diff --git "a/dc688fc16a044493edc4f685aff549d6.html" "b/dc688fc16a044493edc4f685aff549d6.html" new file mode 100644--- /dev/null +++ "b/dc688fc16a044493edc4f685aff549d6.html" @@ -0,0 +1,8692 @@ + + + + + + +CAPE Sandbox + + + + + + + +
+ + + + + +
+ + +
+

Detection(s): + + Stealc + + Arkei + +

+
+ + + + + + + + + + + + + + + + + + + + + + +
CategoryStarted OnCompleted OnDurationCuckoo Version
FILE2025-09-12 10:17:042025-09-12 10:17:4339 seconds2.4-CAPE
+
+ + +
+ + + + + + + + + + + + + + + + + + + +
MachineLabelManagerStarted OnShutdown On
customcustomKVM2025-09-12 10:17:042025-09-12 10:17:43
+
+ + + +

Malware config(s)

+
+ + + + + + + + + + + + + + + + + + + +
TypeArkei Config
C2http://file-file-host4.com/tratata.php
Botnet IDDefault
+ + + + + + + + + + + + + + + + + + + + +
TypeStealc Config
C2http://file-file-host4.com/tratata.php
+ + + + + + + +
+ + + +
+
+

Signatures

+
+ + + +
+ + Queries computer hostname +
+ + + +
+ + Queries the computer locale (possible geofencing) +
+ + + +
+ + The PE file contains a PDB path +
+ + + +
+ + SetUnhandledExceptionFilter detected (possible anti-debug) +
+ + + +
+ + Checks system language via registry key (possible geofencing) +
+ + + +
+ + The binary likely contains encrypted or compressed data +
+ + + +
+ + Creates RWX memory +
+ + + +
+ + Yara detections observed in process dumps, payloads or dropped files +
+ + + +
+ + Anomalous binary characteristics +
+ + + +
+
+
+

Screenshots

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
+
+
+

Network Analysis

+
+ + Nothing to display. + +
+ +
+
+

Dropped Files

+
+ + + Nothing to display. + +
+ +
+
+

Payloads

+
+ + +
+ +

deca9b0a8db323fc178abe82a383f6fa7a8819f2988adc749985cfa4b6c6129b

+ + +
+ +

300edf8f4e600f875404dabe8fdff9587b269aa010ecc07ecb4c6bc978730814

+ + +
+ +

f545b244da994adfaa4431ec8f8d5f92d834357278c2757a2bc4855fb5604496

+ + + +
+
+ + +
+

Behavior Summary

+
+
+ Mutexes + + Nothing to display. + +
+
+ Executed Commands + + Nothing to display. + +
+
+ Created Services + + Nothing to display. + +
+
+ Started Services + + Nothing to display. + +
+ + +
+

Processes

+
+ +

+ registry + filesystem + process + threading + services + device + network + synchronization + crypto + browser +

+ + +
+

55a2ca622ba64868fdc9.exe + PID: 2516, Parent PID: 1768, Full Path: C:\Users\raciu\AppData\Local\Temp\55a2ca622ba64868fdc9.exe + + , Command Line: "C:\Users\raciu\AppData\Local\Temp\55a2ca622ba64868fdc9.exe" + + +

+ +
+ + + + +
+ Accessed Files + +
    + +
  • C:\Users\raciu\AppData\Local\Temp\msvcr100.dll
  • + +
  • C:\Windows\System32\msvcr100.dll
  • + +
  • C:\Windows\System\msvcr100.dll
  • + +
  • C:\Windows\msvcr100.dll
  • + +
  • C:\Windows\System32\wbem\msvcr100.dll
  • + +
  • C:\Windows\System32\WindowsPowerShell\v1.0\msvcr100.dll
  • + +
  • C:\Windows\System32\OpenSSH\msvcr100.dll
  • + +
  • C:\Users\raciu\AppData\Local\Programs\Python\Python310-32\Scripts\msvcr100.dll
  • + +
  • C:\Users\raciu\AppData\Local\Programs\Python\Python310-32\msvcr100.dll
  • + +
+ +
+
+ Read Files + + Nothing to display. + +
+
+ Modified Files + + Nothing to display. + +
+
+ Deleted Files + + Nothing to display. + +
+
+ Registry Keys + +
    + +
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Nls\CustomLocale
  • + +
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\CustomLocale\en-US
  • + +
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Nls\ExtendedLocale
  • + +
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\ExtendedLocale\en-US
  • + +
+ +
+
+ Read Registry Keys + +
    + +
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\CustomLocale\en-US
  • + +
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\ExtendedLocale\en-US
  • + +
+ +
+
+ Modified Registry Keys + + Nothing to display. + +
+
+ Deleted Registry Keys + + Nothing to display. + +
+
+ Resolved APIs + + Nothing to display. + +
+ +
+ + + + + +
+ + + \ No newline at end of file