Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    08-02-2024 13:04

General

  • Target

    8f8e239e3d9462549a39c4146761fc2c29782f0772c77e78a4673826878a61c3.exe

  • Size

    386KB

  • MD5

    5568613629c562ac7286d4707499a603

  • SHA1

    f711924631f876e6cb469202e59be39a7bffc696

  • SHA256

    8f8e239e3d9462549a39c4146761fc2c29782f0772c77e78a4673826878a61c3

  • SHA512

    1823e5188e6667832f8afae0b40f16fba2eeaf971c26c186c5cf953874783516f7662675924adbbe61099d8de765a65e1e913ae842dd1e6e28de9495d6fbe3c4

  • SSDEEP

    12288:UpLNxYqeb7Oppc92N/i4eAjyEVPvIjYKkJj6GmZU:mxSbIDeAjJVPv+Yb6nZ

Score
10/10

Malware Config

Extracted

Family

darkcloud

Attributes

Signatures

  • DarkCloud

    An information stealer written in Visual Basic.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f8e239e3d9462549a39c4146761fc2c29782f0772c77e78a4673826878a61c3.exe
    "C:\Users\Admin\AppData\Local\Temp\8f8e239e3d9462549a39c4146761fc2c29782f0772c77e78a4673826878a61c3.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2364

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2364-0-0x0000000000400000-0x0000000000462F40-memory.dmp

    Filesize

    395KB