-68-0x000001F8AC800000-0x000001F8AC801000-memory.dmp

        Filesize

        4KB

      • memory/4968-0-0x0000000000400000-0x000000000043D000-memory.dmp

        Filesize

        244KB