Analysis
-
max time kernel
136s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 01:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5e7b9b88f18be7d07963c53f18b3bf473f5e05ff30817c10538214292ae846f7.exe
Resource
win7-20240704-en
6 signatures
150 seconds
General
-
Target
5e7b9b88f18be7d07963c53f18b3bf473f5e05ff30817c10538214292ae846f7.exe
-
Size
932KB
-
MD5
883cf4255f882fe37f4920efede0c744
-
SHA1
3bf30fb4585f86f79f97fe54fb94d1cee10bd9ef
-
SHA256
5e7b9b88f18be7d07963c53f18b3bf473f5e05ff30817c10538214292ae846f7
-
SHA512
49dc64a6e572f48b42cb83373521a7ec9f0e3f04c2d3262d8e5f3db63217705b4219df219392b223f643039546a011ed006cebeae1eef199f1a127e82f8d5588
-
SSDEEP
24576:+2SWGLZmVcYR7YJ+5JfGA97nkp8V5j47wnJg:+2RXVcYdYaf7tCEiEnJg
Malware Config
Extracted
Family
darkcloud
C2
https://api.telegram.org/bot6843160964:AAF3CXe6SpPYlr6PSxsfXFuMMbuXMIkkNtE/sendMessage?chat_id=5302361040
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2576 set thread context of 2200 2576 5e7b9b88f18be7d07963c53f18b3bf473f5e05ff30817c10538214292ae846f7.exe 32 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2576 5e7b9b88f18be7d07963c53f18b3bf473f5e05ff30817c10538214292ae846f7.exe 2576 5e7b9b88f18be7d07963c53f18b3bf473f5e05ff30817c10538214292ae846f7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2576 5e7b9b88f18be7d07963c53f18b3bf473f5e05ff30817c10538214292ae846f7.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2200 5e7b9b88f18be7d07963c53f18b3bf473f5e05ff30817c10538214292ae846f7.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2576 wrote to memory of 2528 2576 5e7b9b88f18be7d07963c53f18b3bf473f5e05ff30817c10538214292ae846f7.exe 31 PID 2576 wrote to memory of 2528 2576 5e7b9b88f18be7d07963c53f18b3bf473f5e05ff30817c10538214292ae846f7.exe 31 PID 2576 wrote to memory of 2528 2576 5e7b9b88f18be7d07963c53f18b3bf473f5e05ff30817c10538214292ae846f7.exe 31 PID 2576 wrote to memory of 2528 2576 5e7b9b88f18be7d07963c53f18b3bf473f5e05ff30817c10538214292ae846f7.exe 31 PID 2576 wrote to memory of 2200 2576 5e7b9b88f18be7d07963c53f18b3bf473f5e05ff30817c10538214292ae846f7.exe 32 PID 2576 wrote to memory of 2200 2576 5e7b9b88f18be7d07963c53f18b3bf473f5e05ff30817c10538214292ae846f7.exe 32 PID 2576 wrote to memory of 2200 2576 5e7b9b88f18be7d07963c53f18b3bf473f5e05ff30817c10538214292ae846f7.exe 32 PID 2576 wrote to memory of 2200 2576 5e7b9b88f18be7d07963c53f18b3bf473f5e05ff30817c10538214292ae846f7.exe 32 PID 2576 wrote to memory of 2200 2576 5e7b9b88f18be7d07963c53f18b3bf473f5e05ff30817c10538214292ae846f7.exe 32 PID 2576 wrote to memory of 2200 2576 5e7b9b88f18be7d07963c53f18b3bf473f5e05ff30817c10538214292ae846f7.exe 32 PID 2576 wrote to memory of 2200 2576 5e7b9b88f18be7d07963c53f18b3bf473f5e05ff30817c10538214292ae846f7.exe 32 PID 2576 wrote to memory of 2200 2576 5e7b9b88f18be7d07963c53f18b3bf473f5e05ff30817c10538214292ae846f7.exe 32 PID 2576 wrote to memory of 2200 2576 5e7b9b88f18be7d07963c53f18b3bf473f5e05ff30817c10538214292ae846f7.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e7b9b88f18be7d07963c53f18b3bf473f5e05ff30817c10538214292ae846f7.exe"C:\Users\Admin\AppData\Local\Temp\5e7b9b88f18be7d07963c53f18b3bf473f5e05ff30817c10538214292ae846f7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\5e7b9b88f18be7d07963c53f18b3bf473f5e05ff30817c10538214292ae846f7.exe"C:\Users\Admin\AppData\Local\Temp\5e7b9b88f18be7d07963c53f18b3bf473f5e05ff30817c10538214292ae846f7.exe"2⤵PID:2528
-
-
C:\Users\Admin\AppData\Local\Temp\5e7b9b88f18be7d07963c53f18b3bf473f5e05ff30817c10538214292ae846f7.exe"C:\Users\Admin\AppData\Local\Temp\5e7b9b88f18be7d07963c53f18b3bf473f5e05ff30817c10538214292ae846f7.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2200
-