File name:

RFQ-POU890387-xls.exe

Full analysis: https://app.any.run/tasks/bf295c3d-0514-4256-b53c-4f42d8e939cb
Verdict: Malicious activity
Threats:

DarkCloud is an infostealer that focuses on collecting and exfiltrating browser data from the infected device. The malware is also capable of keylogging and crypto address swapping. DarkCloud is typically delivered to victims’ computers via phishing emails.

Analysis date: May 19, 2025, 09:21:13
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
purecrypter
netreactor
auto-startup
stealer
evasion
darkcloud
crypto-regex
upx
ims-api
generic
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

757BF872159F15D5183A10C49BA671B5

SHA1:

F702B85C32B55ECEA7564ADE7A766D5D53378C6E

SHA256:

FD78B49CB2C528B0505A1D43AA07FE520D3B35156D8479CED841695D0816A45F

SSDEEP:

49152:fjAKkhRWM0dvyI8yQ2Hsuorq3v8QAh+nIjx/D0YHc0n7WUQFBTpcctBu8vUfyCev:fjAKkh1ovyI8yTxMqnA8Q/DLHc26UgBU

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • PURECRYPTER has been detected (YARA)

      • RFQ-POU890387-xls.exe (PID: 7308)
    • Create files in the Startup directory

      • RFQ-POU890387-xls.exe (PID: 7308)
    • DARKCLOUD has been detected (YARA)

      • HResult.exe (PID: 4120)
  • SUSPICIOUS

    • Base64-obfuscated command line is found

      • RFQ-POU890387-xls.exe (PID: 7308)
    • Process uses IPCONFIG to discard the IP address configuration

      • cmd.exe (PID: 7392)
      • cmd.exe (PID: 976)
    • Starts CMD.EXE for commands execution

      • RFQ-POU890387-xls.exe (PID: 7308)
      • HResult.exe (PID: 6032)
    • Reads security settings of Internet Explorer

      • RFQ-POU890387-xls.exe (PID: 7308)
      • HResult.exe (PID: 6032)
      • HResult.exe (PID: 4120)
    • Starts POWERSHELL.EXE for commands execution

      • RFQ-POU890387-xls.exe (PID: 7308)
    • BASE64 encoded PowerShell command has been detected

      • RFQ-POU890387-xls.exe (PID: 7308)
    • Executable content was dropped or overwritten

      • RFQ-POU890387-xls.exe (PID: 7308)
    • Process uses IPCONFIG to renew DHCP configuration

      • cmd.exe (PID: 8060)
      • cmd.exe (PID: 5892)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 8156)
    • Possible usage of Discord/Telegram API has been detected (YARA)

      • HResult.exe (PID: 4120)
    • Checks for external IP

      • HResult.exe (PID: 4120)
    • Found regular expressions for crypto-addresses (YARA)

      • HResult.exe (PID: 4120)
    • There is functionality for taking screenshot (YARA)

      • HResult.exe (PID: 4120)
  • INFO

    • Reads the computer name

      • RFQ-POU890387-xls.exe (PID: 7308)
      • HResult.exe (PID: 6032)
      • HResult.exe (PID: 4120)
    • Reads the machine GUID from the registry

      • RFQ-POU890387-xls.exe (PID: 7308)
      • HResult.exe (PID: 6032)
      • HResult.exe (PID: 4120)
    • Checks supported languages

      • RFQ-POU890387-xls.exe (PID: 7308)
      • HResult.exe (PID: 6032)
      • HResult.exe (PID: 4120)
    • Process checks computer location settings

      • RFQ-POU890387-xls.exe (PID: 7308)
      • HResult.exe (PID: 6032)
    • .NET Reactor protector has been detected

      • RFQ-POU890387-xls.exe (PID: 7308)
      • HResult.exe (PID: 6032)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 7788)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 7788)
    • Auto-launch of the file from Startup directory

      • RFQ-POU890387-xls.exe (PID: 7308)
    • Creates files or folders in the user directory

      • RFQ-POU890387-xls.exe (PID: 7308)
      • HResult.exe (PID: 4120)
    • Manual execution by a user

      • RFQ-POU890387-xls.exe (PID: 8040)
      • wscript.exe (PID: 8156)
      • HResult.exe (PID: 4120)
    • Checks proxy server information

      • HResult.exe (PID: 4120)
      • slui.exe (PID: 7232)
    • UPX packer has been detected

      • HResult.exe (PID: 4120)
    • Reads the software policy settings

      • slui.exe (PID: 7232)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (63.1)
.exe | Win64 Executable (generic) (23.8)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)
.exe | Generic Win/DOS Executable (1.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:05:13 01:26:52+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 1315328
InitializedDataSize: 2048
UninitializedDataSize: -
EntryPoint: 0x1431be
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.6472.9217
ProductVersionNumber: 1.0.6472.9217
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: Otknhewkob
FileVersion: 1.0.6472.9217
InternalName: Otknhewkob.exe
LegalCopyright: Copyright © 2018
LegalTrademarks: -
OriginalFileName: Otknhewkob.exe
ProductName: Otknhewkob
ProductVersion: 1.0.6472.9217
AssemblyVersion: 1.0.8498.18523
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
145
Monitored processes
20
Malicious processes
2
Suspicious processes
2

