Analysis
-
max time kernel
52s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
27/03/2025, 08:57
Static task
static1
Behavioral task
behavioral1
Sample
DAS09876567800.exe
Resource
win7-20241023-en
General
-
Target
DAS09876567800.exe
-
Size
1.3MB
-
MD5
0dbeba5dd7585ab072cc0f15a95fd4ac
-
SHA1
ab1f07574200224ee5ce206d923d6591b8456ff2
-
SHA256
27b3117f8576dffaf9d057dd4bb67e1a521795518be5796c93a876d2e61d3af7
-
SHA512
058327c3571bfbf811a37a5b48a55d4ee6b0e39f4c849ce52c5024da3e9833bbfd9c098fcba72ffa852d96df4f06c906acb0bc87f85672046b3033510e398611
-
SSDEEP
24576:Iu6J33O0c+JY5UZ+XC0kGso6Fa7S47DyWqTY1GZdPyWt7l9WY:iu0c++OCvkGs9Fa7S4SWsyWlaY
Malware Config
Extracted
darkcloud
- email_from
- email_to
Signatures
-
Darkcloud family
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0007000000016d43-30.dat acprotect -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nonagglutinant.vbs nonagglutinant.exe -
Executes dropped EXE 1 IoCs
pid Process 2776 nonagglutinant.exe -
Loads dropped DLL 2 IoCs
pid Process 2312 DAS09876567800.exe 2780 svchost.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000016d2a-11.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2776 set thread context of 2780 2776 nonagglutinant.exe 31 -
resource yara_rule behavioral1/files/0x0007000000016d43-30.dat upx behavioral1/memory/2780-33-0x00000000753A0000-0x0000000075409000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nonagglutinant.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DAS09876567800.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2776 nonagglutinant.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2312 DAS09876567800.exe 2312 DAS09876567800.exe 2776 nonagglutinant.exe 2776 nonagglutinant.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2312 DAS09876567800.exe 2312 DAS09876567800.exe 2776 nonagglutinant.exe 2776 nonagglutinant.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2780 svchost.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2776 2312 DAS09876567800.exe 30 PID 2312 wrote to memory of 2776 2312 DAS09876567800.exe 30 PID 2312 wrote to memory of 2776 2312 DAS09876567800.exe 30 PID 2312 wrote to memory of 2776 2312 DAS09876567800.exe 30 PID 2776 wrote to memory of 2780 2776 nonagglutinant.exe 31 PID 2776 wrote to memory of 2780 2776 nonagglutinant.exe 31 PID 2776 wrote to memory of 2780 2776 nonagglutinant.exe 31 PID 2776 wrote to memory of 2780 2776 nonagglutinant.exe 31 PID 2776 wrote to memory of 2780 2776 nonagglutinant.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\DAS09876567800.exe"C:\Users\Admin\AppData\Local\Temp\DAS09876567800.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\unjuridically\nonagglutinant.exe"C:\Users\Admin\AppData\Local\Temp\DAS09876567800.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\DAS09876567800.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2780
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD50dbeba5dd7585ab072cc0f15a95fd4ac
SHA1ab1f07574200224ee5ce206d923d6591b8456ff2
SHA25627b3117f8576dffaf9d057dd4bb67e1a521795518be5796c93a876d2e61d3af7
SHA512058327c3571bfbf811a37a5b48a55d4ee6b0e39f4c849ce52c5024da3e9833bbfd9c098fcba72ffa852d96df4f06c906acb0bc87f85672046b3033510e398611
-
Filesize
161KB
MD5073a17b6cfb1112c6c838b2fba06a657
SHA1a54bb22489eaa8c52eb3e512aee522320530b0be
SHA256dcfcd16fbf0511d3f2b3792e5493fa22d7291e4bb2efbfa5ade5002a04fc2cab
SHA5125bc8307350bd8ba09fa9eedddc62f1dba65db62eb09ae64e0adff4dfad0937dbec5b621f294f5980bf77033faac3bfe200945c0280606915ee9a82d34a003b9e