Analysis
-
max time kernel
180s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 14:42
Behavioral task
behavioral1
Sample
stubbed.exe
Resource
win7-20230831-en
General
-
Target
stubbed.exe
-
Size
434KB
-
MD5
32779bb4eda0b1834dc50d88f4930c3e
-
SHA1
7041fb14c8593d2657d4244d6930a35a2745f96e
-
SHA256
8a93eabf56949eb69dc5c81a39645fec215d967d126751a8bb72e2f90a3c41c7
-
SHA512
aeb8e88e9b016df87228be72517694f1c382fde0e1f42bb3e91f0fba22ef8abc7298aec89cb8439d1c1bb20ae2429f1d4bee5a99f9fd78f4a8d7840ca856b0c8
-
SSDEEP
12288:ObfJmY1oCMa3Wyex7ykWynLSKJ13oqnuj/ro:O7bKCM0ax7ykWynLRJ1Y+uTro
Malware Config
Extracted
darkgate
http://sanibroadbandcommunicton.duckdns.org
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
5864
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_rawstub
true
-
crypto_key
LAbQdWWsbybjAY
-
internal_mutex
bbcAde
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
10
-
rootkit
false
-
startup_persistence
false
Signatures
-
Blocklisted process makes network request 16 IoCs
flow pid Process 2 4552 cmd.exe 3 4552 cmd.exe 4 4552 cmd.exe 8 4552 cmd.exe 33 4552 cmd.exe 55 4552 cmd.exe 61 4552 cmd.exe 70 4552 cmd.exe 77 4552 cmd.exe 81 4552 cmd.exe 82 4552 cmd.exe 90 4552 cmd.exe 92 4552 cmd.exe 94 4552 cmd.exe 95 4552 cmd.exe 97 4552 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1716 set thread context of 4552 1716 stubbed.exe 82 -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString cmd.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stubbed.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stubbed.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1716 stubbed.exe 1716 stubbed.exe 4552 cmd.exe 4552 cmd.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1716 wrote to memory of 4552 1716 stubbed.exe 82 PID 1716 wrote to memory of 4552 1716 stubbed.exe 82 PID 1716 wrote to memory of 4552 1716 stubbed.exe 82 PID 1716 wrote to memory of 4552 1716 stubbed.exe 82 PID 1716 wrote to memory of 4552 1716 stubbed.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\stubbed.exe"C:\Users\Admin\AppData\Local\Temp\stubbed.exe"1⤵
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\cmd.execmd.exe2⤵
- Blocklisted process makes network request
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180B
MD571d8ef7c54bf38e253097104f2ce60ae
SHA1790b8bc13c9d066b992bdddc9d145cd8ff892a68
SHA25642d2aad169efc10573ef03f103d36d6cb25e1fd19d118bcb29b8c7e4c2a94e76
SHA512cb79c1a668419ade17508e05eb5511ef52ce3957f1328f009c3b0a42ea70291065a5b991bbd0b2d9f96a0a35616b55b9db26b102812b0b7cd5704a79c95c7d92
-
Filesize
60B
MD5f751ffd29eb83c2966a8f8548c06bf18
SHA1edcdf6bdc7832c1861b243dddb68467ad987cf39
SHA25644a125a9b4573232eea7f0ce386d7397c337b5fc2430db005b59eba32d00a07e
SHA512d5b91135d13412f588c6f2cbc541f7993e6979636949c20137d07137d9227f23ba4d82fb79a86c55fd244ccfebf9c721c7055d8aa8f07d3a281ed8d41223207e