Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2023 04:28

General

  • Target

    6425d2a508b8a9399fa2e99f536e4dba.exe

  • Size

    3.6MB

  • MD5

    6425d2a508b8a9399fa2e99f536e4dba

  • SHA1

    53749733ccd6a49cd6951bb9e4d0a676eeb72b11

  • SHA256

    0a8d06e600d240b442089a927590cc564a921884e130cc2d0d962be7463cec4e

  • SHA512

    ff4ada7de78ca947b4bd60965748b0a141b756477c1d3c74c52a154d3a10edee268e0c75159a929a16cbd2440d36f5bcf16a4382a39fc9f010dd32b495b4de31

  • SSDEEP

    49152:gLL9wqXFZAuJbEdSqXcZAuJbEdZ/FluraLxTsEStIxvoLZ:gLyQ3ISz3IZbur8kt

Score
10/10

Malware Config

Extracted

Family

arkei

Botnet

Default

C2

185.87.49.30/flat.php

Signatures

  • Arkei

    Arkei is an infostealer written in C++.

  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6425d2a508b8a9399fa2e99f536e4dba.exe
    "C:\Users\Admin\AppData\Local\Temp\6425d2a508b8a9399fa2e99f536e4dba.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Users\Admin\AppData\Local\Temp\6425d2a508b8a9399fa2e99f536e4dba.exe
      "C:\Users\Admin\AppData\Local\Temp\6425d2a508b8a9399fa2e99f536e4dba.exe"
      2⤵
        PID:2736
      • C:\Users\Admin\AppData\Local\Temp\6425d2a508b8a9399fa2e99f536e4dba.exe
        "C:\Users\Admin\AppData\Local\Temp\6425d2a508b8a9399fa2e99f536e4dba.exe"
        2⤵
          PID:2888
        • C:\Users\Admin\AppData\Local\Temp\6425d2a508b8a9399fa2e99f536e4dba.exe
          "C:\Users\Admin\AppData\Local\Temp\6425d2a508b8a9399fa2e99f536e4dba.exe"
          2⤵
            PID:2884

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2116-0-0x00000000746C0000-0x0000000074DAE000-memory.dmp

          Filesize

          6.9MB

        • memory/2116-1-0x0000000000870000-0x0000000000C02000-memory.dmp

          Filesize

          3.6MB

        • memory/2116-2-0x0000000005030000-0x0000000005070000-memory.dmp

          Filesize

          256KB

        • memory/2116-3-0x0000000005030000-0x0000000005070000-memory.dmp

          Filesize

          256KB

        • memory/2116-4-0x0000000004640000-0x000000000465E000-memory.dmp

          Filesize

          120KB

        • memory/2116-35-0x0000000005030000-0x0000000005070000-memory.dmp

          Filesize

          256KB

        • memory/2116-18-0x0000000002420000-0x0000000002428000-memory.dmp

          Filesize

          32KB

        • memory/2116-34-0x00000000746C0000-0x0000000074DAE000-memory.dmp

          Filesize

          6.9MB

        • memory/2736-17-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2736-15-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2736-13-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/2736-11-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2736-9-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2736-7-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2736-19-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2736-5-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2888-28-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/2888-33-0x0000000000401000-0x0000000000413000-memory.dmp

          Filesize

          72KB