Analysis

  • max time kernel
    128s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    28-08-2023 14:18

General

  • Target

    ais_binded_moderate_halt_vm_enabled_2840.msi

  • Size

    23.8MB

  • MD5

    a3ae369339bf6213f0015ce0cfe4c5ee

  • SHA1

    20c4e81820d31cde4bdc1a345bca3f1f5bf6706a

  • SHA256

    8c4fa2e64e0bd3b3e162e6f74fab12efdb30df68db69c12506038c54ed601580

  • SHA512

    ac6e3e051c77b32ee2461318ec8427ffa97fa443c5a13f31fb584e21c2637d6afe89beef962340c1bc3d17b1f3841eeaaf27d0ed83b6eaf84b9a6444d1bebe13

  • SSDEEP

    393216:nSkbejTCxIAOo9YJi4A8oJSjbXRHodGkWrZH6RjYqLZyh7gJQ104h2j3cLFZN0c:zbe6+A59YAcXRy7W9IMJ7gJ2HmKH

Malware Config

Extracted

Family

darkgate

C2

http://80.66.88.14

Signatures

  • DarkGate

    DarkGate is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 13 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\ais_binded_moderate_halt_vm_enabled_2840.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1756
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2640
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 91FC340338D45FA4528E4E29E9C14715
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3056
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-9c522128-830e-4bfb-876f-39c2464e7535\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
        3⤵
        • Modifies file permissions
        PID:2208
      • C:\Windows\SysWOW64\EXPAND.EXE
        "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
        3⤵
        • Drops file in Windows directory
        PID:2804
      • C:\Users\Admin\AppData\Local\Temp\MW-9c522128-830e-4bfb-876f-39c2464e7535\files\Autoit3.exe
        "C:\Users\Admin\AppData\Local\Temp\MW-9c522128-830e-4bfb-876f-39c2464e7535\files\Autoit3.exe" HUnMaYsB.au3
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1904
        • C:\Windows\SysWOW64\msiexec.exe
          "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\MW-9c522128-830e-4bfb-876f-39c2464e7535\files\dataais_binded_moderate_halt_vm_enabled_2840.msi"
          4⤵
          • Enumerates connected drives
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:536
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-9c522128-830e-4bfb-876f-39c2464e7535\." /SETINTEGRITYLEVEL (CI)(OI)LOW
        3⤵
        • Modifies file permissions
        PID:2964
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2412
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003B4" "0000000000000588"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MW-9c522128-830e-4bfb-876f-39c2464e7535\files.cab

    Filesize

    23.5MB

    MD5

    cea1e89553a921c50a4d267b6c1adf89

    SHA1

    7df98424268cdfd4b59e0e5b86f3b613453bba6c

    SHA256

    6a81b3d6606bd5c4f9d3484719ec35fc6d2dedb902a85553705a71a6e1273104

    SHA512

    f75e4af6a397f7e17629cdaa5cd1ed6c25a13bae112ad7ee9a9507bc0ee0da67e16c919497e831ce28f94791a29ff60f21af5ad763a267666ef9007d48e5e411

  • C:\Users\Admin\AppData\Local\Temp\MW-9c522128-830e-4bfb-876f-39c2464e7535\files\Autoit3.exe

    Filesize

    872KB

    MD5

    c56b5f0201a3b3de53e561fe76912bfd

    SHA1

    2a4062e10a5de813f5688221dbeb3f3ff33eb417

    SHA256

    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

    SHA512

    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

  • C:\Users\Admin\AppData\Local\Temp\MW-9c522128-830e-4bfb-876f-39c2464e7535\files\Autoit3.exe

    Filesize

    872KB

    MD5

    c56b5f0201a3b3de53e561fe76912bfd

    SHA1

    2a4062e10a5de813f5688221dbeb3f3ff33eb417

    SHA256

    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

    SHA512

    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

  • C:\Users\Admin\AppData\Local\Temp\MW-9c522128-830e-4bfb-876f-39c2464e7535\files\HUnMaYsB.au3

