Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2022 10:54
Static task
static1
Behavioral task
behavioral1
Sample
pierwsze zamówienie nr 0015022012.exe
Resource
win7-20220812-en
windows7-x64
4 signatures
150 seconds
General
-
Target
pierwsze zamówienie nr 0015022012.exe
-
Size
1.6MB
-
MD5
71a6ab33f31b690fae0cc294301eb53f
-
SHA1
eb5263efbc05bd7fd135086b4ee635e49119854a
-
SHA256
87df770774093167df16025aa4c0a745091671d48f1113212211f4a3d79afa7a
-
SHA512
5c0b7aed2a51607d977dfe1b4b7883c602fb9624180a0c61f49654d794a420ba5e4fc023ab6726d2e5317f6c67e642a388abd3cb4838f4c4ddd834082986c281
-
SSDEEP
49152:f9fyrAY4xJKdHcr3f2JggQRZDMrTNRe0MGwOwtD:fRzJ88LKgrRo1dwnD
Malware Config
Extracted
Family
darkcloud
C2
https://api.telegram.org/bot5671318275:AAGisFrFLqhVJjO72egJPifm2Q0ITZ6Nziw/sendMessage?chat_id=553496422
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3028 set thread context of 3212 3028 pierwsze zamówienie nr 0015022012.exe 78 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3212 Caspol.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3028 wrote to memory of 3212 3028 pierwsze zamówienie nr 0015022012.exe 78 PID 3028 wrote to memory of 3212 3028 pierwsze zamówienie nr 0015022012.exe 78 PID 3028 wrote to memory of 3212 3028 pierwsze zamówienie nr 0015022012.exe 78 PID 3028 wrote to memory of 3212 3028 pierwsze zamówienie nr 0015022012.exe 78 PID 3028 wrote to memory of 3212 3028 pierwsze zamówienie nr 0015022012.exe 78 PID 3028 wrote to memory of 3212 3028 pierwsze zamówienie nr 0015022012.exe 78 PID 3028 wrote to memory of 3212 3028 pierwsze zamówienie nr 0015022012.exe 78 PID 3028 wrote to memory of 3212 3028 pierwsze zamówienie nr 0015022012.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\pierwsze zamówienie nr 0015022012.exe"C:\Users\Admin\AppData\Local\Temp\pierwsze zamówienie nr 0015022012.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:3212
-