Analysis
-
max time kernel
151s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 11:28
Behavioral task
behavioral1
Sample
decoded.exe
Resource
win7-20230831-en
5 signatures
150 seconds
General
-
Target
decoded.exe
-
Size
481KB
-
MD5
b0b796fb2f5d42908937cfe7520469d5
-
SHA1
8333259d7b3564bdb052bf75378b56abf2b696cc
-
SHA256
ca2af2316629b492968b1ccd2548bd4031d6722b726bac694f00380cd320b510
-
SHA512
ddea8ea0aa6eabf30420bf960c7da122e4dab2b5eb2d30031dd0899dbba3dde6820b635a92ef7248fd1fbab1e95553ffea2bd693687e07e13fef14b1d8a1536d
-
SSDEEP
12288:73wfF2uWIOyAxbhWyElk3Xb8ruWqW3GMRIYQIpe1fqnu5/9aJCE:7S2uWyAXWyElwL8rjv3qYdpe5+u581
Malware Config
Extracted
Family
darkgate
Botnet
Ricoc
C2
http://5.188.87.58
Attributes
-
alternative_c2_port
9999
-
anti_analysis
false
-
anti_debug
true
-
anti_vm
false
-
c2_port
2351
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
true
-
crypter_dll
false
-
crypter_rawstub
false
-
crypto_key
TWbsImuTLxVkPB
-
internal_mutex
bKcDaE
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
Ricoc
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 12 IoCs
description pid Process procid_target PID 1796 created 1120 1796 decoded.exe 4 PID 1796 created 1168 1796 decoded.exe 11 PID 1796 created 1168 1796 decoded.exe 11 PID 1796 created 1120 1796 decoded.exe 4 PID 1796 created 1120 1796 decoded.exe 4 PID 1796 created 2304 1796 decoded.exe 30 PID 1796 created 1120 1796 decoded.exe 4 PID 1796 created 2304 1796 decoded.exe 30 PID 1796 created 2304 1796 decoded.exe 30 PID 1796 created 2304 1796 decoded.exe 30 PID 1796 created 2304 1796 decoded.exe 30 PID 1796 created 2304 1796 decoded.exe 30 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 decoded.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString decoded.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 1796 decoded.exe 1796 decoded.exe 1796 decoded.exe 1796 decoded.exe 1796 decoded.exe 1796 decoded.exe 1796 decoded.exe 1796 decoded.exe 1796 decoded.exe 1796 decoded.exe 1796 decoded.exe 1796 decoded.exe 1796 decoded.exe 1796 decoded.exe 1796 decoded.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1796 wrote to memory of 2304 1796 decoded.exe 30 PID 1796 wrote to memory of 2304 1796 decoded.exe 30 PID 1796 wrote to memory of 2304 1796 decoded.exe 30 PID 1796 wrote to memory of 2304 1796 decoded.exe 30 PID 1796 wrote to memory of 2892 1796 decoded.exe 31 PID 1796 wrote to memory of 2892 1796 decoded.exe 31 PID 1796 wrote to memory of 2892 1796 decoded.exe 31 PID 1796 wrote to memory of 2892 1796 decoded.exe 31 PID 1796 wrote to memory of 2652 1796 decoded.exe 32 PID 1796 wrote to memory of 2652 1796 decoded.exe 32 PID 1796 wrote to memory of 2652 1796 decoded.exe 32 PID 1796 wrote to memory of 2652 1796 decoded.exe 32 PID 1796 wrote to memory of 2768 1796 decoded.exe 33 PID 1796 wrote to memory of 2768 1796 decoded.exe 33 PID 1796 wrote to memory of 2768 1796 decoded.exe 33 PID 1796 wrote to memory of 2768 1796 decoded.exe 33 PID 1796 wrote to memory of 2340 1796 decoded.exe 34 PID 1796 wrote to memory of 2340 1796 decoded.exe 34 PID 1796 wrote to memory of 2340 1796 decoded.exe 34 PID 1796 wrote to memory of 2340 1796 decoded.exe 34 PID 1796 wrote to memory of 3000 1796 decoded.exe 35 PID 1796 wrote to memory of 3000 1796 decoded.exe 35 PID 1796 wrote to memory of 3000 1796 decoded.exe 35 PID 1796 wrote to memory of 3000 1796 decoded.exe 35 PID 1796 wrote to memory of 2548 1796 decoded.exe 36 PID 1796 wrote to memory of 2548 1796 decoded.exe 36 PID 1796 wrote to memory of 2548 1796 decoded.exe 36 PID 1796 wrote to memory of 2548 1796 decoded.exe 36 PID 1796 wrote to memory of 2496 1796 decoded.exe 37 PID 1796 wrote to memory of 2496 1796 decoded.exe 37 PID 1796 wrote to memory of 2496 1796 decoded.exe 37 PID 1796 wrote to memory of 2496 1796 decoded.exe 37 PID 1796 wrote to memory of 2504 1796 decoded.exe 38 PID 1796 wrote to memory of 2504 1796 decoded.exe 38 PID 1796 wrote to memory of 2504 1796 decoded.exe 38 PID 1796 wrote to memory of 2504 1796 decoded.exe 38 PID 1796 wrote to memory of 2512 1796 decoded.exe 39 PID 1796 wrote to memory of 2512 1796 decoded.exe 39 PID 1796 wrote to memory of 2512 1796 decoded.exe 39 PID 1796 wrote to memory of 2512 1796 decoded.exe 39 PID 1796 wrote to memory of 2544 1796 decoded.exe 40 PID 1796 wrote to memory of 2544 1796 decoded.exe 40 PID 1796 wrote to memory of 2544 1796 decoded.exe 40 PID 1796 wrote to memory of 2544 1796 decoded.exe 40 PID 1796 wrote to memory of 2564 1796 decoded.exe 41 PID 1796 wrote to memory of 2564 1796 decoded.exe 41 PID 1796 wrote to memory of 2564 1796 decoded.exe 41 PID 1796 wrote to memory of 2564 1796 decoded.exe 41
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"2⤵PID:2304
-
C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"3⤵PID:3000
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"3⤵PID:2496
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"3⤵PID:2504
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"3⤵PID:2512
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"3⤵PID:2544
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"3⤵PID:2564
-
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"2⤵PID:2768
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"2⤵PID:2340
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"2⤵PID:2548
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"2⤵PID:2892
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"2⤵PID:2652
-
-
C:\Users\Admin\AppData\Local\Temp\decoded.exe"C:\Users\Admin\AppData\Local\Temp\decoded.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1796