Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-11-2023 01:12

General

  • Target

    1e070c7d2e26a.msi

  • Size

    8.5MB

  • MD5

    d63fda12b0bcaa5f916d6ee1d1b64315

  • SHA1

    8ec3ecd34f9e62a628c9a75744df348820d1ea2a

  • SHA256

    b2e6c0a826feb05452e6c2377fd0e365c269906c964d2ec7cc45b8608c49137e

  • SHA512

    9c13f112b5ca21332837954357bde4d1cc626e4d928cfbb5caad5a74595081fe82f39e85ff5f2107b81b1eb895f985459a83928762fdfbb8bee8642933a6ce9c

  • SSDEEP

    196608:SeS5hV9/S6WXbfXlTrn7HZ5AQX3AveLukj1w9wiVIu653rGDRBX/:SdhVs6WXjX9HZ5AQX32WDSVo5bKBX/

Malware Config

Extracted

Family

darkgate

Botnet

PLEX

C2

http://homeservicetreking.com

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    true

  • c2_port

    8443

  • check_disk

    false

  • check_ram

    true

  • check_xeon

    true

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_rawstub

    true

  • crypto_key

    UxRmvbdCWVKFVZ

  • internal_mutex

    txtMut

  • minimum_disk

    20

  • minimum_ram

    6000

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    PLEX

Signatures

  • DarkGate

    DarkGate is an infostealer written in C++.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 11 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 53 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\1e070c7d2e26a.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4108
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4104
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1752
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 83577C9C4A2FCD949247C36ABA2FD1F1
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2688
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-64cb37a8-53a2-4512-8976-1452835ddc11\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
        3⤵
        • Modifies file permissions
        PID:3092
      • C:\Windows\SysWOW64\EXPAND.EXE
        "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
        3⤵
        • Drops file in Windows directory
        PID:4976
      • C:\Users\Admin\AppData\Local\Temp\MW-64cb37a8-53a2-4512-8976-1452835ddc11\files\windbg.exe
        "C:\Users\Admin\AppData\Local\Temp\MW-64cb37a8-53a2-4512-8976-1452835ddc11\files\windbg.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:3236
        • \??\c:\tmpa\Autoit3.exe
          c:\tmpa\Autoit3.exe c:\tmpa\script.au3
          4⤵
          • Executes dropped EXE
          • Checks processor information in registry
          PID:1300
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-64cb37a8-53a2-4512-8976-1452835ddc11\." /SETINTEGRITYLEVEL (CI)(OI)LOW
        3⤵
        • Modifies file permissions
        PID:2580
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:376

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

File and Directory Permissions Modification

1
T1222

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

3
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MW-64cb37a8-53a2-4512-8976-1452835ddc11\files.cab
    Filesize

    8.3MB

    MD5

    95bc65caa64ad58cfd30c87fb13fec37

    SHA1

    539d20551c1467f37dfb1d3723025c190c0bb493

    SHA256

    fcc1093485b69f3e9d9457ddd58206f018fe96bbb667c73c2fbc845a4c358206

    SHA512

    77153ec463ba754b93931081ae8290ec282c03841ffc32d22e6901d7e8c170138c4fb8282220b9cdd956a00bb5a42859419f8ded97db9ce26dd19c02b765aac0

  • C:\Users\Admin\AppData\Local\Temp\MW-64cb37a8-53a2-4512-8976-1452835ddc11\files\00004-4001132497.png
    Filesize

    1.1MB

    MD5

    2ccc17c1a5bb5e656e7f3bb09ff0beff

    SHA1

    05866cf7dd5fa99ea852b01c2791b30e7741ea19

    SHA256

    411b6ce9e97a4d828ab43dcf896f8ea09b5e9dc02874909f53ca1e0f10caeed2

    SHA512

    46b7362a2df870018707d89a7340ac0c07a2a357c504dbd944699c0231b4f984661b9f112b9d4869e55cf208ed5968f3ec5b5b35a956329679fb6e48ada7c4c5

  • C:\Users\Admin\AppData\Local\Temp\MW-64cb37a8-53a2-4512-8976-1452835ddc11\files\00005-3546315028.png
    Filesize

    1.8MB

    MD5

    dee56d4f89c71ea6c4f1e75b82f2e9c9

    SHA1

    293ce531cddbf4034782d5dfed1e35c807d75c52

    SHA256

    a8f1ffb62d49d35a0f838f358614333e3d5d68ce5409fdfefcd1aa218d4639cf

    SHA512

    e8c38dc1d7a49d9cb919eae5294cc64379a933cdbd5427ed38c5f915271655f9bd6363e131f9d8a74ffdda23c7b155cc5200ddf999339ea611b98e74355faa0c

