Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 14:42
Behavioral task
behavioral1
Sample
stubbed.exe
Resource
win7-20230831-en
General
-
Target
stubbed.exe
-
Size
434KB
-
MD5
32779bb4eda0b1834dc50d88f4930c3e
-
SHA1
7041fb14c8593d2657d4244d6930a35a2745f96e
-
SHA256
8a93eabf56949eb69dc5c81a39645fec215d967d126751a8bb72e2f90a3c41c7
-
SHA512
aeb8e88e9b016df87228be72517694f1c382fde0e1f42bb3e91f0fba22ef8abc7298aec89cb8439d1c1bb20ae2429f1d4bee5a99f9fd78f4a8d7840ca856b0c8
-
SSDEEP
12288:ObfJmY1oCMa3Wyex7ykWynLSKJ13oqnuj/ro:O7bKCM0ax7ykWynLRJ1Y+uTro
Malware Config
Extracted
darkgate
http://sanibroadbandcommunicton.duckdns.org
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
5864
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_rawstub
true
-
crypto_key
LAbQdWWsbybjAY
-
internal_mutex
bbcAde
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
10
-
rootkit
false
-
startup_persistence
false
Signatures
-
Blocklisted process makes network request 18 IoCs
flow pid Process 4 2960 cmd.exe 5 2960 cmd.exe 6 2960 cmd.exe 8 2960 cmd.exe 9 2960 cmd.exe 10 2960 cmd.exe 11 2960 cmd.exe 12 2960 cmd.exe 13 2960 cmd.exe 16 2960 cmd.exe 17 2960 cmd.exe 18 2960 cmd.exe 19 2960 cmd.exe 20 2960 cmd.exe 21 2960 cmd.exe 23 2960 cmd.exe 25 2960 cmd.exe 26 2960 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2280 set thread context of 2960 2280 stubbed.exe 30 -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stubbed.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stubbed.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2280 stubbed.exe 2960 cmd.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2280 wrote to memory of 1740 2280 stubbed.exe 28 PID 2280 wrote to memory of 1740 2280 stubbed.exe 28 PID 2280 wrote to memory of 1740 2280 stubbed.exe 28 PID 2280 wrote to memory of 1740 2280 stubbed.exe 28 PID 2280 wrote to memory of 2944 2280 stubbed.exe 29 PID 2280 wrote to memory of 2944 2280 stubbed.exe 29 PID 2280 wrote to memory of 2944 2280 stubbed.exe 29 PID 2280 wrote to memory of 2944 2280 stubbed.exe 29 PID 2280 wrote to memory of 2960 2280 stubbed.exe 30 PID 2280 wrote to memory of 2960 2280 stubbed.exe 30 PID 2280 wrote to memory of 2960 2280 stubbed.exe 30 PID 2280 wrote to memory of 2960 2280 stubbed.exe 30 PID 2280 wrote to memory of 2960 2280 stubbed.exe 30 PID 2280 wrote to memory of 2960 2280 stubbed.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\stubbed.exe"C:\Users\Admin\AppData\Local\Temp\stubbed.exe"1⤵
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\cmd.execmd.exe2⤵PID:1740
-
-
C:\Windows\SysWOW64\cmd.execmd.exe2⤵PID:2944
-
-
C:\Windows\SysWOW64\cmd.execmd.exe2⤵
- Blocklisted process makes network request
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180B
MD5a7ca08ba00d1c7e6a90990dcf86b6495
SHA115bbb928f7e1be3f4c9a028778df1ce12b2e2bd6
SHA25602de97813b65efb3a29c44b3a5ac8f0b50bbe1ed3c76c05927f46b497e7f72b4
SHA5124d3ca54a28a7519edd22495130db8830ad7f19c5e612c91bdbf0b68065953699fcc524bae63be5dc62c8fd6e4ca6091dca290c17ca0da9dd8c42f04bf3187b9e
-
Filesize
60B
MD5f751ffd29eb83c2966a8f8548c06bf18
SHA1edcdf6bdc7832c1861b243dddb68467ad987cf39
SHA25644a125a9b4573232eea7f0ce386d7397c337b5fc2430db005b59eba32d00a07e
SHA512d5b91135d13412f588c6f2cbc541f7993e6979636949c20137d07137d9227f23ba4d82fb79a86c55fd244ccfebf9c721c7055d8aa8f07d3a281ed8d41223207e