    Filesize

    766KB

    MD5

    8800e5a9b05e700c73ac3e6a0efa567b

    SHA1

    33257cf22db748155e57d475d21a7761eed2fa10

    SHA256

    1174858c9a541976c2aa2ef8d629a960dc8ea7e97852fc256aa1ba322c071478

    SHA512

    adea0c6960b60d241beb88115ade95a5535fff97e44b36845dcb9755a56664c15ce536f39c9e20e52b979e090e875eaf5a23466327fe3113c93dd9b3dbfd73fe

  • C:\Users\Admin\AppData\Local\Temp\MW-9c522128-830e-4bfb-876f-39c2464e7535\files\dataais_binded_moderate_halt_vm_enabled_2840.msi

    Filesize

    21.9MB

    MD5

    71ef4437d030db62aee415cb2e4ac7ab

    SHA1

    dfdbc16841197d1e1330cd14aadb48159fac60d9

    SHA256

    bde8e0c4bc687ea485fd4a00c86bd25ab14a04edf9b2bbc03808e9b86074717b

    SHA512

    1d9226d5b0f75d035ac9ac476bc58d3f885dc5800b28fbcd8a05914da8f569708d898baa70bef92102da6a8999c7d0af1e911625bc42a8047e2a7023557c50a7

  • C:\Users\Admin\AppData\Local\Temp\MW-9c522128-830e-4bfb-876f-39c2464e7535\msiwrapper.ini

    Filesize

    438B

    MD5

    535fa9495896692215ced53ec6bfe163

    SHA1

    8fb75b2ba77ca03d9bcf97b4c9109b3da272615a

    SHA256

    952040a1cded18d8589a1682744782e314fab7778adbf38f2bc900c7fbde7298

    SHA512

    7283c9bfdf69b7cce3469253e6145334de7a0a178f002cdb8d7b54e6a5acfd0c3e0b4ef124d669f94f57a853e205286cd0f9ef8506e7c643d64e27197b0959da

  • C:\Users\Admin\AppData\Local\Temp\MW-9c522128-830e-4bfb-876f-39c2464e7535\msiwrapper.ini

    Filesize

    1KB

    MD5

    5893a8e2c861bcc2d166031519dd0939

    SHA1

    be002c60262831442e5312f0e81bd92726087cee

    SHA256

    51a5bd35cd7e1bed5eda00a0c98c935ae22238e52e31ed863e941e492c35c586

    SHA512

    60e34f7ea56690105e44a0665e733e55ab6c99e1164a33aaaf225aa168fe23389bb7b8631a1dd083c846ace6a8576359ca1228e1bda5a5caaaeb8d997388bf11

  • C:\Users\Admin\AppData\Local\Temp\MW-9c522128-830e-4bfb-876f-39c2464e7535\msiwrapper.ini

    Filesize

    1KB

    MD5

    4dea0bed2affea1918705ee3d6641d6c

    SHA1

    1dace19fa61b0f0f964fa948cbf45c060d9d23b2

    SHA256

    2d95c28aaea327ae63afc845ac94237e5fb9f18b1004a74884f9584401e572b8

    SHA512

    f05564b7342b39f1fab39f61ff671f7415141eb2b1bc8c73a94b378b97a21b2d229e8322bcad1d03562975a071b9f7a927d2e3fc529e8fd582313bc547ef3d3c

  • C:\Users\Admin\AppData\Local\Temp\MW-9c522128-830e-4bfb-876f-39c2464e7535\msiwrapper.ini

    Filesize

    1KB

    MD5

    4dea0bed2affea1918705ee3d6641d6c

    SHA1

    1dace19fa61b0f0f964fa948cbf45c060d9d23b2

    SHA256

    2d95c28aaea327ae63afc845ac94237e5fb9f18b1004a74884f9584401e572b8

    SHA512

    f05564b7342b39f1fab39f61ff671f7415141eb2b1bc8c73a94b378b97a21b2d229e8322bcad1d03562975a071b9f7a927d2e3fc529e8fd582313bc547ef3d3c

  • C:\Users\Admin\AppData\Local\Temp\MW-9c522128-830e-4bfb-876f-39c2464e7535\msiwrapper.ini

