Analysis
-
max time kernel
151s -
max time network
146s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
07-04-2021 20:21
Static task
static1
Behavioral task
behavioral1
Sample
583DE02EC747F0316FB7B0E59BD858BD.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
583DE02EC747F0316FB7B0E59BD858BD.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
583DE02EC747F0316FB7B0E59BD858BD.exe
-
Size
3.2MB
-
MD5
583de02ec747f0316fb7b0e59bd858bd
-
SHA1
89e8b166e20db07846b4abcf81ff69c72e8a87ab
-
SHA256
777a1b5eb79e751f4684f825ef2a5df80433a2d4e20f921d4f747e904793f3d2
-
SHA512
f20189cc020395a6e4f8ad639912e0ba9750431ed03487f4f22ab016e1ea260782607c52e499a3d31e6d0793ef3aa847cf0027372c82882c465b785308362492
Score
10/10
Malware Config
Signatures
-
DarkTrack Payload 6 IoCs
resource yara_rule behavioral1/files/0x00040000000130de-14.dat family_darktrack behavioral1/files/0x00040000000130de-18.dat family_darktrack behavioral1/files/0x00050000000130e1-22.dat family_darktrack behavioral1/files/0x00050000000130e1-23.dat family_darktrack behavioral1/files/0x00050000000130e1-25.dat family_darktrack behavioral1/files/0x00050000000130e1-33.dat family_darktrack -
Executes dropped EXE 2 IoCs
pid Process 2040 server.exe 1688 DtServ32.exe -
Loads dropped DLL 2 IoCs
pid Process 2040 server.exe 2040 server.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Run\DtServ32sm.exe = "C:\\Users\\Admin\\AppData\\Roaming\\DtServ32.exe" notepad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TypedURLs 583DE02EC747F0316FB7B0E59BD858BD.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1688 DtServ32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 384 583DE02EC747F0316FB7B0E59BD858BD.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 384 wrote to memory of 2040 384 583DE02EC747F0316FB7B0E59BD858BD.exe 26 PID 384 wrote to memory of 2040 384 583DE02EC747F0316FB7B0E59BD858BD.exe 26 PID 384 wrote to memory of 2040 384 583DE02EC747F0316FB7B0E59BD858BD.exe 26 PID 384 wrote to memory of 2040 384 583DE02EC747F0316FB7B0E59BD858BD.exe 26 PID 2040 wrote to memory of 1916 2040 server.exe 27 PID 2040 wrote to memory of 1916 2040 server.exe 27 PID 2040 wrote to memory of 1916 2040 server.exe 27 PID 2040 wrote to memory of 1916 2040 server.exe 27 PID 2040 wrote to memory of 1916 2040 server.exe 27 PID 2040 wrote to memory of 1916 2040 server.exe 27 PID 2040 wrote to memory of 1916 2040 server.exe 27 PID 2040 wrote to memory of 1916 2040 server.exe 27 PID 2040 wrote to memory of 1916 2040 server.exe 27 PID 2040 wrote to memory of 1916 2040 server.exe 27 PID 2040 wrote to memory of 1916 2040 server.exe 27 PID 2040 wrote to memory of 1916 2040 server.exe 27 PID 2040 wrote to memory of 1916 2040 server.exe 27 PID 2040 wrote to memory of 1916 2040 server.exe 27 PID 2040 wrote to memory of 1916 2040 server.exe 27 PID 2040 wrote to memory of 1916 2040 server.exe 27 PID 2040 wrote to memory of 1916 2040 server.exe 27 PID 2040 wrote to memory of 1916 2040 server.exe 27 PID 2040 wrote to memory of 1916 2040 server.exe 27 PID 2040 wrote to memory of 1916 2040 server.exe 27 PID 2040 wrote to memory of 1916 2040 server.exe 27 PID 2040 wrote to memory of 1916 2040 server.exe 27 PID 2040 wrote to memory of 1916 2040 server.exe 27 PID 2040 wrote to memory of 1736 2040 server.exe 28 PID 2040 wrote to memory of 1736 2040 server.exe 28 PID 2040 wrote to memory of 1736 2040 server.exe 28 PID 2040 wrote to memory of 1736 2040 server.exe 28 PID 2040 wrote to memory of 1688 2040 server.exe 30 PID 2040 wrote to memory of 1688 2040 server.exe 30 PID 2040 wrote to memory of 1688 2040 server.exe 30 PID 2040 wrote to memory of 1688 2040 server.exe 30 PID 1688 wrote to memory of 1088 1688 DtServ32.exe 31 PID 1688 wrote to memory of 1088 1688 DtServ32.exe 31 PID 1688 wrote to memory of 1088 1688 DtServ32.exe 31 PID 1688 wrote to memory of 1088 1688 DtServ32.exe 31 PID 1688 wrote to memory of 1088 1688 DtServ32.exe 31 PID 1688 wrote to memory of 1088 1688 DtServ32.exe 31 PID 1688 wrote to memory of 1088 1688 DtServ32.exe 31 PID 1688 wrote to memory of 1088 1688 DtServ32.exe 31 PID 1688 wrote to memory of 1088 1688 DtServ32.exe 31 PID 1688 wrote to memory of 1088 1688 DtServ32.exe 31 PID 1688 wrote to memory of 1088 1688 DtServ32.exe 31 PID 1688 wrote to memory of 1088 1688 DtServ32.exe 31 PID 1688 wrote to memory of 1088 1688 DtServ32.exe 31 PID 1688 wrote to memory of 1088 1688 DtServ32.exe 31 PID 1688 wrote to memory of 1088 1688 DtServ32.exe 31 PID 1688 wrote to memory of 1088 1688 DtServ32.exe 31 PID 1688 wrote to memory of 1088 1688 DtServ32.exe 31 PID 1688 wrote to memory of 1088 1688 DtServ32.exe 31 PID 1688 wrote to memory of 1088 1688 DtServ32.exe 31 PID 1688 wrote to memory of 1088 1688 DtServ32.exe 31 PID 1688 wrote to memory of 1088 1688 DtServ32.exe 31 PID 1688 wrote to memory of 1088 1688 DtServ32.exe 31 PID 1688 wrote to memory of 1088 1688 DtServ32.exe 31 PID 1688 wrote to memory of 1568 1688 DtServ32.exe 32 PID 1688 wrote to memory of 1568 1688 DtServ32.exe 32 PID 1688 wrote to memory of 1568 1688 DtServ32.exe 32 PID 1688 wrote to memory of 1568 1688 DtServ32.exe 32 PID 1688 wrote to memory of 1568 1688 DtServ32.exe 32 PID 1688 wrote to memory of 1568 1688 DtServ32.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\583DE02EC747F0316FB7B0E59BD858BD.exe"C:\Users\Admin\AppData\Local\Temp\583DE02EC747F0316FB7B0E59BD858BD.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\notepad.exenotepad3⤵PID:1916
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\server.exe >> NUL3⤵PID:1736
-
-
C:\Users\Admin\AppData\Roaming\DtServ32.exe"C:\Users\Admin\AppData\Roaming\DtServ32.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\notepad.exenotepad4⤵PID:1088
-
-
C:\Windows\SysWOW64\notepad.exenotepad4⤵
- Adds Run key to start application
PID:1568
-
-
-