Analysis
-
max time kernel
143s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2025, 09:20
Static task
static1
Behavioral task
behavioral1
Sample
DAS09876567800.exe
Resource
win7-20240903-en
General
-
Target
DAS09876567800.exe
-
Size
1.3MB
-
MD5
0dbeba5dd7585ab072cc0f15a95fd4ac
-
SHA1
ab1f07574200224ee5ce206d923d6591b8456ff2
-
SHA256
27b3117f8576dffaf9d057dd4bb67e1a521795518be5796c93a876d2e61d3af7
-
SHA512
058327c3571bfbf811a37a5b48a55d4ee6b0e39f4c849ce52c5024da3e9833bbfd9c098fcba72ffa852d96df4f06c906acb0bc87f85672046b3033510e398611
-
SSDEEP
24576:Iu6J33O0c+JY5UZ+XC0kGso6Fa7S47DyWqTY1GZdPyWt7l9WY:iu0c++OCvkGs9Fa7S4SWsyWlaY
Malware Config
Extracted
darkcloud
- email_from
- email_to
Signatures
-
Darkcloud family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nonagglutinant.vbs nonagglutinant.exe -
Executes dropped EXE 1 IoCs
pid Process 5748 nonagglutinant.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000024325-9.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5748 set thread context of 5496 5748 nonagglutinant.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DAS09876567800.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nonagglutinant.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 5748 nonagglutinant.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 5324 DAS09876567800.exe 5324 DAS09876567800.exe 5748 nonagglutinant.exe 5748 nonagglutinant.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 5324 DAS09876567800.exe 5324 DAS09876567800.exe 5748 nonagglutinant.exe 5748 nonagglutinant.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5496 svchost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 5324 wrote to memory of 5748 5324 DAS09876567800.exe 90 PID 5324 wrote to memory of 5748 5324 DAS09876567800.exe 90 PID 5324 wrote to memory of 5748 5324 DAS09876567800.exe 90 PID 5748 wrote to memory of 5496 5748 nonagglutinant.exe 91 PID 5748 wrote to memory of 5496 5748 nonagglutinant.exe 91 PID 5748 wrote to memory of 5496 5748 nonagglutinant.exe 91 PID 5748 wrote to memory of 5496 5748 nonagglutinant.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\DAS09876567800.exe"C:\Users\Admin\AppData\Local\Temp\DAS09876567800.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5324 -
C:\Users\Admin\AppData\Local\unjuridically\nonagglutinant.exe"C:\Users\Admin\AppData\Local\Temp\DAS09876567800.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5748 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\DAS09876567800.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5496
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
448KB
MD5eae137bf1a61a7bed8630807cb1082bb
SHA11550b6a016aac39ff753cede7894d04a069e8aa0
SHA256ebddc6c5abc2987592ef5b90c792d5574e44fe1cb428b7c5e03acd1778e0b6de
SHA512071eda3aed85f6c2b0e38b144c5758bd6c70e25f368b1a026ddb9da7ae37a8271448299403835301aef5212a02dc5659081db4c22df461a5da58f34a39b047ac
-
Filesize
1.3MB
MD50dbeba5dd7585ab072cc0f15a95fd4ac
SHA1ab1f07574200224ee5ce206d923d6591b8456ff2
SHA25627b3117f8576dffaf9d057dd4bb67e1a521795518be5796c93a876d2e61d3af7
SHA512058327c3571bfbf811a37a5b48a55d4ee6b0e39f4c849ce52c5024da3e9833bbfd9c098fcba72ffa852d96df4f06c906acb0bc87f85672046b3033510e398611