Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2023 03:12
General
-
Target
stubbed.exe
-
Size
434KB
-
MD5
32779bb4eda0b1834dc50d88f4930c3e
-
SHA1
7041fb14c8593d2657d4244d6930a35a2745f96e
-
SHA256
8a93eabf56949eb69dc5c81a39645fec215d967d126751a8bb72e2f90a3c41c7
-
SHA512
aeb8e88e9b016df87228be72517694f1c382fde0e1f42bb3e91f0fba22ef8abc7298aec89cb8439d1c1bb20ae2429f1d4bee5a99f9fd78f4a8d7840ca856b0c8
-
SSDEEP
12288:ObfJmY1oCMa3Wyex7ykWynLSKJ13oqnuj/ro:O7bKCM0ax7ykWynLRJ1Y+uTro
Malware Config
Extracted
darkgate
http://sanibroadbandcommunicton.duckdns.org
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
5864
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_rawstub
true
-
crypto_key
LAbQdWWsbybjAY
-
internal_mutex
bbcAde
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
10
-
rootkit
false
-
startup_persistence
false
Signatures
-
Blocklisted process makes network request 18 IoCs
flow pid Process 33 1912 cmd.exe 34 1912 cmd.exe 36 1912 cmd.exe 43 1912 cmd.exe 52 1912 cmd.exe 61 1912 cmd.exe 67 1912 cmd.exe 68 1912 cmd.exe 72 1912 cmd.exe 73 1912 cmd.exe 74 1912 cmd.exe 75 1912 cmd.exe 76 1912 cmd.exe 77 1912 cmd.exe 79 1912 cmd.exe 80 1912 cmd.exe 85 1912 cmd.exe 87 1912 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1600 set thread context of 1912 1600 stubbed.exe 87 -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stubbed.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stubbed.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1600 stubbed.exe 1600 stubbed.exe 1912 cmd.exe 1912 cmd.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1600 wrote to memory of 1912 1600 stubbed.exe 87 PID 1600 wrote to memory of 1912 1600 stubbed.exe 87 PID 1600 wrote to memory of 1912 1600 stubbed.exe 87 PID 1600 wrote to memory of 1912 1600 stubbed.exe 87 PID 1600 wrote to memory of 1912 1600 stubbed.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\stubbed.exe"C:\Users\Admin\AppData\Local\Temp\stubbed.exe"1⤵
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\cmd.execmd.exe2⤵
- Blocklisted process makes network request
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180B
MD5210b63bad88b2989aa954cc1b4a18876
SHA162b11a4318947f1dd44ad9f093165c859d14efea
SHA256c9916fd1cba3b64a380bf5ed157a223a1bdf192c4324a043416d7c32bedeb89e
SHA5126460083b534d2e87ea5ffd2069252d61d6821ea577e20b968908cca4a37857b11600f6f901bc9e3bd6c2a13160c686735e032e98b34cf27faf58aeaf8c530104
-
Filesize
60B
MD5f751ffd29eb83c2966a8f8548c06bf18
SHA1edcdf6bdc7832c1861b243dddb68467ad987cf39
SHA25644a125a9b4573232eea7f0ce386d7397c337b5fc2430db005b59eba32d00a07e
SHA512d5b91135d13412f588c6f2cbc541f7993e6979636949c20137d07137d9227f23ba4d82fb79a86c55fd244ccfebf9c721c7055d8aa8f07d3a281ed8d41223207e