  • C:\Users\Admin\AppData\Local\Temp\MW-64cb37a8-53a2-4512-8976-1452835ddc11\files\00006-3546315029.png
    Filesize

    1.8MB

    MD5

    173a98c6c7a166db7c3caa3a06fec06c

    SHA1

    3c562051f42353e72ba87b6f54744f6d0107df86

    SHA256

    212a80b3f8e68d00dbd8fc55fc8c4b30ee996348262d5d37e8b3f431a4b2fdad

    SHA512

    9dcd341937eff32762767d3538499d211f5a50fddb4e83d5d1afbeb87a5420c1fb9952ef2ecc744c460b7d53baa2bffbe99087a9f794d25ba78d1af61ea8b54d

  • C:\Users\Admin\AppData\Local\Temp\MW-64cb37a8-53a2-4512-8976-1452835ddc11\files\00007-3546315030.png
    Filesize

    1.6MB

    MD5

    94b4895b7b8a60481393b7b8c22ad742

    SHA1

    902796c4aee78ab74e7ba5004625d797d83a8787

    SHA256

    f449409c8747d8e73ac7f8539c6e26d526ef51d267fed40eadce138389db5973

    SHA512

    d1ed6f5a1920eca041a683d71ac562058bc513877e3ae8be18888797d0713e25964c610428f9474d9b539097441002275e1f0023a565bd205cd4153ac282b61e

  • C:\Users\Admin\AppData\Local\Temp\MW-64cb37a8-53a2-4512-8976-1452835ddc11\files\data.bin
    Filesize

    92KB

    MD5

    175da1ba3139e5196fab23f1631c5c5d

    SHA1

    6174d9b24e149418e08af79045b1d8eb1dd03b99

    SHA256

    85ddfeabb5d31a71c1297d7d6c894ca915de9d267f345cafa5871a2701ae8894

    SHA512

    6271c5058442e0530f6df451761c4489493f8320518447aaea3b89e20430fa2291c99493b11389bfcd0b3da0ecbb4c5a85ace69c0c2f081db74a97274c2a2ebd

  • C:\Users\Admin\AppData\Local\Temp\MW-64cb37a8-53a2-4512-8976-1452835ddc11\files\data2.bin
    Filesize

    1.8MB

    MD5

    6789c4500f158ea0a20356a2ec530cae

    SHA1

    df8642ade1e4b2bf0e623ddd54d02c2952f78f07

    SHA256

    3abd9c5ad3e43ec44ce355a0b378aa5596988ae4fa5e32eeb124515fdac52773

    SHA512

    2bc9c1b448d28311182bbdd4c5dd6522b3d694907ce58da31e7b3a14fc01b3f532032d568dc83a5cf75bdc3d978c2298d2087793adb7d03763fe9dc0a3bf2491

  • C:\Users\Admin\AppData\Local\Temp\MW-64cb37a8-53a2-4512-8976-1452835ddc11\files\dbgeng.dll
    Filesize

    1.9MB

    MD5

    893fd607902a4cebceb787ddce21d35e

    SHA1

    51c7998af63844396e78ac802cef86e7b8bba0b8

    SHA256

    b6a092efcbb8883009dddd855af3d006a691ca533c421676348ebc7018a03898

    SHA512

    7a114093b672ce214e1bf3add84f24b98dc9bdb5e9691fb4b06394e038e201c3b2241b34f2c548d4454067cd51a6dc787e023c05a180d89c6ecd9b261651bbbc

  • C:\Users\Admin\AppData\Local\Temp\MW-64cb37a8-53a2-4512-8976-1452835ddc11\files\dbgeng.dll
    Filesize

    1.9MB

    MD5

    893fd607902a4cebceb787ddce21d35e

    SHA1

    51c7998af63844396e78ac802cef86e7b8bba0b8

    SHA256

    b6a092efcbb8883009dddd855af3d006a691ca533c421676348ebc7018a03898

    SHA512

    7a114093b672ce214e1bf3add84f24b98dc9bdb5e9691fb4b06394e038e201c3b2241b34f2c548d4454067cd51a6dc787e023c05a180d89c6ecd9b261651bbbc

  • C:\Users\Admin\AppData\Local\Temp\MW-64cb37a8-53a2-4512-8976-1452835ddc11\files\dbgeng.dll
    Filesize

