Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14-10-2023 00:49
Behavioral task
behavioral1
Sample
00985db874d9177de4a18999f7a420260b3a4665ba2b5b32aa39433ef79819df_JC.exe
Resource
win7-20230831-en
General
-
Target
00985db874d9177de4a18999f7a420260b3a4665ba2b5b32aa39433ef79819df_JC.exe
-
Size
481KB
-
MD5
82c7c522cdc0901d92b51e3134694ce0
-
SHA1
16bdc73d5c8f7b2a9c88c67c5ffe65b54e6ce5dd
-
SHA256
00985db874d9177de4a18999f7a420260b3a4665ba2b5b32aa39433ef79819df
-
SHA512
dd9e2841ee24fe5c249408fa8df73840a018d158123d6769fd43190c95ddd0a9b246aaa764a6cc43e4f503723db23a30d903825b09e59eae8645d2f39797d3e1
-
SSDEEP
12288:h3UfhXnGqWoLl8NZdk85scA9t8WBvQog37MKMZyqnuQ/LmAg:hiWqWoaNZdk859A9t8WBQ937MKMZy+uL
Malware Config
Extracted
darkgate
general7
http://zochao.com
-
alternative_c2_port
9999
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
2351
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
true
-
crypter_dll
false
-
crypter_rawstub
false
-
crypto_key
ehxLJhIdOExtNE
-
internal_mutex
dcbCbK
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
general7
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3020 created 1092 3020 00985db874d9177de4a18999f7a420260b3a4665ba2b5b32aa39433ef79819df_JC.exe 3 -
Program crash 1 IoCs
pid pid_target Process procid_target 2608 3020 WerFault.exe 13 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 00985db874d9177de4a18999f7a420260b3a4665ba2b5b32aa39433ef79819df_JC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 00985db874d9177de4a18999f7a420260b3a4665ba2b5b32aa39433ef79819df_JC.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3020 00985db874d9177de4a18999f7a420260b3a4665ba2b5b32aa39433ef79819df_JC.exe 3020 00985db874d9177de4a18999f7a420260b3a4665ba2b5b32aa39433ef79819df_JC.exe 3020 00985db874d9177de4a18999f7a420260b3a4665ba2b5b32aa39433ef79819df_JC.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2188 3020 00985db874d9177de4a18999f7a420260b3a4665ba2b5b32aa39433ef79819df_JC.exe 30 PID 3020 wrote to memory of 2188 3020 00985db874d9177de4a18999f7a420260b3a4665ba2b5b32aa39433ef79819df_JC.exe 30 PID 3020 wrote to memory of 2188 3020 00985db874d9177de4a18999f7a420260b3a4665ba2b5b32aa39433ef79819df_JC.exe 30 PID 3020 wrote to memory of 2188 3020 00985db874d9177de4a18999f7a420260b3a4665ba2b5b32aa39433ef79819df_JC.exe 30 PID 3020 wrote to memory of 2608 3020 00985db874d9177de4a18999f7a420260b3a4665ba2b5b32aa39433ef79819df_JC.exe 31 PID 3020 wrote to memory of 2608 3020 00985db874d9177de4a18999f7a420260b3a4665ba2b5b32aa39433ef79819df_JC.exe 31 PID 3020 wrote to memory of 2608 3020 00985db874d9177de4a18999f7a420260b3a4665ba2b5b32aa39433ef79819df_JC.exe 31 PID 3020 wrote to memory of 2608 3020 00985db874d9177de4a18999f7a420260b3a4665ba2b5b32aa39433ef79819df_JC.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1092
-
C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"2⤵PID:2188
-
-
C:\Users\Admin\AppData\Local\Temp\00985db874d9177de4a18999f7a420260b3a4665ba2b5b32aa39433ef79819df_JC.exe"C:\Users\Admin\AppData\Local\Temp\00985db874d9177de4a18999f7a420260b3a4665ba2b5b32aa39433ef79819df_JC.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 2922⤵
- Program crash
PID:2608
-