Malware Analysis Report

2025-04-13 20:58

Sample ID 250307-bsw3faskx5
Target 25f854c22fc9d2e70567c85803f6ee13673514287aea5112f6d6e85ad3e7a0fc
SHA256 25f854c22fc9d2e70567c85803f6ee13673514287aea5112f6d6e85ad3e7a0fc
Tags
discovery darkcloud stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

25f854c22fc9d2e70567c85803f6ee13673514287aea5112f6d6e85ad3e7a0fc

Threat Level: Known bad

The file 25f854c22fc9d2e70567c85803f6ee13673514287aea5112f6d6e85ad3e7a0fc was found to be: Known bad.

Malicious Activity Summary

discovery darkcloud stealer

Darkcloud family

DarkCloud

Suspicious use of NtCreateUserProcessOtherParentProcess

Drops startup file

Suspicious use of SetThreadContext

System Location Discovery: System Language Discovery

Unsigned PE

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-03-07 01:24

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-03-07 01:24

Reported

2025-03-07 01:27

Platform

win7-20241010-en

Max time kernel

149s

Max time network

154s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Confirmación de pago 6399272827973.exe"

Signatures

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Confirmación de pago 6399272827973.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Confirmación de pago 6399272827973.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Confirmación de pago 6399272827973.exe

"C:\Users\Admin\AppData\Local\Temp\Confirmación de pago 6399272827973.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 alcomax.com.co udp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp
US 204.44.192.90:443 alcomax.com.co tcp

Files

memory/3052-0-0x0000000074ACE000-0x0000000074ACF000-memory.dmp

memory/3052-1-0x0000000000E00000-0x0000000000E20000-memory.dmp

memory/3052-2-0x0000000074AC0000-0x00000000751AE000-memory.dmp

memory/3052-3-0x0000000000410000-0x0000000000416000-memory.dmp

memory/3052-4-0x0000000074ACE000-0x0000000074ACF000-memory.dmp

memory/3052-5-0x0000000074AC0000-0x00000000751AE000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2025-03-07 01:24

Reported

2025-03-07 01:27

Platform

win10v2004-20250217-en

Max time kernel

77s

Max time network

149s

Command Line

C:\Windows\Explorer.EXE

Signatures

DarkCloud

stealer darkcloud

Darkcloud family

darkcloud

Suspicious use of NtCreateUserProcessOtherParentProcess

Description Indicator Process Target
PID 2600 created 3368 N/A C:\Users\Admin\AppData\Local\Temp\Confirmación de pago 6399272827973.exe C:\Windows\Explorer.EXE

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TargetSite.vbs C:\Users\Admin\AppData\Local\Temp\Confirmación de pago 6399272827973.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2600 set thread context of 692 N/A C:\Users\Admin\AppData\Local\Temp\Confirmación de pago 6399272827973.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Confirmación de pago 6399272827973.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Confirmación de pago 6399272827973.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Confirmación de pago 6399272827973.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe N/A

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\Confirmación de pago 6399272827973.exe

"C:\Users\Admin\AppData\Local\Temp\Confirmación de pago 6399272827973.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 alcomax.com.co udp
US 204.44.192.90:443 alcomax.com.co tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp

Files

memory/2600-0-0x000000007537E000-0x000000007537F000-memory.dmp

memory/2600-1-0x0000000000310000-0x0000000000330000-memory.dmp

memory/2600-2-0x0000000075370000-0x0000000075B20000-memory.dmp

memory/2600-3-0x0000000002650000-0x0000000002656000-memory.dmp

memory/2600-4-0x0000000005650000-0x0000000005784000-memory.dmp

memory/2600-5-0x0000000005D70000-0x0000000006314000-memory.dmp

memory/2600-6-0x00000000058C0000-0x0000000005952000-memory.dmp

memory/2600-18-0x0000000005650000-0x000000000577D000-memory.dmp

memory/2600-16-0x0000000005650000-0x000000000577D000-memory.dmp

memory/2600-54-0x0000000005650000-0x000000000577D000-memory.dmp

memory/2600-66-0x0000000005650000-0x000000000577D000-memory.dmp

memory/2600-56-0x0000000005650000-0x000000000577D000-memory.dmp

memory/2600-52-0x0000000005650000-0x000000000577D000-memory.dmp

memory/2600-50-0x0000000005650000-0x000000000577D000-memory.dmp

memory/2600-48-0x0000000005650000-0x000000000577D000-memory.dmp

memory/2600-46-0x0000000005650000-0x000000000577D000-memory.dmp

memory/2600-44-0x0000000005650000-0x000000000577D000-memory.dmp

memory/2600-42-0x0000000005650000-0x000000000577D000-memory.dmp

memory/2600-40-0x0000000005650000-0x000000000577D000-memory.dmp

memory/2600-38-0x0000000005650000-0x000000000577D000-memory.dmp

memory/2600-36-0x0000000005650000-0x000000000577D000-memory.dmp

memory/2600-34-0x0000000005650000-0x000000000577D000-memory.dmp

memory/2600-32-0x0000000005650000-0x000000000577D000-memory.dmp

memory/2600-30-0x0000000005650000-0x000000000577D000-memory.dmp

memory/2600-28-0x0000000005650000-0x000000000577D000-memory.dmp

memory/2600-26-0x0000000005650000-0x000000000577D000-memory.dmp

memory/2600-24-0x0000000005650000-0x000000000577D000-memory.dmp

memory/2600-22-0x0000000005650000-0x000000000577D000-memory.dmp

memory/2600-20-0x0000000005650000-0x000000000577D000-memory.dmp

memory/2600-14-0x0000000005650000-0x000000000577D000-memory.dmp

memory/2600-12-0x0000000005650000-0x000000000577D000-memory.dmp

memory/2600-10-0x0000000005650000-0x000000000577D000-memory.dmp

memory/2600-8-0x0000000005650000-0x000000000577D000-memory.dmp

memory/2600-7-0x0000000005650000-0x000000000577D000-memory.dmp

memory/2600-70-0x0000000005650000-0x000000000577D000-memory.dmp

memory/2600-68-0x0000000005650000-0x000000000577D000-memory.dmp

memory/2600-64-0x0000000005650000-0x000000000577D000-memory.dmp

memory/2600-62-0x0000000005650000-0x000000000577D000-memory.dmp

memory/2600-60-0x0000000005650000-0x000000000577D000-memory.dmp

memory/2600-58-0x0000000005650000-0x000000000577D000-memory.dmp

memory/2600-1329-0x0000000075370000-0x0000000075B20000-memory.dmp

memory/2600-1330-0x0000000005AC0000-0x0000000005B4E000-memory.dmp

memory/2600-1331-0x0000000005C50000-0x0000000005CDA000-memory.dmp

memory/2600-1332-0x0000000005D10000-0x0000000005D5C000-memory.dmp

memory/2600-1333-0x0000000006410000-0x0000000006464000-memory.dmp

memory/2600-1339-0x0000000075370000-0x0000000075B20000-memory.dmp

memory/2600-1346-0x0000000075370000-0x0000000075B20000-memory.dmp

memory/2600-1343-0x0000000075370000-0x0000000075B20000-memory.dmp

memory/2600-1348-0x0000000075370000-0x0000000075B20000-memory.dmp

memory/692-1349-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2600-1342-0x000000007537E000-0x000000007537F000-memory.dmp

memory/2600-1341-0x0000000075370000-0x0000000075B20000-memory.dmp

memory/692-1360-0x0000000000400000-0x0000000000458000-memory.dmp