    1.9MB

    MD5

    893fd607902a4cebceb787ddce21d35e

    SHA1

    51c7998af63844396e78ac802cef86e7b8bba0b8

    SHA256

    b6a092efcbb8883009dddd855af3d006a691ca533c421676348ebc7018a03898

    SHA512

    7a114093b672ce214e1bf3add84f24b98dc9bdb5e9691fb4b06394e038e201c3b2241b34f2c548d4454067cd51a6dc787e023c05a180d89c6ecd9b261651bbbc

  • C:\Users\Admin\AppData\Local\Temp\MW-64cb37a8-53a2-4512-8976-1452835ddc11\files\windbg.exe
    Filesize

    474KB

    MD5

    04ec4f58a1f4a87b5eeb1f4b7afc48e0

    SHA1

    58dcb1cbbec071d036a07f0e8feb858e4c5b96e7

    SHA256

    bd1af3dba56b129e6c624297eeed40c898fa2981fce5caafe467d88a748988a4

    SHA512

    5b572a504fac599e7e3f726d391e8ffdc2d083745609315a203000e8dc79b94d777fc520eb6530444d84f1ac9aad51406b91b527d8434077a58524feeccbbd80

  • C:\Users\Admin\AppData\Local\Temp\MW-64cb37a8-53a2-4512-8976-1452835ddc11\files\windbg.exe
    Filesize

    474KB

    MD5

    04ec4f58a1f4a87b5eeb1f4b7afc48e0

    SHA1

    58dcb1cbbec071d036a07f0e8feb858e4c5b96e7

    SHA256

    bd1af3dba56b129e6c624297eeed40c898fa2981fce5caafe467d88a748988a4

    SHA512

    5b572a504fac599e7e3f726d391e8ffdc2d083745609315a203000e8dc79b94d777fc520eb6530444d84f1ac9aad51406b91b527d8434077a58524feeccbbd80

  • C:\Users\Admin\AppData\Local\Temp\MW-64cb37a8-53a2-4512-8976-1452835ddc11\msiwrapper.ini
    Filesize

    1KB

    MD5

    dc086ae7a217b667449ef8ab76cfa4ca

    SHA1

    ee7901c9e442de259684be4d6b86920aaeb8699f

    SHA256

    76f3924942e98805bdb2aef00dec7b5546bd0a9686299b0434b6ca9daad72af9

    SHA512

    782c85b1ba422ae5d3dac2b7496a0d66d3dd2a5f1280f4a3af943c1a3d03c614460cd6c486d678380cbfe592901eb51c310e4140e8d19ca3eca6fdd873521cde

  • C:\Users\Admin\AppData\Local\Temp\MW-64cb37a8-53a2-4512-8976-1452835ddc11\msiwrapper.ini
    Filesize

    370B

    MD5

    d0ed1c838a17fc3dc48935d3630dea2f

    SHA1

    4e27f33c14ab69addbb6b11bd9a0771c230b8984

    SHA256

    272cd21eaf976abc6843ca1960ab97bde7027544e1b2667209a0378cf62ce36c

    SHA512

    833684bfb13ca46e40fc172049122f178f73e680b3bbcefc39ecf2e537905bc78339b8310e5733f010776c3dc04e92c8ed79cc938bc4741d361b34c928181777

  • C:\Users\Admin\AppData\Local\Temp\MW-64cb37a8-53a2-4512-8976-1452835ddc11\msiwrapper.ini
    Filesize

    1010B

    MD5

    187da1d03086cd06ad5d386c553d570d

    SHA1

    db59725d177d644292b4b3bf509ce3d5e8df97a3

    SHA256

    d0739d851916eefcf697fa90d9d85b5ef136942c08d92cee202d3c6b43949584

    SHA512

    4d6130367fe5e801c1afd03448c7fbc55f9359e91e31be4943670bda3ffa5c4b781db5646cd7c227e34d42147a3b1b0fffd2f8f9536c311dc8d59b185e7a2e39

  • C:\Users\Admin\AppData\Local\Temp\MW-64cb37a8-53a2-4512-8976-1452835ddc11\msiwrapper.ini
    Filesize

    1KB

    MD5

    5df0d964b46829e1f3b2d551a8f63fce

    SHA1

    3642c384f493335167262cec9038491931341c06

    SHA256

    778e3c589771b54c57b31b301f5efc5443055c24d6c66dbc529b05953ab40f8f

    SHA512

    70abf229e4474f18cdea0d96fdce5e48fc6437568af7c36d9f9edceaa30dca6f3a27eeabbf9dc3b35ae30da882729f030bc692c69fe8a74ee400dc146b72c7e1

  • C:\Users\Admin\AppData\Local\Temp\MW-64cb37a8-53a2-4512-8976-1452835ddc11\msiwrapper.ini
    Filesize

