Malware Analysis Report

2025-04-13 21:07

Sample ID 230722-clfybahd82
Target f825697da8d31747696278747dc51ae7.bin
SHA256 fed6b51f94a754a1d7888f8b6c5f43f571322ab2142354a68d710c123e0bf878
Tags
darkcloud stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

fed6b51f94a754a1d7888f8b6c5f43f571322ab2142354a68d710c123e0bf878

Threat Level: Known bad

The file f825697da8d31747696278747dc51ae7.bin was found to be: Known bad.

Malicious Activity Summary

darkcloud stealer

DarkCloud

Suspicious use of SetThreadContext

Program crash

Unsigned PE

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-07-22 02:09

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2023-07-22 02:09

Reported

2023-07-22 02:12

Platform

win10v2004-20230703-en

Max time kernel

149s

Max time network

147s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b0ca90a4a10611f098fc18e528de4ad9f37c8272a525cd9fb44f8db874f25038.exe"

Signatures

DarkCloud

stealer darkcloud

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\b0ca90a4a10611f098fc18e528de4ad9f37c8272a525cd9fb44f8db874f25038.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 744 wrote to memory of 3784 N/A C:\Users\Admin\AppData\Local\Temp\b0ca90a4a10611f098fc18e528de4ad9f37c8272a525cd9fb44f8db874f25038.exe C:\Users\Admin\AppData\Local\Temp\b0ca90a4a10611f098fc18e528de4ad9f37c8272a525cd9fb44f8db874f25038.exe
PID 744 wrote to memory of 3784 N/A C:\Users\Admin\AppData\Local\Temp\b0ca90a4a10611f098fc18e528de4ad9f37c8272a525cd9fb44f8db874f25038.exe C:\Users\Admin\AppData\Local\Temp\b0ca90a4a10611f098fc18e528de4ad9f37c8272a525cd9fb44f8db874f25038.exe
PID 744 wrote to memory of 3784 N/A C:\Users\Admin\AppData\Local\Temp\b0ca90a4a10611f098fc18e528de4ad9f37c8272a525cd9fb44f8db874f25038.exe C:\Users\Admin\AppData\Local\Temp\b0ca90a4a10611f098fc18e528de4ad9f37c8272a525cd9fb44f8db874f25038.exe
PID 744 wrote to memory of 3784 N/A C:\Users\Admin\AppData\Local\Temp\b0ca90a4a10611f098fc18e528de4ad9f37c8272a525cd9fb44f8db874f25038.exe C:\Users\Admin\AppData\Local\Temp\b0ca90a4a10611f098fc18e528de4ad9f37c8272a525cd9fb44f8db874f25038.exe
PID 744 wrote to memory of 3784 N/A C:\Users\Admin\AppData\Local\Temp\b0ca90a4a10611f098fc18e528de4ad9f37c8272a525cd9fb44f8db874f25038.exe C:\Users\Admin\AppData\Local\Temp\b0ca90a4a10611f098fc18e528de4ad9f37c8272a525cd9fb44f8db874f25038.exe
PID 744 wrote to memory of 3784 N/A C:\Users\Admin\AppData\Local\Temp\b0ca90a4a10611f098fc18e528de4ad9f37c8272a525cd9fb44f8db874f25038.exe C:\Users\Admin\AppData\Local\Temp\b0ca90a4a10611f098fc18e528de4ad9f37c8272a525cd9fb44f8db874f25038.exe
PID 744 wrote to memory of 3784 N/A C:\Users\Admin\AppData\Local\Temp\b0ca90a4a10611f098fc18e528de4ad9f37c8272a525cd9fb44f8db874f25038.exe C:\Users\Admin\AppData\Local\Temp\b0ca90a4a10611f098fc18e528de4ad9f37c8272a525cd9fb44f8db874f25038.exe
PID 744 wrote to memory of 3784 N/A C:\Users\Admin\AppData\Local\Temp\b0ca90a4a10611f098fc18e528de4ad9f37c8272a525cd9fb44f8db874f25038.exe C:\Users\Admin\AppData\Local\Temp\b0ca90a4a10611f098fc18e528de4ad9f37c8272a525cd9fb44f8db874f25038.exe

Processes

C:\Users\Admin\AppData\Local\Temp\b0ca90a4a10611f098fc18e528de4ad9f37c8272a525cd9fb44f8db874f25038.exe

"C:\Users\Admin\AppData\Local\Temp\b0ca90a4a10611f098fc18e528de4ad9f37c8272a525cd9fb44f8db874f25038.exe"

C:\Users\Admin\AppData\Local\Temp\b0ca90a4a10611f098fc18e528de4ad9f37c8272a525cd9fb44f8db874f25038.exe

"C:\Users\Admin\AppData\Local\Temp\b0ca90a4a10611f098fc18e528de4ad9f37c8272a525cd9fb44f8db874f25038.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 146.78.124.51.in-addr.arpa udp
US 8.8.8.8:53 8.3.197.209.in-addr.arpa udp
US 8.8.8.8:53 136.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 1.77.109.52.in-addr.arpa udp
US 8.8.8.8:53 202.74.101.95.in-addr.arpa udp
US 8.8.8.8:53 10.173.189.20.in-addr.arpa udp

Files

memory/744-133-0x0000000074490000-0x0000000074C40000-memory.dmp

memory/744-134-0x0000000000330000-0x000000000041A000-memory.dmp

memory/744-135-0x0000000005430000-0x00000000059D4000-memory.dmp

memory/744-136-0x0000000004E80000-0x0000000004F12000-memory.dmp

memory/744-137-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

memory/744-138-0x0000000004E30000-0x0000000004E3A000-memory.dmp

memory/744-139-0x0000000074490000-0x0000000074C40000-memory.dmp

memory/744-140-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

memory/744-141-0x000000000A2C0000-0x000000000A35C000-memory.dmp

memory/3784-142-0x0000000000400000-0x000000000046D000-memory.dmp

memory/3784-145-0x0000000000400000-0x000000000046D000-memory.dmp

memory/744-146-0x0000000074490000-0x0000000074C40000-memory.dmp

memory/3784-149-0x0000000000400000-0x000000000046D000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2023-07-22 02:09

Reported

2023-07-22 02:12

Platform

win7-20230712-en

Max time kernel

121s

Max time network

124s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b0ca90a4a10611f098fc18e528de4ad9f37c8272a525cd9fb44f8db874f25038.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\b0ca90a4a10611f098fc18e528de4ad9f37c8272a525cd9fb44f8db874f25038.exe

"C:\Users\Admin\AppData\Local\Temp\b0ca90a4a10611f098fc18e528de4ad9f37c8272a525cd9fb44f8db874f25038.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2192 -s 668

Network

N/A

Files

memory/2192-53-0x00000000000F0000-0x00000000001DA000-memory.dmp

memory/2192-54-0x00000000745C0000-0x0000000074CAE000-memory.dmp

memory/2192-55-0x00000000005B0000-0x00000000005F0000-memory.dmp

memory/2192-56-0x0000000000560000-0x000000000056E000-memory.dmp

memory/2192-57-0x00000000745C0000-0x0000000074CAE000-memory.dmp

memory/2192-58-0x00000000005B0000-0x00000000005F0000-memory.dmp

memory/2192-59-0x0000000001F20000-0x0000000001F2A000-memory.dmp