Analysis
-
max time kernel
145s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2025, 02:30
Static task
static1
General
-
Target
RFQ-04-2025-N0 010-9223-613809.exe
-
Size
1.2MB
-
MD5
7be434447e850a24388a7a90f1f1c877
-
SHA1
dddc1028e5615dceed9f66ba9f598e4da5b1984c
-
SHA256
8cb7fc99d1b138e4ebab403634ae627a8b918f92c41621ec409f23cac2c36c90
-
SHA512
b30da6300cb99fb2d2774670a45b1001ee458da1447daf0c3610fee3b3479a95ace9bfb162806f0922a76d7db9616c39604f881a7d363ad5992b434d955b2bd8
-
SSDEEP
24576:Ru6J33O0c+JY5UZ+XC0kGso6FaH6NyUZqoGMCccPqSaH9WY:Du0c++OCvkGs9FaH6NWoGMCccPnhY
Malware Config
Extracted
darkcloud
Protocol: ftp- Host:
ftp.mailo.com - Port:
21 - Username:
[email protected] - Password:
Rosemary01@01@!!0404
Signatures
-
Darkcloud family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\outvaunts.vbs outvaunts.exe -
Executes dropped EXE 1 IoCs
pid Process 4516 outvaunts.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000b000000024149-9.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4516 set thread context of 4668 4516 outvaunts.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ-04-2025-N0 010-9223-613809.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language outvaunts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4516 outvaunts.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4668 svchost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2548 wrote to memory of 4516 2548 RFQ-04-2025-N0 010-9223-613809.exe 89 PID 2548 wrote to memory of 4516 2548 RFQ-04-2025-N0 010-9223-613809.exe 89 PID 2548 wrote to memory of 4516 2548 RFQ-04-2025-N0 010-9223-613809.exe 89 PID 4516 wrote to memory of 4668 4516 outvaunts.exe 92 PID 4516 wrote to memory of 4668 4516 outvaunts.exe 92 PID 4516 wrote to memory of 4668 4516 outvaunts.exe 92 PID 4516 wrote to memory of 4668 4516 outvaunts.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ-04-2025-N0 010-9223-613809.exe"C:\Users\Admin\AppData\Local\Temp\RFQ-04-2025-N0 010-9223-613809.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\scrolar\outvaunts.exe"C:\Users\Admin\AppData\Local\Temp\RFQ-04-2025-N0 010-9223-613809.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\RFQ-04-2025-N0 010-9223-613809.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4668
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD57be434447e850a24388a7a90f1f1c877
SHA1dddc1028e5615dceed9f66ba9f598e4da5b1984c
SHA2568cb7fc99d1b138e4ebab403634ae627a8b918f92c41621ec409f23cac2c36c90
SHA512b30da6300cb99fb2d2774670a45b1001ee458da1447daf0c3610fee3b3479a95ace9bfb162806f0922a76d7db9616c39604f881a7d363ad5992b434d955b2bd8