Analysis

  • max time kernel
    146s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-08-2023 00:07

General

  • Target

    1.exe

  • Size

    872KB

  • MD5

    c56b5f0201a3b3de53e561fe76912bfd

  • SHA1

    2a4062e10a5de813f5688221dbeb3f3ff33eb417

  • SHA256

    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

  • SHA512

    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

  • SSDEEP

    12288:6pVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MyZa31twoPTdFxgawV2M01:6T3E53Myyzl0hMf1tr7Caw8M01

Score
10/10

Malware Config

Extracted

Family

darkgate

C2

http://107.181.161.20

Signatures

  • DarkGate

    DarkGate is an infostealer written in C++.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 17 IoCs
  • Blocklisted process makes network request 10 IoCs
  • Drops startup file 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2388
    • C:\Windows\system32\DllHost.exe
      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
      1⤵
        PID:3560
        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe
          "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe"
          2⤵
            PID:1388
            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe
              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe"
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:1640
        • C:\Windows\System32\RuntimeBroker.exe
          C:\Windows\System32\RuntimeBroker.exe -Embedding
          1⤵
            PID:3844
          • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe
            "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca
            1⤵
              PID:2072
            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
              1⤵
                PID:3932
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                1⤵
                  PID:2400
                • C:\Users\Admin\AppData\Local\Temp\1.exe
                  C:\Users\Admin\AppData\Local\Temp\1.exe 2.au3
                  1⤵
                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                  • Suspicious use of SetThreadContext
                  • Modifies registry class
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:3692
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd.exe
                    2⤵
                      PID:4972
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd.exe
                      2⤵
                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                      • Blocklisted process makes network request
                      • Drops startup file
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: GetForegroundWindowSpam
                      PID:408
                  • C:\Windows\System32\rundll32.exe
                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                    1⤵
                      PID:2180

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\ProgramData\gacgkde\gfhehbd\ebbehhh

                      Filesize

                      134B

                      MD5

                      8112ef05442eca8d725d21e3f7640a15

                      SHA1

                      ed975006ee00c53929f0ab46b4ea1f46ffdbafa9

                      SHA256

                      74f33ab0369c479af8e8cfdbf52c377b6fd4458315f9fcd10d701443917e6f6b

                      SHA512

                      946a6be9945e0bb1bba324722d95b9bab3d73fd6329b213a60252bd0d256db91cb37f1914e270827ea3420272ac1cba3be693938c2e8e8837a87bda5f0ee5d8b

                    • C:\ProgramData\gacgkde\gfhehbd\ebbehhh

                      Filesize

                      134B

                      MD5

                      594ea12a177bc5eb799934e0a1d1de31

                      SHA1

                      2ba42fb0d921b8dab85685833b4ef89305aedaea

                      SHA256

                      aa035c0e143cf830653e5ef673751a07dc757d4fc899f8844eec595faf9c8523

                      SHA512

                      923a9a1d23f839d7a42eba7d9b61d1defc503e94f9ca953fc281b07751d40909a02b39b65ad5ced48b3ae55dfec42838a8907367f2a7793aeddce053b0623a0f

                    • \??\c:\temp\abeabke.au3

                      Filesize

                      777KB

                      MD5

                      0e3913bc130c81f4c6cb004eddbdf1a3

                      SHA1

                      80eaa851d47a0aa67148e544882a3003b3f4742d

                      SHA256

                      8ff356af97443bd2b028eb57f160a92c2a1ecab2d227977a87a221ae6409c4be

                      SHA512

                      7aab507bc116aebf8202b96824489d48c90493acddfad9faac0013ed2d136db2a72a7269c7e4c79a17e051b7e30a62061ac954ed19bd35ec8ddc1a6cf3cc5e85

                    • memory/408-536-0x0000000000400000-0x000000000047E000-memory.dmp

                      Filesize

                      504KB

                    • memory/408-569-0x0000000000400000-0x000000000047E000-memory.dmp

                      Filesize

                      504KB

                    • memory/1388-11-0x00000000007E0000-0x00000000007E1000-memory.dmp

                      Filesize

                      4KB

                    • memory/1388-12-0x0000000000600000-0x0000000000601000-memory.dmp

                      Filesize

                      4KB

                    • memory/1640-1150-0x0000000010410000-0x000000001048E000-memory.dmp

                      Filesize

                      504KB

                    • memory/1640-1145-0x0000000010410000-0x000000001048E000-memory.dmp

                      Filesize

                      504KB

                    • memory/1640-553-0x00000000011A0000-0x00000000011A1000-memory.dmp

                      Filesize

                      4KB

                    • memory/1640-554-0x0000000001020000-0x0000000001021000-memory.dmp

                      Filesize

                      4KB

                    • memory/3692-8-0x00000000044C0000-0x000000000469A000-memory.dmp

                      Filesize

                      1.9MB

                    • memory/3692-534-0x00000000044C0000-0x000000000469A000-memory.dmp

                      Filesize

                      1.9MB

                    • memory/3692-14-0x00000000044C0000-0x000000000469A000-memory.dmp

                      Filesize

                      1.9MB

                    • memory/3692-9-0x0000000001070000-0x0000000001470000-memory.dmp

                      Filesize

                      4.0MB

                    • memory/3692-1-0x0000000001070000-0x0000000001470000-memory.dmp

                      Filesize

                      4.0MB

                    • memory/3692-7-0x00000000044C0000-0x000000000469A000-memory.dmp

                      Filesize

                      1.9MB

                    • memory/3692-6-0x00000000044C0000-0x000000000469A000-memory.dmp

                      Filesize

                      1.9MB

                    • memory/3692-3-0x00000000044C0000-0x000000000469A000-memory.dmp

                      Filesize

                      1.9MB

                    • memory/3692-2-0x0000000003C70000-0x0000000003D65000-memory.dmp

                      Filesize

                      980KB