    1KB

    MD5

    5df0d964b46829e1f3b2d551a8f63fce

    SHA1

    3642c384f493335167262cec9038491931341c06

    SHA256

    778e3c589771b54c57b31b301f5efc5443055c24d6c66dbc529b05953ab40f8f

    SHA512

    70abf229e4474f18cdea0d96fdce5e48fc6437568af7c36d9f9edceaa30dca6f3a27eeabbf9dc3b35ae30da882729f030bc692c69fe8a74ee400dc146b72c7e1

  • C:\Windows\Installer\MSI6548.tmp
    Filesize

    208KB

    MD5

    d82b3fb861129c5d71f0cd2874f97216

    SHA1

    f3fe341d79224126e950d2691d574d147102b18d

    SHA256

    107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

    SHA512

    244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

  • C:\Windows\Installer\MSI6548.tmp
    Filesize

    208KB

    MD5

    d82b3fb861129c5d71f0cd2874f97216

    SHA1

    f3fe341d79224126e950d2691d574d147102b18d

    SHA256

    107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

    SHA512

    244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

  • C:\Windows\Installer\MSI8EAC.tmp
    Filesize

    208KB

    MD5

    d82b3fb861129c5d71f0cd2874f97216

    SHA1

    f3fe341d79224126e950d2691d574d147102b18d

    SHA256

    107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

    SHA512

    244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

  • C:\Windows\Installer\MSI8EAC.tmp
    Filesize

    208KB

    MD5

    d82b3fb861129c5d71f0cd2874f97216

    SHA1

    f3fe341d79224126e950d2691d574d147102b18d

    SHA256

    107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

    SHA512

    244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

  • C:\tmpa\Autoit3.exe
    Filesize

    872KB

    MD5

    c56b5f0201a3b3de53e561fe76912bfd

    SHA1

    2a4062e10a5de813f5688221dbeb3f3ff33eb417

    SHA256

    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

    SHA512

    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

  • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2
    Filesize

    23.0MB

    MD5

    6e29c11e6552b7aab72d118afcf5770d

    SHA1

    fdce3955f22f009a9fb2538d18fe554b354368e4

    SHA256

    6a82083d09d4f264380fc265008f358fa8a9d02a3c4a3abb23efaca3017629d1

    SHA512

    7653f55151fe8fcdd3b8a85999847520e58245c4f2152cfa9df81c7dfdc22020b66649f4a57f1f6168daed6c87ff76e418eb4a975e2936124ad7d4ab670d7a5a

  • \??\Volume{03226c32-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{39433c2b-66c0-465b-bfe7-095580655b3b}_OnDiskSnapshotProp
    Filesize

    5KB

    MD5

    517f015c4b1b31560ccdf33765681daa

    SHA1

    88dc329409926b26932bdf175d6223203036ceb4

    SHA256

    36a9689cd64d8496dd1dd9b035c9c9bcab7c4ee422f2a5cd8b4b9f681114e066

    SHA512

    2f32242f0aed3ca0ab4bee6961ebc17411bb370a2f2244e9964b51cb2a5c29bf99aa19738bd0e1e2a286946f8322f7f86ba3e967368f37cda7bb5d65a4509415

  • \??\c:\tmpa\script.au3
    Filesize

    525KB

    MD5

    8d68640ef1f8448ffb3431f5c757b4cb

    SHA1

    4a961594137184fdd5c9fbe22bef77a6384c3d40

    SHA256

    147406be6ee73373bb9e1650a3be6a5919d973647ededaf3018be51c29e9fdf3

    SHA512

    148c3b3ff25d208652ba24e35e0bd7f9f914e7682b18efe2ba2c9fdaabe2ee0f20aa6e7607af9e66f92cf8c905f0420deca354269332b44b217281fd0af4fceb

  • memory/1300-119-0x0000000003350000-0x0000000003450000-memory.dmp
    Filesize

    1024KB

  • memory/1300-120-0x0000000003A30000-0x0000000003BC5000-memory.dmp
    Filesize

    1.6MB

  • memory/1300-121-0x0000000003A30000-0x0000000003BC5000-memory.dmp
    Filesize

    1.6MB

  • memory/3236-107-0x0000000002490000-0x000000000251A000-memory.dmp
    Filesize

    552KB

  • memory/3236-106-0x00000000007F0000-0x00000000009F0000-memory.dmp
    Filesize

    2.0MB

  • memory/3236-96-0x00000000007F0000-0x00000000009F0000-memory.dmp
    Filesize

    2.0MB

  • memory/3236-99-0x0000000002490000-0x000000000251A000-memory.dmp
    Filesize

    552KB