Analysis
-
max time kernel
146s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2025, 03:27
Static task
static1
General
-
Target
RFQ-04-2025-N0 010-9223-613809.exe
-
Size
1.2MB
-
MD5
7be434447e850a24388a7a90f1f1c877
-
SHA1
dddc1028e5615dceed9f66ba9f598e4da5b1984c
-
SHA256
8cb7fc99d1b138e4ebab403634ae627a8b918f92c41621ec409f23cac2c36c90
-
SHA512
b30da6300cb99fb2d2774670a45b1001ee458da1447daf0c3610fee3b3479a95ace9bfb162806f0922a76d7db9616c39604f881a7d363ad5992b434d955b2bd8
-
SSDEEP
24576:Ru6J33O0c+JY5UZ+XC0kGso6FaH6NyUZqoGMCccPqSaH9WY:Du0c++OCvkGs9FaH6NWoGMCccPnhY
Malware Config
Extracted
darkcloud
Protocol: ftp- Host:
ftp.mailo.com - Port:
21 - Username:
[email protected] - Password:
Rosemary01@01@!!0404
Signatures
-
Darkcloud family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\outvaunts.vbs outvaunts.exe -
Executes dropped EXE 2 IoCs
pid Process 4708 outvaunts.exe 1168 outvaunts.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00090000000227b9-9.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1168 set thread context of 1692 1168 outvaunts.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ-04-2025-N0 010-9223-613809.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language outvaunts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language outvaunts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4708 outvaunts.exe 1168 outvaunts.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1692 svchost.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4636 wrote to memory of 4708 4636 RFQ-04-2025-N0 010-9223-613809.exe 89 PID 4636 wrote to memory of 4708 4636 RFQ-04-2025-N0 010-9223-613809.exe 89 PID 4636 wrote to memory of 4708 4636 RFQ-04-2025-N0 010-9223-613809.exe 89 PID 4708 wrote to memory of 1132 4708 outvaunts.exe 90 PID 4708 wrote to memory of 1132 4708 outvaunts.exe 90 PID 4708 wrote to memory of 1132 4708 outvaunts.exe 90 PID 4708 wrote to memory of 1168 4708 outvaunts.exe 91 PID 4708 wrote to memory of 1168 4708 outvaunts.exe 91 PID 4708 wrote to memory of 1168 4708 outvaunts.exe 91 PID 1168 wrote to memory of 1692 1168 outvaunts.exe 94 PID 1168 wrote to memory of 1692 1168 outvaunts.exe 94 PID 1168 wrote to memory of 1692 1168 outvaunts.exe 94 PID 1168 wrote to memory of 1692 1168 outvaunts.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ-04-2025-N0 010-9223-613809.exe"C:\Users\Admin\AppData\Local\Temp\RFQ-04-2025-N0 010-9223-613809.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\scrolar\outvaunts.exe"C:\Users\Admin\AppData\Local\Temp\RFQ-04-2025-N0 010-9223-613809.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\RFQ-04-2025-N0 010-9223-613809.exe"3⤵PID:1132
-
-
C:\Users\Admin\AppData\Local\scrolar\outvaunts.exe"C:\Users\Admin\AppData\Local\scrolar\outvaunts.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\scrolar\outvaunts.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1692
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
309KB
MD5b312938367e98c7bdf3a2344568d21a4
SHA1e2aaedd81589614e7c580664fecfd33470d0458b
SHA256132a01b68621ab9bf0c3d1d21d2e4b865f09ccf7a803aaf704f9ce5467ef66e8
SHA512fd98717b533877c3805c6fce859de5603613206bb677d5327a4ee409d20c158e0f0ffca073cf094cc25eca5a1cf677aba658d0cb9fda7bd7fe60490c9e173492
-
Filesize
364KB
MD56837f33b21ed176bf5a507868f69f4ee
SHA189ed163cc742d125da289df303cbf2364634d242
SHA2560954b30a40daa48e727799bae209a1b434a8710aedf0656070d20822734f6232
SHA512d85e454e41cd5291f6e53ee41d0b16ec62738be37760b4f3afa8f6ced6b16a1a1ebb8acd89fc9a7008830e30b7bfc7c91065fbad3bb2b0b22e7389562bcd4ebf
-
Filesize
1.2MB
MD57be434447e850a24388a7a90f1f1c877
SHA1dddc1028e5615dceed9f66ba9f598e4da5b1984c
SHA2568cb7fc99d1b138e4ebab403634ae627a8b918f92c41621ec409f23cac2c36c90
SHA512b30da6300cb99fb2d2774670a45b1001ee458da1447daf0c3610fee3b3479a95ace9bfb162806f0922a76d7db9616c39604f881a7d363ad5992b434d955b2bd8