Analysis

  • max time kernel
    151s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    07-04-2021 20:21

General

  • Target

    583DE02EC747F0316FB7B0E59BD858BD.exe

  • Size

    3.2MB

  • MD5

    583de02ec747f0316fb7b0e59bd858bd

  • SHA1

    89e8b166e20db07846b4abcf81ff69c72e8a87ab

  • SHA256

    777a1b5eb79e751f4684f825ef2a5df80433a2d4e20f921d4f747e904793f3d2

  • SHA512

    f20189cc020395a6e4f8ad639912e0ba9750431ed03487f4f22ab016e1ea260782607c52e499a3d31e6d0793ef3aa847cf0027372c82882c465b785308362492

Malware Config

Signatures

  • DarkTrack

    DarkTrack is a remote administration tool written in delphi.

  • DarkTrack Payload 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\583DE02EC747F0316FB7B0E59BD858BD.exe
    "C:\Users\Admin\AppData\Local\Temp\583DE02EC747F0316FB7B0E59BD858BD.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:384
    • C:\Users\Admin\AppData\Local\Temp\server.exe
      "C:\Users\Admin\AppData\Local\Temp\server.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Windows\SysWOW64\notepad.exe
        notepad
        3⤵
          PID:1916
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\server.exe >> NUL
          3⤵
            PID:1736
          • C:\Users\Admin\AppData\Roaming\DtServ32.exe
            "C:\Users\Admin\AppData\Roaming\DtServ32.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of WriteProcessMemory
            PID:1688
            • C:\Windows\SysWOW64\notepad.exe
              notepad
              4⤵
                PID:1088
              • C:\Windows\SysWOW64\notepad.exe
                notepad
                4⤵
                • Adds Run key to start application
                PID:1568

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Defense Evasion

        Modify Registry

        2
        T1112

        Discovery

        System Information Discovery

        1
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\server.exe
          MD5

          eab859092958653767665cf47be684ce

          SHA1

          15a8de33ed414584c5ed2c3fc5372d96538a562c

          SHA256

          7d8657f721a178f803e5d86d6425db7d79b85bff386c058d07d20a3cfa2f3b6f

          SHA512

          ccd340ea6aaa622b5d0af84b63760557284cd39c4736b6c87faa0cbd73ce8503dfb8b8c8ac11b696d218be470630467c16cab89fb6a95fd626735438db0a2353

        • C:\Users\Admin\AppData\Local\Temp\server.exe
          MD5

          eab859092958653767665cf47be684ce

          SHA1

          15a8de33ed414584c5ed2c3fc5372d96538a562c

          SHA256

          7d8657f721a178f803e5d86d6425db7d79b85bff386c058d07d20a3cfa2f3b6f

          SHA512

          ccd340ea6aaa622b5d0af84b63760557284cd39c4736b6c87faa0cbd73ce8503dfb8b8c8ac11b696d218be470630467c16cab89fb6a95fd626735438db0a2353

        • C:\Users\Admin\AppData\Roaming\DtServ32.exe
          MD5

          eab859092958653767665cf47be684ce

          SHA1

          15a8de33ed414584c5ed2c3fc5372d96538a562c

          SHA256

          7d8657f721a178f803e5d86d6425db7d79b85bff386c058d07d20a3cfa2f3b6f

          SHA512

          ccd340ea6aaa622b5d0af84b63760557284cd39c4736b6c87faa0cbd73ce8503dfb8b8c8ac11b696d218be470630467c16cab89fb6a95fd626735438db0a2353

        • C:\Users\Admin\AppData\Roaming\DtServ32.exe
          MD5

          eab859092958653767665cf47be684ce

          SHA1

          15a8de33ed414584c5ed2c3fc5372d96538a562c

          SHA256

          7d8657f721a178f803e5d86d6425db7d79b85bff386c058d07d20a3cfa2f3b6f

          SHA512

          ccd340ea6aaa622b5d0af84b63760557284cd39c4736b6c87faa0cbd73ce8503dfb8b8c8ac11b696d218be470630467c16cab89fb6a95fd626735438db0a2353

        • \Users\Admin\AppData\Roaming\DtServ32.exe
          MD5

          eab859092958653767665cf47be684ce

          SHA1

          15a8de33ed414584c5ed2c3fc5372d96538a562c

          SHA256

          7d8657f721a178f803e5d86d6425db7d79b85bff386c058d07d20a3cfa2f3b6f

          SHA512

          ccd340ea6aaa622b5d0af84b63760557284cd39c4736b6c87faa0cbd73ce8503dfb8b8c8ac11b696d218be470630467c16cab89fb6a95fd626735438db0a2353

        • \Users\Admin\AppData\Roaming\DtServ32.exe
          MD5

          eab859092958653767665cf47be684ce

          SHA1

          15a8de33ed414584c5ed2c3fc5372d96538a562c

          SHA256

          7d8657f721a178f803e5d86d6425db7d79b85bff386c058d07d20a3cfa2f3b6f

          SHA512

          ccd340ea6aaa622b5d0af84b63760557284cd39c4736b6c87faa0cbd73ce8503dfb8b8c8ac11b696d218be470630467c16cab89fb6a95fd626735438db0a2353

        • memory/384-11-0x000000001B478000-0x000000001B479000-memory.dmp
          Filesize

          4KB

        • memory/384-10-0x000000001B477000-0x000000001B478000-memory.dmp
          Filesize

          4KB

        • memory/384-8-0x000000001B457000-0x000000001B476000-memory.dmp
          Filesize

          124KB

        • memory/384-12-0x000000001B479000-0x000000001B47A000-memory.dmp
          Filesize

          4KB

        • memory/384-9-0x000000001B476000-0x000000001B477000-memory.dmp
          Filesize

          4KB

        • memory/384-7-0x000000001B452000-0x000000001B453000-memory.dmp
          Filesize

          4KB

        • memory/384-6-0x00000000002C0000-0x00000000002C1000-memory.dmp
          Filesize

          4KB

        • memory/384-5-0x000000001B450000-0x000000001B452000-memory.dmp
          Filesize

          8KB

        • memory/384-3-0x0000000000C50000-0x0000000000C51000-memory.dmp
          Filesize

          4KB

        • memory/384-2-0x000007FEF58C0000-0x000007FEF62AC000-memory.dmp
          Filesize

          9.9MB

        • memory/1088-27-0x0000000000000000-mapping.dmp
        • memory/1568-31-0x00000000001F0000-0x00000000001F1000-memory.dmp
          Filesize

          4KB

        • memory/1568-30-0x0000000000000000-mapping.dmp
        • memory/1688-24-0x0000000000000000-mapping.dmp
        • memory/1736-20-0x0000000000000000-mapping.dmp
        • memory/1916-17-0x00000000001E0000-0x00000000001E1000-memory.dmp
          Filesize

          4KB

        • memory/1916-16-0x0000000000000000-mapping.dmp
        • memory/2040-15-0x0000000076241000-0x0000000076243000-memory.dmp
          Filesize

          8KB

        • memory/2040-13-0x0000000000000000-mapping.dmp