Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 13:57
Behavioral task
behavioral1
Sample
decoded.exe
Resource
win7-20230831-en
6 signatures
150 seconds
General
-
Target
decoded.exe
-
Size
481KB
-
MD5
2989dab1e3196f06c6ac6abb8693f27d
-
SHA1
2110af59fdbda55712811ca610fa140c2de6e070
-
SHA256
2b24c4c883a562d0326846ee1c92840144d1d755cdb721b24a35038ea92aa0e4
-
SHA512
d158c5bf614619579a034af8dac94414d2f7399f6125b6859e7e84a09e81048022db9b54620c89c725500df7c62698eccde2a9b111f2c6eb35b1b69d7ff81cc6
-
SSDEEP
12288:g3UfhXnGqWoLl8NZdk85UcZ3Hs3c4PDqjGkmJ5qnuQ/umAkAw:giWqWoaNZdk85FZHs3fPkGkmJ5+u+C4
Malware Config
Extracted
Family
darkgate
Botnet
general7
C2
http://zochao.com
Attributes
-
alternative_c2_port
9999
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
2351
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
true
-
crypter_dll
false
-
crypter_rawstub
false
-
crypto_key
AIvtbByMzGxwgX
-
internal_mutex
dcbCbK
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
general7
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2712 created 3720 2712 decoded.exe 14 -
Program crash 1 IoCs
pid pid_target Process procid_target 1080 2712 WerFault.exe 81 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 decoded.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString decoded.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2712 decoded.exe 2712 decoded.exe 2712 decoded.exe 2712 decoded.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2644 2712 decoded.exe 101 PID 2712 wrote to memory of 2644 2712 decoded.exe 101 PID 2712 wrote to memory of 2644 2712 decoded.exe 101
Processes
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3720
-
C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"2⤵PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\decoded.exe"C:\Users\Admin\AppData\Local\Temp\decoded.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2712 -s 9842⤵
- Program crash
PID:1080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2712 -ip 27121⤵PID:4488