Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2025, 07:47
Static task
static1
General
-
Target
Halkbank Ekstre.pdf.exe
-
Size
1.3MB
-
MD5
5e4a8b932d470ecf00cd284e2c5848bd
-
SHA1
fa0fa4dd24aa8926049ed3d40bf229f3d151bd63
-
SHA256
8495fddf26cbc9c009f6a93b6a61f5447a8f2d41d574020509c1a72f499140c6
-
SHA512
29244fd7b26d16cd72fe56e59278272cff61284d3a1b1e0b11dff3bc48d8fd841a7202e691166cfee20f0c7774183de44b77d76bd7b919f557e46d0f3ad00b55
-
SSDEEP
24576:gu6J33O0c+JY5UZ+XC0kGso6FaVSB6wWDe9xD706TIBOWY:Ku0c++OCvkGs9FaVSBg+xD706TyY
Malware Config
Extracted
darkcloud
Protocol: ftp- Host:
@StrFtpServer - Port:
21 - Username:
@StrFtpUser - Password:
@StrFtpPass
Signatures
-
Darkcloud family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\orographically.vbs orographically.exe -
Executes dropped EXE 1 IoCs
pid Process 5940 orographically.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1356-6-0x0000000000FA0000-0x00000000013A0000-memory.dmp autoit_exe behavioral1/files/0x000a00000001e68e-8.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5940 set thread context of 4600 5940 orographically.exe 92 -
Program crash 1 IoCs
pid pid_target Process procid_target 4852 5940 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Halkbank Ekstre.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language orographically.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 5940 orographically.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1356 Halkbank Ekstre.pdf.exe 1356 Halkbank Ekstre.pdf.exe 5940 orographically.exe 5940 orographically.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1356 Halkbank Ekstre.pdf.exe 1356 Halkbank Ekstre.pdf.exe 5940 orographically.exe 5940 orographically.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4600 svchost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1356 wrote to memory of 5940 1356 Halkbank Ekstre.pdf.exe 91 PID 1356 wrote to memory of 5940 1356 Halkbank Ekstre.pdf.exe 91 PID 1356 wrote to memory of 5940 1356 Halkbank Ekstre.pdf.exe 91 PID 5940 wrote to memory of 4600 5940 orographically.exe 92 PID 5940 wrote to memory of 4600 5940 orographically.exe 92 PID 5940 wrote to memory of 4600 5940 orographically.exe 92 PID 5940 wrote to memory of 4600 5940 orographically.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\Halkbank Ekstre.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Halkbank Ekstre.pdf.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Local\Anglophile\orographically.exe"C:\Users\Admin\AppData\Local\Temp\Halkbank Ekstre.pdf.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5940 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Halkbank Ekstre.pdf.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5940 -s 7043⤵
- Program crash
PID:4852
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5940 -ip 59401⤵PID:4744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD55e4a8b932d470ecf00cd284e2c5848bd
SHA1fa0fa4dd24aa8926049ed3d40bf229f3d151bd63
SHA2568495fddf26cbc9c009f6a93b6a61f5447a8f2d41d574020509c1a72f499140c6
SHA51229244fd7b26d16cd72fe56e59278272cff61284d3a1b1e0b11dff3bc48d8fd841a7202e691166cfee20f0c7774183de44b77d76bd7b919f557e46d0f3ad00b55