Behavior graph

Click at the process to see the details
start #PURECRYPTER rfq-pou890387-xls.exe cmd.exe no specs conhost.exe no specs ipconfig.exe no specs powershell.exe conhost.exe no specs rfq-pou890387-xls.exe no specs cmd.exe no specs conhost.exe no specs ipconfig.exe no specs wscript.exe no specs hresult.exe no specs cmd.exe no specs conhost.exe no specs ipconfig.exe no specs #DARKCLOUD hresult.exe cmd.exe no specs conhost.exe no specs ipconfig.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
976"C:\Windows\System32\cmd.exe" /c ipconfig /releaseC:\Windows\SysWOW64\cmd.exeHResult.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
2148ipconfig /renewC:\Windows\SysWOW64\ipconfig.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
IP Configuration Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\ipconfig.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\ws2_32.dll
4120"C:\Users\admin\AppData\Roaming\HResult.exe"C:\Users\admin\AppData\Roaming\HResult.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Otknhewkob
Version:
1.0.6472.9217
Modules
Images
c:\users\admin\appdata\roaming\hresult.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvbvm60.dll
c:\windows\syswow64\user32.dll
5416ipconfig /releaseC:\Windows\SysWOW64\ipconfig.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
IP Configuration Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\ipconfig.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\ws2_32.dll
5720\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5892"C:\Windows\System32\cmd.exe" /c ipconfig /renewC:\Windows\SysWOW64\cmd.exeHResult.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
6032"C:\Users\admin\AppData\Roaming\HResult.exe" C:\Users\admin\AppData\Roaming\HResult.exewscript.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Otknhewkob
Exit code:
4294967295
Version:
1.0.6472.9217
Modules
Images
c:\users\admin\appdata\roaming\hresult.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
6744\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7232C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7308"C:\Users\admin\Desktop\RFQ-POU890387-xls.exe" C:\Users\admin\Desktop\RFQ-POU890387-xls.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Otknhewkob
Exit code:
4294967295
Version:
1.0.6472.9217
Modules
Images
c:\users\admin\desktop\rfq-pou890387-xls.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Total events
11 181
Read events
11 178
Write events
3
Delete events
0

Modification events

(PID) Process:(4120) HResult.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(4120) HResult.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(4120) HResult.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
1
Suspicious files
4
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
7788powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_oa4qyzfc.dnw.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
4120HResult.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\DESKTOP-JGLLJLD-admin\WebDatabinary
MD5:F6C33AC5E1032A0873BE7BFC65169287
SHA256:D97895CEDED32E33D57BDCACCDBE144E58AA87AF4D2F8855D630286CE30A8D83
7308RFQ-POU890387-xls.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HResult.vbstext
MD5:58F9AFA75A494FDDA938ECB5688DB417
SHA256:F162FBB2987174D7639FDBE9CD48240300D9A88FBB5BEC75CBF57CD5B56B816B
7788powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_nroccaum.u1p.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
7788powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_2i2vc2tm.1lj.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
4120HResult.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\DESKTOP-JGLLJLD-admin\keyDBPath.dbbinary
MD5:0FF3BCDD0BE077B9EB8194B5C09F453C
SHA256:225D669E47EB14D8C969799C92AAEF27B66CD984872EA09284E48DB46521E651
7788powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_4jc1x0k5.vpb.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
4120HResult.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\DESKTOP-JGLLJLD-admin\LoginDatabinary
MD5:A45465CDCDC6CB30C8906F3DA4EC114C
SHA256:4412319EF944EBCCA9581CBACB1D4E1DC614C348D1DFC5D2FAAAAD863D300209
7308RFQ-POU890387-xls.exeC:\Users\admin\AppData\Roaming\HResult.exeexecutable
MD5:757BF872159F15D5183A10C49BA671B5
SHA256:FD78B49CB2C528B0505A1D43AA07FE520D3B35156D8479CED841695D0816A45F
7788powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:EB6F5FC65AB0DEBBCAE2970FA4D2A128
SHA256:33E139C5B9280987E33910BB5532A26242A287FB30C22A711538518E085251B0
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
23
DNS requests
6
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2104
svchost.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2104
svchost.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4120
HResult.exe
GET
200
162.55.60.2:80
http://showip.net/
unknown
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2104
svchost.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
7152
slui.exe
20.83.72.98:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4120
HResult.exe
162.55.60.2:80
showip.net
Hetzner Online GmbH
DE
shared
7232
slui.exe
20.83.72.98:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.212.142
whitelisted
crl.microsoft.com
  • 23.53.40.178
  • 23.53.40.176
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted
showip.net
  • 162.55.60.2
shared

Threats

PID
Process
Class
Message
4120
HResult.exe
Attempted Information Leak
ET INFO IP Check Domain (showip in HTTP Host)
4120
HResult.exe
A Network Trojan was detected
STEALER [ANY.RUN] DarkCloud External IP Check
4120
HResult.exe
Device Retrieving External IP Address Detected
ET HUNTING [ANY.RUN] DARKCLOUD Style External IP Check
No debug info