diff --git "a/2b81d58a3cd42c7163254616fcc4a394.html" "b/2b81d58a3cd42c7163254616fcc4a394.html" new file mode 100644--- /dev/null +++ "b/2b81d58a3cd42c7163254616fcc4a394.html" @@ -0,0 +1,8608 @@ + + + + + + +CAPE Sandbox + + + + + + + +
+ + + + + +
+ + +
+

Detection(s): + + Arkei + + Stealc + +

+
+ + + + + + + + + + + + + + + + + + + + + + +
CategoryStarted OnCompleted OnDurationCuckoo Version
FILE2025-09-22 13:35:212025-09-22 13:36:0039 seconds2.4-CAPE
+
+ + +
+ + + + + + + + + + + + + + + + + + + +
MachineLabelManagerStarted OnShutdown On
customcustomKVM2025-09-22 13:35:212025-09-22 13:35:59
+
+ + + +

Malware config(s)

+
+ + + + + + + + + + + + + + + + + + + +
TypeArkei Config
C2http://advanceddiplomaaviation.com/processings.php
Botnet IDDefault
+ + + + + + + + + + + + + + + + + + + + +
TypeStealc Config
C2http://advanceddiplomaaviation.com/processings.php
+ + + + + + + +
+ + + +
+
+

Signatures

+
+ + + +
+ + Queries computer hostname +
+ + + +
+ + Queries the computer locale (possible geofencing) +
+ + + +
+ + The PE file contains a PDB path +
+ + + +
+ + SetUnhandledExceptionFilter detected (possible anti-debug) +
+ + + +
+ + Checks system language via registry key (possible geofencing) +
+ + + +
+ + The binary likely contains encrypted or compressed data +
+ + + +
+ + Creates RWX memory +
+ + + +
+ + Yara detections observed in process dumps, payloads or dropped files +
+ + + +
+ + Anomalous binary characteristics +
+ + + +
+
+
+

Screenshots

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
+
+
+

Network Analysis

+
+ + Nothing to display. + +
+ +
+
+

Dropped Files

+
+ + + Nothing to display. + +
+ +
+
+

Payloads

+
+ + +
+ +

682889de57fdd1ac5c13b470bf0de4e87421ef4e3bb3831fa995026763ac1a6a

+ + +
+ +

db073014cc201844eab3b6e326b7c2d0012a1fe298deb3d6b446e8f9a09f25bd

+ + +
+ +

0ead8ceb42d6b863bb4b6d2e6974a64a35a3ed4e32cdfeab0613cd5fd5b76e27

+ + + +
+
+ + +
+

Behavior Summary

+
+
+ Mutexes + + Nothing to display. + +
+
+ Executed Commands + + Nothing to display. + +
+
+ Created Services + + Nothing to display. + +
+
+ Started Services + + Nothing to display. + +
+ + +
+

Processes

+
+ +

+ registry + filesystem + process + threading + services + device + network + synchronization + crypto + browser +

+ + +
+

ffd10221005211f090f3.exe + PID: 1656, Parent PID: 1768, Full Path: C:\Users\raciu\AppData\Local\Temp\ffd10221005211f090f3.exe + + , Command Line: "C:\Users\raciu\AppData\Local\Temp\ffd10221005211f090f3.exe" + + +

+ +
+ + + + +
+ Accessed Files + +
    + +
  • C:\Users\raciu\AppData\Local\Temp\msvcr100.dll
  • + +
  • C:\Windows\System32\msvcr100.dll
  • + +
  • C:\Windows\System\msvcr100.dll
  • + +
  • C:\Windows\msvcr100.dll
  • + +
  • C:\Windows\System32\wbem\msvcr100.dll
  • + +
  • C:\Windows\System32\WindowsPowerShell\v1.0\msvcr100.dll
  • + +
  • C:\Windows\System32\OpenSSH\msvcr100.dll
  • + +
  • C:\Users\raciu\AppData\Local\Programs\Python\Python310-32\Scripts\msvcr100.dll
  • + +
  • C:\Users\raciu\AppData\Local\Programs\Python\Python310-32\msvcr100.dll
  • + +
+ +
+
+ Read Files + + Nothing to display. + +
+
+ Modified Files + + Nothing to display. + +
+
+ Deleted Files + + Nothing to display. + +
+
+ Registry Keys + +
    + +
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Nls\CustomLocale
  • + +
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\CustomLocale\en-US
  • + +
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Nls\ExtendedLocale
  • + +
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\ExtendedLocale\en-US
  • + +
+ +
+
+ Read Registry Keys + +
    + +
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\CustomLocale\en-US
  • + +
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\ExtendedLocale\en-US
  • + +
+ +
+
+ Modified Registry Keys + + Nothing to display. + +
+
+ Deleted Registry Keys + + Nothing to display. + +
+
+ Resolved APIs + + Nothing to display. + +
+ +
+ + + + + +
+ + + \ No newline at end of file