| File name: | v.sct |
| Full analysis: | https://app.any.run/tasks/970888c7-1b3f-4d6f-8c19-548cadcff6cf |
| Verdict: | Malicious activity |
| Threats: | Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files. |
| Analysis date: | October 01, 2018, 10:38:09 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | text/xml |
| File info: | XML document, ASCII text |
| MD5: | 84791BD6597C88A2D682012ADD8EACC3 |
| SHA1: | 51FAC40F5EA444D84478A67BBB99712F31025335 |
| SHA256: | 21E2856A78B7902585A1E312DDB46105D30CD847756D9A5F4FA0C1BC51CB4580 |
| SSDEEP: | 12:RlKudPRCOhUeqsMSUYr0pVuRI/CXG4HkRnUEeGnGHpcnE0RV4X4pk:/PQxeXMZAUuRIKXfERnUr8ZRV48k |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 276 | C:\Users\admin\AppData\Roaming\dhelper.exe | C:\Users\admin\AppData\Roaming\dhelper.exe | — | cmd.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 840 | cmd /C taskkill /f /im dhelper.exe & start C:\Users\admin\AppData\Roaming\dhelper.exe | C:\Windows\system32\cmd.exe | — | ns8DA4.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 920 | "C:\Windows\system32\cmd.exe" /c net stop Windowscurryus | C:\Windows\system32\cmd.exe | — | king.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 2 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1352 | "C:\Windows\System32\regsvr32.exe" /s /n /u /i:"C:\Users\admin\AppData\Local\Temp\v.sct" scrobj.dll | C:\Windows\System32\regsvr32.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft(C) Register Server Exit code: 5 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1716 | "C:\Windows\system32\cmd.exe" /c net stop MpsSvcc | C:\Windows\system32\cmd.exe | — | king.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 2 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1736 | "C:\Windows\system32\cmd.exe" /c taskkill /f /im LSMOSE* & tskill LSMOSE* | C:\Windows\system32\cmd.exe | — | king.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1772 | tskill LSMOSE* | C:\Windows\system32\tskill.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Remote Desktop Services End Process Utility Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1960 | tskill cab* | C:\Windows\system32\tskill.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Remote Desktop Services End Process Utility Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2084 | net stop Windowscurryus | C:\Windows\system32\net.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2212 | cmd /C copy /b %temp%\Javatemp\ini.jwd C:\Users\admin\AppData\Roaming\cppredistx86.exe | C:\Windows\system32\cmd.exe | — | ns8BDD.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| (PID) Process: | (3184) powershell.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3184) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (3184) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (3184) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: 4294901760 | |||
| (PID) Process: | (3184) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: 4294901760 | |||
| (PID) Process: | (3184) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (3184) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
| (PID) Process: | (3184) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (3184) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (3184) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS |
| Operation: | write | Name: | FileTracingMask |
Value: 4294901760 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3184 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\DAV9KRKSAD0D93ULXXHS.temp | — | |
MD5:— | SHA256:— | |||
| 2232 | java.exe | C:\Users\admin\AppData\Local\Temp\Javatemp\ini.jwd | — | |
MD5:— | SHA256:— | |||
| 3184 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF5b62b6.TMP | binary | |
MD5:— | SHA256:— | |||
| 3184 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:— | SHA256:— | |||
