Malware Analysis Report

2024-11-30 11:20

Sample ID 231101-nawp6sfd5z
Target 4360-111-0x0000000004590000-0x00000000048C2000-memory.dmp
SHA256 e2da9b2b37ad5b39de4f4491f8a805d44869b32d4b2563bf944dced4d0faa723
Tags
user_871236672 darkgate
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

e2da9b2b37ad5b39de4f4491f8a805d44869b32d4b2563bf944dced4d0faa723

Threat Level: Known bad

The file 4360-111-0x0000000004590000-0x00000000048C2000-memory.dmp was found to be: Known bad.

Malicious Activity Summary

user_871236672 darkgate

Darkgate family

Unsigned PE

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-11-01 11:12

Signatures

Darkgate family

darkgate

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-11-01 11:12

Reported

2023-11-01 11:14

Platform

win7-20231023-en

Max time kernel

122s

Max time network

127s

Command Line

"C:\Users\Admin\AppData\Local\Temp\4360-111-0x0000000004590000-0x00000000048C2000-memory.exe"

Signatures

N/A

Processes

C:\Users\Admin\AppData\Local\Temp\4360-111-0x0000000004590000-0x00000000048C2000-memory.exe

"C:\Users\Admin\AppData\Local\Temp\4360-111-0x0000000004590000-0x00000000048C2000-memory.exe"

Network

N/A

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2023-11-01 11:12

Reported

2023-11-01 11:14

Platform

win10v2004-20231020-en

Max time kernel

142s

Max time network

155s

Command Line

"C:\Users\Admin\AppData\Local\Temp\4360-111-0x0000000004590000-0x00000000048C2000-memory.exe"

Signatures

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeManageVolumePrivilege N/A C:\Windows\System32\svchost.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\4360-111-0x0000000004590000-0x00000000048C2000-memory.exe

"C:\Users\Admin\AppData\Local\Temp\4360-111-0x0000000004590000-0x00000000048C2000-memory.exe"

C:\Windows\system32\rundll32.exe

"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k UnistackSvcGroup

Network

Country Destination Domain Proto
US 8.8.8.8:53 4.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 208.194.73.20.in-addr.arpa udp
US 8.8.8.8:53 8.3.197.209.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.200:443 g.bing.com tcp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 39.142.81.104.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 135.1.85.104.in-addr.arpa udp
US 8.8.8.8:53 119.110.54.20.in-addr.arpa udp
US 8.8.8.8:53 146.78.124.51.in-addr.arpa udp
US 8.8.8.8:53 138.175.53.84.in-addr.arpa udp
US 8.8.8.8:53 126.23.238.8.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 1.208.79.178.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 27.73.42.20.in-addr.arpa udp

Files

memory/1756-0-0x000002889E340000-0x000002889E350000-memory.dmp

memory/1756-16-0x000002889E440000-0x000002889E450000-memory.dmp

memory/1756-32-0x00000288A6A20000-0x00000288A6A21000-memory.dmp

memory/1756-33-0x00000288A6A40000-0x00000288A6A41000-memory.dmp

memory/1756-34-0x00000288A6A40000-0x00000288A6A41000-memory.dmp

memory/1756-35-0x00000288A6A40000-0x00000288A6A41000-memory.dmp

memory/1756-36-0x00000288A6A40000-0x00000288A6A41000-memory.dmp

memory/1756-37-0x00000288A6A40000-0x00000288A6A41000-memory.dmp

memory/1756-38-0x00000288A6A40000-0x00000288A6A41000-memory.dmp

memory/1756-39-0x00000288A6A40000-0x00000288A6A41000-memory.dmp

memory/1756-40-0x00000288A6A40000-0x00000288A6A41000-memory.dmp

memory/1756-41-0x00000288A6A40000-0x00000288A6A41000-memory.dmp

memory/1756-42-0x00000288A6A40000-0x00000288A6A41000-memory.dmp

memory/1756-43-0x00000288A6670000-0x00000288A6671000-memory.dmp

memory/1756-44-0x00000288A6660000-0x00000288A6661000-memory.dmp

memory/1756-46-0x00000288A6670000-0x00000288A6671000-memory.dmp

memory/1756-49-0x00000288A6660000-0x00000288A6661000-memory.dmp

memory/1756-52-0x00000288A65A0000-0x00000288A65A1000-memory.dmp

memory/1756-64-0x00000288A67A0000-0x00000288A67A1000-memory.dmp

memory/1756-66-0x00000288A67B0000-0x00000288A67B1000-memory.dmp

memory/1756-67-0x00000288A67B0000-0x00000288A67B1000-memory.dmp

memory/1756-68-0x00000288A68C0000-0x00000288A68C1000-memory.dmp