Detection(s): Arkei Stealc

Category Started On Completed On Duration Cuckoo Version
FILE 2025-09-18 16:37:42 2025-09-18 16:38:20 38 seconds 2.4-CAPE
Machine Label Manager Started On Shutdown On
custom custom KVM 2025-09-18 16:37:42 2025-09-18 16:38:19

Malware config(s)

Type Arkei Config
C2 http://91.243.44.57/MkCRAPb2Xz.php
Botnet ID Default
Type Stealc Config
C2 http://91.243.44.57/MkCRAPb2Xz.php

Signatures

Queries computer hostname
Queries the computer locale (possible geofencing)
The PE file contains a PDB path
SetUnhandledExceptionFilter detected (possible anti-debug)
Possible date expiration check, exits too soon after checking local time
Checks system language via registry key (possible geofencing)
The binary likely contains encrypted or compressed data
Creates RWX memory
Yara detections observed in process dumps, payloads or dropped files
Anomalous binary characteristics

Screenshots

Network Analysis

Nothing to display.

Dropped Files

Nothing to display.

Payloads

60c96a76812ad08fd7c376b4d1f883177da734418b19f7ec96c989dd960bfe23

509f63dda19b04abe0549412cc7567bb5ccf3d1a77caf239bbf6e2a52c8e9d3b

e3693f8716d73b41ea41bbe96b0948975d1b7fea24e4268340bd4e683c395eb9

Behavior Summary

Mutexes Nothing to display.
Executed Commands Nothing to display.
Created Services Nothing to display.
Started Services Nothing to display.

Processes

registry filesystem process threading services device network synchronization crypto browser

af0013c21b9dbe3c1a7f.exe PID: 1316, Parent PID: 1768, Full Path: C:\Users\raciu\AppData\Local\Temp\af0013c21b9dbe3c1a7f.exe , Command Line: "C:\Users\raciu\AppData\Local\Temp\af0013c21b9dbe3c1a7f.exe"

Accessed Files
  • C:\Users\raciu\AppData\Local\Temp\msvcr100.dll
  • C:\Windows\System32\msvcr100.dll
  • C:\Windows\System\msvcr100.dll
  • C:\Windows\msvcr100.dll
  • C:\Windows\System32\wbem\msvcr100.dll
  • C:\Windows\System32\WindowsPowerShell\v1.0\msvcr100.dll
  • C:\Windows\System32\OpenSSH\msvcr100.dll
  • C:\Users\raciu\AppData\Local\Programs\Python\Python310-32\Scripts\msvcr100.dll
  • C:\Users\raciu\AppData\Local\Programs\Python\Python310-32\msvcr100.dll
Read Files Nothing to display.
Modified Files Nothing to display.
Deleted Files Nothing to display.
Registry Keys
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Nls\CustomLocale
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\CustomLocale\en-US
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Nls\ExtendedLocale
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\ExtendedLocale\en-US
Read Registry Keys
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\CustomLocale\en-US
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\ExtendedLocale\en-US
Modified Registry Keys Nothing to display.
Deleted Registry Keys Nothing to display.
Resolved APIs Nothing to display.