Analysis
-
max time kernel
145s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2025, 03:23
Static task
static1
General
-
Target
RFQ-04-2025-N0 010-9223-613809.exe
-
Size
1.2MB
-
MD5
7be434447e850a24388a7a90f1f1c877
-
SHA1
dddc1028e5615dceed9f66ba9f598e4da5b1984c
-
SHA256
8cb7fc99d1b138e4ebab403634ae627a8b918f92c41621ec409f23cac2c36c90
-
SHA512
b30da6300cb99fb2d2774670a45b1001ee458da1447daf0c3610fee3b3479a95ace9bfb162806f0922a76d7db9616c39604f881a7d363ad5992b434d955b2bd8
-
SSDEEP
24576:Ru6J33O0c+JY5UZ+XC0kGso6FaH6NyUZqoGMCccPqSaH9WY:Du0c++OCvkGs9FaH6NWoGMCccPnhY
Malware Config
Extracted
darkcloud
Protocol: ftp- Host:
ftp.mailo.com - Port:
21 - Username:
[email protected] - Password:
Rosemary01@01@!!0404
Signatures
-
Darkcloud family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\outvaunts.vbs outvaunts.exe -
Executes dropped EXE 1 IoCs
pid Process 2172 outvaunts.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000d0000000240c5-9.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2172 set thread context of 4800 2172 outvaunts.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ-04-2025-N0 010-9223-613809.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language outvaunts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2172 outvaunts.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4800 svchost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3360 wrote to memory of 2172 3360 RFQ-04-2025-N0 010-9223-613809.exe 90 PID 3360 wrote to memory of 2172 3360 RFQ-04-2025-N0 010-9223-613809.exe 90 PID 3360 wrote to memory of 2172 3360 RFQ-04-2025-N0 010-9223-613809.exe 90 PID 2172 wrote to memory of 4800 2172 outvaunts.exe 94 PID 2172 wrote to memory of 4800 2172 outvaunts.exe 94 PID 2172 wrote to memory of 4800 2172 outvaunts.exe 94 PID 2172 wrote to memory of 4800 2172 outvaunts.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ-04-2025-N0 010-9223-613809.exe"C:\Users\Admin\AppData\Local\Temp\RFQ-04-2025-N0 010-9223-613809.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\scrolar\outvaunts.exe"C:\Users\Admin\AppData\Local\Temp\RFQ-04-2025-N0 010-9223-613809.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\RFQ-04-2025-N0 010-9223-613809.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4800
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
364KB
MD56837f33b21ed176bf5a507868f69f4ee
SHA189ed163cc742d125da289df303cbf2364634d242
SHA2560954b30a40daa48e727799bae209a1b434a8710aedf0656070d20822734f6232
SHA512d85e454e41cd5291f6e53ee41d0b16ec62738be37760b4f3afa8f6ced6b16a1a1ebb8acd89fc9a7008830e30b7bfc7c91065fbad3bb2b0b22e7389562bcd4ebf
-
Filesize
1.2MB
MD57be434447e850a24388a7a90f1f1c877
SHA1dddc1028e5615dceed9f66ba9f598e4da5b1984c
SHA2568cb7fc99d1b138e4ebab403634ae627a8b918f92c41621ec409f23cac2c36c90
SHA512b30da6300cb99fb2d2774670a45b1001ee458da1447daf0c3610fee3b3479a95ace9bfb162806f0922a76d7db9616c39604f881a7d363ad5992b434d955b2bd8