| 3948 | jar2.exe | C:\Users\admin\AppData\Local\Temp\nsa8BDC.tmp\ns8BDD.tmp | — | |
MD5:— | SHA256:— | |||
| 2932 | DOC001.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.lnk | lnk | |
MD5:— | SHA256:— | |||
| 2932 | DOC001.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0UU90R59\java[1].dat | executable | |
MD5:— | SHA256:— | |||
| 3948 | jar2.exe | C:\Users\admin\AppData\Local\Temp\nsa8BDC.tmp\ns8DA4.tmp | — | |
MD5:— | SHA256:— | |||
| 3948 | jar2.exe | C:\Users\admin\AppData\Local\Temp\nsa8BDB.tmp | — | |
MD5:— | SHA256:— | |||
| 2232 | java.exe | C:\Users\admin\AppData\Local\Temp\Javatemp\jare.7z1 | executable | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3184 | powershell.exe | GET | 200 | 195.208.1.107:80 | http://kr1s.ru/king.dat | RU | executable | 45.0 Kb | suspicious |
2932 | DOC001.exe | GET | 200 | 89.111.178.201:80 | http://zcop.ru/java12.dat | RU | executable | 200 Kb | suspicious |
2264 | king.exe | GET | 200 | 195.208.1.107:80 | http://kr1s.ru/doc.dat | RU | executable | 1009 Kb | suspicious |
2264 | king.exe | GET | 200 | 88.99.66.31:80 | http://iplogger.co/1h9PN6.html | DE | image | 116 b | shared |
2932 | DOC001.exe | GET | 200 | 195.208.1.107:80 | http://kr1s.ru/java.dat | RU | executable | 2.04 Mb | suspicious |
3708 | java12.exe | POST | — | 184.168.221.40:80 | http://ioad.pw/ioad.exe | US | — | — | malicious |
3708 | java12.exe | POST | 301 | 88.99.66.31:80 | http://2no.co/1ajz97 | DE | html | 178 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2264 | king.exe | 195.208.1.107:80 | kr1s.ru | Autonomous Non-commercial Organization Regional Network Information Center | RU | suspicious |
2264 | king.exe | 88.99.66.31:80 | iplogger.co | Hetzner Online GmbH | DE | malicious |
3184 | powershell.exe | 195.208.1.107:80 | kr1s.ru | Autonomous Non-commercial Organization Regional Network Information Center | RU | suspicious |
3708 | java12.exe | 88.99.66.31:80 | iplogger.co | Hetzner Online GmbH | DE | malicious |
2932 | DOC001.exe | 89.111.178.201:80 | zcop.ru | CJSC Registrar R01 | RU | suspicious |
2932 | DOC001.exe | 195.208.1.107:80 | kr1s.ru | Autonomous Non-commercial Organization Regional Network Information Center | RU | suspicious |
3708 | java12.exe | 88.99.66.31:443 | iplogger.co | Hetzner Online GmbH | DE | malicious |
3708 | java12.exe | 184.168.221.40:80 | ioad.pw | GoDaddy.com, LLC | US | malicious |
Domain | IP | Reputation |
|---|---|---|
kr1s.ru |
| suspicious |
iplogger.co |
| shared |
zcop.ru |
| suspicious |
2no.co |
| whitelisted |
ioad.pw |
| malicious |
cb1d30efad.pw |
| malicious |
a8833d0dc1.pw |
| unknown |
3662450a7e.pw |
| unknown |
df27340eb6.pw |
| unknown |
31f16792e8.pw |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
3184 | powershell.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
3184 | powershell.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
2264 | king.exe | A Network Trojan was detected | ET POLICY User-Agent (NSIS_Inetc (Mozilla)) - Sometimes used by hostile installers |
2264 | king.exe | Misc activity | SUSPICIOUS [PTsecurity] Suspicious HTTP header - Sometimes used by hostile installer |
2264 | king.exe | A Network Trojan was detected | ET POLICY User-Agent (NSIS_Inetc (Mozilla)) - Sometimes used by hostile installers |
2264 | king.exe | Misc activity | SUSPICIOUS [PTsecurity] Suspicious HTTP header - Sometimes used by hostile installer |
2264 | king.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2932 | DOC001.exe | A Network Trojan was detected | ET POLICY User-Agent (NSIS_Inetc (Mozilla)) - Sometimes used by hostile installers |
2932 | DOC001.exe | Misc activity | SUSPICIOUS [PTsecurity] Suspicious HTTP header - Sometimes used by hostile installer |
2932 | DOC001.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |