| File name: | 4363463463464363463463463.exe |
| Full analysis: | https://app.any.run/tasks/31afca0e-72d3-42a3-ae38-ecce406e9c58 |
| Verdict: | Malicious activity |
| Threats: | Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files. |
| Analysis date: | February 13, 2024, 18:37:10 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows |
| MD5: | 2A94F3960C58C6E70826495F76D00B85 |
| SHA1: | E2A1A5641295F5EBF01A37AC1C170AC0814BB71A |
| SHA256: | 2FCAD226B17131DA4274E1B9F8F31359BDD325C9568665F08FD1F6C5D06A23CE |
| SSDEEP: | 192:2we8sGKE6MqyG7c20L7BIW12n/ePSmzkTInu8stYcFwVc03KY:9e8sGKfMqyGg20PKn/cRaInuptYcFwVY |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (82.9) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (7.4) |
| .exe | | | Win32 Executable (generic) (5.1) |
| .exe | | | Generic Win/DOS Executable (2.2) |
| .exe | | | DOS Executable Generic (2.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2023:12:22 08:29:10+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32 |
| LinkerVersion: | 80 |
| CodeSize: | 5632 |
| InitializedDataSize: | 4608 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x3552 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows command line |
| FileVersionNumber: | 0.0.0.0 |
| ProductVersionNumber: | 0.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| FileDescription: | |
| FileVersion: | 0.0.0.0 |
| InternalName: | 4363463463464363463463463.exe |
| LegalCopyright: | |
| OriginalFileName: | 4363463463464363463463463.exe |
| ProductVersion: | 0.0.0.0 |
| AssemblyVersion: | 0.0.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 568 | ping -n 5 localhost | C:\Windows\System32\PING.EXE | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: TCP/IP Ping Command Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 696 | "C:\Users\admin\Desktop\Files\NeonRank.exe" | C:\Users\admin\Desktop\Files\NeonRank.exe | 4363463463464363463463463.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 908 | C:\Users\admin\AppData\Local\TypeId\renxwnji\AttributeString.exe | C:\Users\admin\AppData\Local\TypeId\renxwnji\AttributeString.exe | — | taskeng.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 920 | "C:\Program Files\Windows Media Player\wmlaunch.exe" | C:\Program Files\Windows Media Player\wmlaunch.exe | — | dialer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Media Player Launcher Exit code: 0 Version: 12.0.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1168 | "C:\Users\admin\Desktop\Files\%E5%88%9D%E5%A6%86%E5%8A%A9%E6%89%8B.exe" | C:\Users\admin\Desktop\Files\%E5%88%9D%E5%A6%86%E5%8A%A9%E6%89%8B.exe | 4363463463464363463463463.exe | ||||||||||||
User: admin Company: 初妆助手 Integrity Level: HIGH Description: 初妆助手 Setup Exit code: 0 Version: Modules
| |||||||||||||||
| 1236 | findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe" | C:\Windows\System32\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Find String (QGREP) Utility Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1336 | tasklist | C:\Windows\System32\tasklist.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Lists the current running tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1340 | "C:\Users\admin\Desktop\Files\setup_wm.exe" | C:\Users\admin\Desktop\Files\setup_wm.exe | 4363463463464363463463463.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft Windows Media Configuration Utility Exit code: 0 Version: 12.0.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1496 | C:\Users\admin\Desktop\Files\asdfg.exe | C:\Users\admin\Desktop\Files\asdfg.exe | asdfg.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 3221225477 Version: 1.0.0.0 Modules
| |||||||||||||||
| 1556 | cmd /c copy /b Compound + Injection + Emotions + Worm + Participants + Richmond 4096\Taxes.pif | C:\Windows\System32\cmd.exe | cmd.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| (PID) Process: | (2852) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (2852) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (2852) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (2852) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
| (PID) Process: | (2852) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (2852) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
| (PID) Process: | (2852) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASMANCS |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (2852) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASMANCS |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (2852) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASMANCS |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (2852) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASMANCS |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2692 | asdfg.exe | C:\Users\admin\AppData\Local\Temp\BBLb.exe | executable | |
MD5:71EB1BC6E6DA380C1CB552D78B391B2A | SHA256:CEFA92EE6CC2FAD86C49DD37D57FF8AFCB9B9ABEF0A110689E6D771394256BD6 | |||
| 696 | NeonRank.exe | C:\Users\admin\AppData\Local\Temp\7ZipSfx.000\Emotions | binary | |
MD5:4DD712F3AC47D2632B1FA470891858C9 | SHA256:025BDBD4ACD0829141281AD412F7BA59E21D253C19FDECE25304A7EACA592BA8 | |||
| 2852 | 4363463463464363463463463.exe | C:\Users\admin\Desktop\Files\baseline.exe | executable | |
MD5:ED144CAEBBC81B2914858FA9A59388FB | SHA256:0034D86B2E202EEE69EF00B3551753F133278BD26E0EE0F486F0CC7E3DC61032 | |||
| 696 | NeonRank.exe | C:\Users\admin\AppData\Local\Temp\7ZipSfx.000\Declare | text | |
MD5:2894B437EB1F14BB3DC2D0995DC8238E | SHA256:5B151A88F51C5AFD71E1437D61D0B5E4E8354B60570EC7EB57FF115314AC00AD | |||
| 696 | NeonRank.exe | C:\Users\admin\AppData\Local\Temp\7ZipSfx.000\Assured | text | |
MD5:D1D04D0889C995208BFD51027D6BBFB2 | SHA256:FEB509566E97E0B401FA0C358410C4E30A2CA737E97AB53BA85AA8B7233039E2 | |||
| 696 | NeonRank.exe | C:\Users\admin\AppData\Local\Temp\7ZipSfx.000\Injection | binary | |
MD5:41677AA1D64845FBD17C72F7FF1837DD | SHA256:AFBEBEC2C0199E3C01EC1D4174BC25DFAC1FBDF453450E1C4ACFEF292BC18BFE | |||
| 696 | NeonRank.exe | C:\Users\admin\AppData\Local\Temp\7ZipSfx.000\Bathrooms | text | |
MD5:1730EAEBB468F5EB2EB028FEBF54AE06 | SHA256:6BB1EB00577143D94353505D3FAA833A6E11A1B1E7A89665374546B6C4224D18 | |||
| 696 | NeonRank.exe | C:\Users\admin\AppData\Local\Temp\7ZipSfx.000\Richmond | binary | |
MD5:7CEF207172CBDF6768101F8A2602F787 | SHA256:6C3482C9F62DA91208F4F67FE2A41211F8A2A7929BFDA4841495D20D29BF1E9C | |||
| 696 | NeonRank.exe | C:\Users\admin\AppData\Local\Temp\7ZipSfx.000\Participants | binary | |
MD5:96C01CB0CAF4A239B2CDAC79372C249B | SHA256:1BD9E4921D3E304CBBDBE7E169C090F023940C3901C3F30076AA805AAE46A6F9 | |||
| 2372 | cmd.exe | C:\Users\admin\AppData\Local\Temp\7ZipSfx.000\Bathrooms.bat | text | |
MD5:1730EAEBB468F5EB2EB028FEBF54AE06 | SHA256:6BB1EB00577143D94353505D3FAA833A6E11A1B1E7A89665374546B6C4224D18 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2852 | 4363463463464363463463463.exe | GET | 200 | 193.117.208.148:80 | http://193.117.208.148/baseline.exe | unknown | executable | 72.0 Kb | unknown |
2852 | 4363463463464363463463463.exe | GET | 200 | 91.215.85.223:80 | http://lastimaners.ug/asdfg.exe | unknown | executable | 2.13 Mb | unknown |
2852 | 4363463463464363463463463.exe | GET | 200 | 185.172.128.32:80 | http://185.172.128.32/ama.exe | unknown | executable | 1.38 Mb | unknown |
3140 | 6dAEd.exe | POST | 200 | 91.215.85.223:80 | http://parals.ac.ug/index.php | unknown | text | 4 b | unknown |
2852 | 4363463463464363463463463.exe | GET | 200 | 104.192.108.17:80 | http://softdl.360tpcdn.com/inst77player/inst77player_1.0.0.1.exe | unknown | executable | 281 Kb | unknown |
4072 | build.exe | GET | 200 | 192.124.249.23:80 | http://ocsp.godaddy.com//MEQwQjBAMD4wPDAJBgUrDgMCGgUABBTkIInKBAzXkF0Qh0pel3lfHJ9GPAQU0sSw0pHUTBFxs2HLPaH%2B3ahq1OMCAxvnFQ%3D%3D | unknown | binary | 1.98 Kb | unknown |
4072 | build.exe | GET | 200 | 192.124.249.23:80 | http://ocsp.godaddy.com//MEIwQDA%2BMDwwOjAJBgUrDgMCGgUABBQdI2%2BOBkuXH93foRUj4a7lAr4rGwQUOpqFBxBnKLbv9r0FQW4gwZTaD94CAQc%3D | unknown | binary | 2.01 Kb | unknown |
4072 | build.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D | unknown | binary | 1.47 Kb | unknown |
4072 | build.exe | GET | 308 | 116.202.2.1:80 | http://116.202.2.1/1827 | unknown | — | — | unknown |
2852 | 4363463463464363463463463.exe | GET | 200 | 91.215.85.223:80 | http://partadino.ac.ug/native.exe | unknown | executable | 2.13 Mb | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2852 | 4363463463464363463463463.exe | 151.101.2.49:443 | urlhaus.abuse.ch | FASTLY | US | unknown |
2852 | 4363463463464363463463463.exe | 193.117.208.148:80 | — | Virtual1 Limited | GB | unknown |
2852 | 4363463463464363463463463.exe | 91.215.85.223:80 | lastimaners.ug | — | RU | unknown |
2328 | baseline.exe | 193.117.208.148:7800 | — | Virtual1 Limited | GB | unknown |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
2852 | 4363463463464363463463463.exe | 140.82.121.4:443 | github.com | GITHUB | US | unknown |
2852 | 4363463463464363463463463.exe | 185.199.111.133:443 | raw.githubusercontent.com | FASTLY | US | unknown |
2852 | 4363463463464363463463463.exe | 185.172.128.32:80 | — | OOO Nadym Svyaz Service | RU | malicious |
Domain | IP | Reputation |
|---|---|---|
urlhaus.abuse.ch |
| whitelisted |
lastimaners.ug |
| unknown |
github.com |
| shared |
raw.githubusercontent.com |
| shared |
JDkGqaSrgKXZ.JDkGqaSrgKXZ |
| unknown |
pastratas.ac.ug |
| unknown |
parals.ac.ug |
| unknown |
softdl.360tpcdn.com |
| unknown |
u.yinyuehome.com |
| unknown |
nickshort.ug |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
2852 | 4363463463464363463463463.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
2852 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
2852 | 4363463463464363463463463.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2852 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
2852 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |
2852 | 4363463463464363463463463.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
2852 | 4363463463464363463463463.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2852 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
2852 | 4363463463464363463463463.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
2852 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
Process | Message |
|---|---|
4363463463464363463463463.exe | Unable to connect to the remote server
|
4363463463464363463463463.exe | Unable to connect to the remote server
|
4363463463464363463463463.exe | The request was aborted: Could not create SSL/TLS secure channel.
|
4363463463464363463463463.exe | Unable to connect to the remote server
|
4363463463464363463463463.exe | Unable to connect to the remote server
|