Analysis
-
max time kernel
103s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2025, 11:21
Static task
static1
1 signatures
General
-
Target
factura de pago.exe
-
Size
1.9MB
-
MD5
4e21913b9926daa21576d2e53ac359d0
-
SHA1
3dc3bb001d195e37066a194850c8b737fae672b1
-
SHA256
a5fda7ecdbf8971be95a9727a1be2823bb5212c960f0c1d0ececaaf913dfb5bc
-
SHA512
f6e75fac5d3ceeb5c9b4290abf34a76fe840fcd7e08bcfabde34ac8504d4884af3f9dd6e612b2da1b7e476988ea7bed6cdeb8c8d408ff47da379f0a48727a956
-
SSDEEP
24576:wLzHe6s3gANE5KfDj3Dy+HHr8wph++r0WGRKzn09:Gz4m5IzuulF0lRH
Malware Config
Extracted
Family
darkcloud
Credentials
Protocol: ftp- Host:
@StrFtpServer - Port:
21 - Username:
@StrFtpUser - Password:
@StrFtpPass
Signatures
-
Darkcloud family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5200 set thread context of 3320 5200 factura de pago.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3320 MSBuild.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5200 wrote to memory of 3320 5200 factura de pago.exe 88 PID 5200 wrote to memory of 3320 5200 factura de pago.exe 88 PID 5200 wrote to memory of 3320 5200 factura de pago.exe 88 PID 5200 wrote to memory of 3320 5200 factura de pago.exe 88 PID 5200 wrote to memory of 3320 5200 factura de pago.exe 88 PID 5200 wrote to memory of 3320 5200 factura de pago.exe 88 PID 5200 wrote to memory of 3320 5200 factura de pago.exe 88 PID 5200 wrote to memory of 3320 5200 factura de pago.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\factura de pago.exe"C:\Users\Admin\AppData\Local\Temp\factura de pago.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5200 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3320
-