    Filesize

    1KB

    MD5

    fe036cffd9e80c2d370650af31fd94f7

    SHA1

    0de8886b8598239825969472cada9290445f1d9f

    SHA256

    46d17610e84c01e988a05064beabd521bb10754ff0b58a4ac4427b3d98316dad

    SHA512

    081b041d8d3719e664559178e7279952cbb949269f00c8dae96320486af9a6597d30fbe8c0ce3d7bf0cf0c421ce96c95e5a4f2ef432229fb81dbb84d3615e067

  • C:\Windows\Installer\MSIE12B.tmp

    Filesize

    208KB

    MD5

    d82b3fb861129c5d71f0cd2874f97216

    SHA1

    f3fe341d79224126e950d2691d574d147102b18d

    SHA256

    107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

    SHA512

    244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

  • C:\Windows\Installer\MSIFCF7.tmp

    Filesize

    208KB

    MD5

    d82b3fb861129c5d71f0cd2874f97216

    SHA1

    f3fe341d79224126e950d2691d574d147102b18d

    SHA256

    107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

    SHA512

    244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

  • C:\Windows\Installer\f76df19.msi

    Filesize

    23.8MB

    MD5

    a3ae369339bf6213f0015ce0cfe4c5ee

    SHA1

    20c4e81820d31cde4bdc1a345bca3f1f5bf6706a

    SHA256

    8c4fa2e64e0bd3b3e162e6f74fab12efdb30df68db69c12506038c54ed601580

    SHA512

    ac6e3e051c77b32ee2461318ec8427ffa97fa443c5a13f31fb584e21c2637d6afe89beef962340c1bc3d17b1f3841eeaaf27d0ed83b6eaf84b9a6444d1bebe13

  • \Users\Admin\AppData\Local\Temp\MW-9c522128-830e-4bfb-876f-39c2464e7535\files\Autoit3.exe

    Filesize

    872KB

    MD5

    c56b5f0201a3b3de53e561fe76912bfd

    SHA1

    2a4062e10a5de813f5688221dbeb3f3ff33eb417

    SHA256

    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

    SHA512

    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

  • \Users\Admin\AppData\Local\Temp\MW-9c522128-830e-4bfb-876f-39c2464e7535\files\Autoit3.exe

    Filesize

    872KB

    MD5

    c56b5f0201a3b3de53e561fe76912bfd

    SHA1

    2a4062e10a5de813f5688221dbeb3f3ff33eb417

    SHA256

    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

    SHA512

    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

  • \Users\Admin\AppData\Local\Temp\MW-9c522128-830e-4bfb-876f-39c2464e7535\files\Autoit3.exe

    Filesize

    872KB

    MD5

    c56b5f0201a3b3de53e561fe76912bfd

    SHA1

    2a4062e10a5de813f5688221dbeb3f3ff33eb417

    SHA256

    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

    SHA512

    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

  • \Users\Admin\AppData\Local\Temp\MW-9c522128-830e-4bfb-876f-39c2464e7535\files\Autoit3.exe

    Filesize

    872KB

    MD5

    c56b5f0201a3b3de53e561fe76912bfd

    SHA1

    2a4062e10a5de813f5688221dbeb3f3ff33eb417

    SHA256

    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

    SHA512

    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

  • \Windows\Installer\MSIE12B.tmp

    Filesize

    208KB

    MD5

    d82b3fb861129c5d71f0cd2874f97216

    SHA1

    f3fe341d79224126e950d2691d574d147102b18d

    SHA256

    107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

    SHA512

    244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

  • \Windows\Installer\MSIFCF7.tmp

    Filesize

    208KB

    MD5

    d82b3fb861129c5d71f0cd2874f97216

    SHA1

    f3fe341d79224126e950d2691d574d147102b18d

    SHA256

    107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

    SHA512

    244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

  • memory/1904-82-0x0000000003260000-0x0000000003439000-memory.dmp

    Filesize

    1.8MB

  • memory/1904-80-0x0000000002A80000-0x0000000002B75000-memory.dmp

    Filesize

    980KB

  • memory/1904-84-0x0000000003260000-0x0000000003439000-memory.dmp

    Filesize

    1.8MB

  • memory/1904-83-0x0000000003260000-0x0000000003439000-memory.dmp

    Filesize

    1.8MB

  • memory/1904-79-0x0000000000C40000-0x0000000001040000-memory.dmp

    Filesize

    4.0MB