Analysis
-
max time kernel
136s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 20:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
OrdemdeCompra.exe
Resource
win7-20230220-en
3 signatures
150 seconds
General
-
Target
OrdemdeCompra.exe
-
Size
1.0MB
-
MD5
c041ea1db65b15853616addc268a5342
-
SHA1
ff86b0e7c04739835f043da76dca91f8e49351a9
-
SHA256
55182f40b8372c9d9b9f8d5d59ce387b19acb5e355af6a40a6bfbb0bf64bd31f
-
SHA512
85201389170c4fe57d55a3e8b4e9cacecd13bf954ebd3659dfcbe957c75bf227173aa3d2d6f45e852973ba69ff7c582f7000bf66a8f20f5b8fa0dcec1cd95d39
-
SSDEEP
24576:yjCFyy3LuJCKhieUHU03chggmYBKtBp6F:yyyy33GinHC/dBKt
Malware Config
Extracted
Family
darkcloud
C2
https://api.telegram.org/bot5747177798:AAGv5MNvuUjtsZ9QlXMkdP6QssoMkGFSw6s/sendMessage?chat_id=805410216
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 972 set thread context of 1384 972 OrdemdeCompra.exe 88 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1384 OrdemdeCompra.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1384 OrdemdeCompra.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 972 wrote to memory of 1384 972 OrdemdeCompra.exe 88 PID 972 wrote to memory of 1384 972 OrdemdeCompra.exe 88 PID 972 wrote to memory of 1384 972 OrdemdeCompra.exe 88 PID 972 wrote to memory of 1384 972 OrdemdeCompra.exe 88 PID 972 wrote to memory of 1384 972 OrdemdeCompra.exe 88 PID 972 wrote to memory of 1384 972 OrdemdeCompra.exe 88 PID 972 wrote to memory of 1384 972 OrdemdeCompra.exe 88 PID 972 wrote to memory of 1384 972 OrdemdeCompra.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\OrdemdeCompra.exe"C:\Users\Admin\AppData\Local\Temp\OrdemdeCompra.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\OrdemdeCompra.exe"C:\Users\Admin\AppData\Local\Temp\OrdemdeCompra.exe"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1384
-