Analysis

  • max time kernel
    136s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    04/09/2023, 08:47

General

  • Target

    TT Payment Notification.exe

  • Size

    1.2MB

  • MD5

    d986f8a969ea92f7b012960b1c32bc52

  • SHA1

    c51e68a77553d31e58ef6beb0fafb442b12ecf9c

  • SHA256

    96bb6f2b44e3ac7184eacb2273441f1e0663b7c1f41c070c2ee0c53dcc29cf73

  • SHA512

    9e4eb564cdf71da83eb3224258e1fceafc3589dd228587213fcb0927bac094c4d8ec4e002be5ddf23fd82ab0a61bb0b507ca4c42561c02693992ffc0bd65d30a

  • SSDEEP

    12288:gIZBBtnm3n0He9DlpzIpk1qaxbxQxkT4/rJw8flwykcnM9lPuTO47QpilQP/dUB0:o66WIQwGr3yHdUtWF9ESpOQ+tkXy5z

Score
10/10

Malware Config

Extracted

Family

darkcloud

Attributes

Signatures

  • DarkCloud

    An information stealer written in Visual Basic.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TT Payment Notification.exe
    "C:\Users\Admin\AppData\Local\Temp\TT Payment Notification.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:740
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ryCSxxLay" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3830.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2868
    • C:\Users\Admin\AppData\Local\Temp\TT Payment Notification.exe
      "{path}"
      2⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp3830.tmp

    Filesize

    1KB

    MD5

    de2238af723687ed8fbfa2457bc4fdd0

    SHA1

    89e1731940d09675740d70e355dd88278e53abc8

    SHA256

    431f4b0a3c3168053e9c3fcd2296abbe607e1e3f4139b8d8406be0e289a83708

    SHA512

    f3cbeb8ef745479a17f2d840d49ae4ed8fa619991a10bdbe7f85937de56db77fc8fed7b83abee9c4c8d069f0a7f429374a6532a6f1df8586507dbd517c6c77fa

  • memory/740-4-0x0000000004DD0000-0x0000000004E10000-memory.dmp

    Filesize

    256KB

  • memory/740-1-0x0000000000DF0000-0x0000000000F2A000-memory.dmp

    Filesize

    1.2MB

  • memory/740-3-0x0000000074D90000-0x000000007547E000-memory.dmp

    Filesize

    6.9MB

  • memory/740-0-0x0000000074D90000-0x000000007547E000-memory.dmp

    Filesize

    6.9MB

  • memory/740-5-0x0000000000280000-0x0000000000294000-memory.dmp

    Filesize

    80KB

  • memory/740-6-0x00000000064A0000-0x0000000006566000-memory.dmp

    Filesize

    792KB

  • memory/740-2-0x0000000004DD0000-0x0000000004E10000-memory.dmp

    Filesize

    256KB

  • memory/740-7-0x0000000006570000-0x00000000065FE000-memory.dmp

    Filesize

    568KB

  • memory/740-26-0x0000000074D90000-0x000000007547E000-memory.dmp

    Filesize

    6.9MB

  • memory/2688-13-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2688-15-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2688-19-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2688-21-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2688-23-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2688-11-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2688-27-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB