Analysis

  • max time kernel
    119s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21-03-2024 20:52

General

  • Target

    dc9638797945d14e2c23faae542dea99.exe

  • Size

    4.9MB

  • MD5

    dc9638797945d14e2c23faae542dea99

  • SHA1

    17826b49f13863998448a5895ed70e207f388e75

  • SHA256

    2a89f870741672e607f4ca012d62232a0f01f3118ac9c7806350bbcb66aacb63

  • SHA512

    5b8cc115f04ffdc3c3715b8f2cbffa1e45b37ca9c79cf8a5781f971faa92ff27a15d22331de59633afae7970672431d272cee05bcca88cea518a07b4e5c1e555

  • SSDEEP

    98304:JYzevfLqT5D1UHNV8FfZodptWb7/uJop9QbULSeqSbFDTSQztRBGhnmCTKcZR9Cv:JZa5D9z6I/uJgRGXeFiwtRJCTKcZR8sG

Score
10/10

Malware Config

Extracted

Family

arkei

C2

95.181.157.6/3Wy90FKGCj.php

Signatures

  • Arkei

    Arkei is an infostealer written in C++.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dc9638797945d14e2c23faae542dea99.exe
    "C:\Users\Admin\AppData\Local\Temp\dc9638797945d14e2c23faae542dea99.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:2500

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2500-0-0x0000000000400000-0x0000000000BCE000-memory.dmp

    Filesize

    7.8MB

  • memory/2500-3-0x0000000000400000-0x0000000000BCE000-memory.dmp

    Filesize

    7.8MB

  • memory/2500-4-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2500-1-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2500-7-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2500-6-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2500-10-0x0000000077490000-0x0000000077491000-memory.dmp

    Filesize

    4KB

  • memory/2500-9-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2500-12-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2500-15-0x0000000000400000-0x0000000000BCE000-memory.dmp

    Filesize

    7.8MB