Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    10-11-2023 14:27

General

  • Target

    NEAS.893bb5ccc58e1d3ab7d2e28a5ecbf58195d10bc352f800b65d905c9655158439.msi

  • Size

    8.5MB

  • MD5

    be421d1cfaba686bcafee896c24b4b45

  • SHA1

    f89fe47d0ae4d708876e3e80c250eef6582f148b

  • SHA256

    893bb5ccc58e1d3ab7d2e28a5ecbf58195d10bc352f800b65d905c9655158439

  • SHA512

    74514c6a8920b9cb645d13f82228a6124487715ddc736661e1e86b1b141292fae6278f84dac7c81c3139823b8b505f1d09d31eafb0896c5ca7525f49bf9b65f7

  • SSDEEP

    196608:PeS5hV9/S6WXbfXlTrn7HZ5AQX3AveLukj1w9+MeLGW+x:PdhVs6WXjX9HZ5AQX32WDa8

Malware Config

Extracted

Family

darkgate

Botnet

ADS5

C2

http://siliconerumble.com

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    true

  • c2_port

    443

  • check_disk

    false

  • check_ram

    true

  • check_xeon

    true

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_rawstub

    true

  • crypto_key

    nZWkslxXPxaMte

  • internal_mutex

    txtMut

  • minimum_disk

    32

  • minimum_ram

    6005

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    ADS5

Signatures

  • DarkGate

    DarkGate is an infostealer written in C++.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 11 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 53 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\NEAS.893bb5ccc58e1d3ab7d2e28a5ecbf58195d10bc352f800b65d905c9655158439.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2944
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2880
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding DCC0D934036ED02729154779F456CFA5
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1556
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-68aef085-9bd3-4ec3-9811-dcc0d7cc9d19\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
        3⤵
        • Modifies file permissions
        PID:1056
      • C:\Windows\SysWOW64\EXPAND.EXE
        "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
        3⤵
        • Drops file in Windows directory
        PID:1564
      • C:\Users\Admin\AppData\Local\Temp\MW-68aef085-9bd3-4ec3-9811-dcc0d7cc9d19\files\windbg.exe
        "C:\Users\Admin\AppData\Local\Temp\MW-68aef085-9bd3-4ec3-9811-dcc0d7cc9d19\files\windbg.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2376
        • \??\c:\tmpa\Autoit3.exe
          c:\tmpa\Autoit3.exe c:\tmpa\script.au3
          4⤵
          • Executes dropped EXE
          • Checks processor information in registry
          PID:2872
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\Admin\AppData\Local\Temp\MW-68aef085-9bd3-4ec3-9811-dcc0d7cc9d19\files"
        3⤵
          PID:1784
        • C:\Windows\SysWOW64\ICACLS.EXE
          "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-68aef085-9bd3-4ec3-9811-dcc0d7cc9d19\." /SETINTEGRITYLEVEL (CI)(OI)LOW
          3⤵
          • Modifies file permissions
          PID:2916
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2244
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005C4" "00000000000004D4"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:2608

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\MW-68aef085-9bd3-4ec3-9811-dcc0d7cc9d19\files.cab

      Filesize

      8.2MB

      MD5

      9ef2066882c6378a97975c18f89b482b

      SHA1

      92cb2eefea833c60d6e9909769baae4f7c236195

      SHA256

      45d192bad5d434e424ee9198592a7151cb98dc4554cb7c9906c86f191f6b755a

      SHA512

      cd5f1deea259ff6289e4c60f4811e649da01f20962150cb22ef23ad7fdcaa32ffda7f6ca592db700c8682568c76a9267acd095090ed558ee73fb47044e549a9b

    • C:\Users\Admin\AppData\Local\Temp\MW-68aef085-9bd3-4ec3-9811-dcc0d7cc9d19\files\00004-~1.PNG

      Filesize

      1.1MB

      MD5

      2ccc17c1a5bb5e656e7f3bb09ff0beff

      SHA1

      05866cf7dd5fa99ea852b01c2791b30e7741ea19

      SHA256

      411b6ce9e97a4d828ab43dcf896f8ea09b5e9dc02874909f53ca1e0f10caeed2

      SHA512

      46b7362a2df870018707d89a7340ac0c07a2a357c504dbd944699c0231b4f984661b9f112b9d4869e55cf208ed5968f3ec5b5b35a956329679fb6e48ada7c4c5

    • C:\Users\Admin\AppData\Local\Temp\MW-68aef085-9bd3-4ec3-9811-dcc0d7cc9d19\files\00005-~1.PNG

      Filesize

      1.8MB

      MD5

      dee56d4f89c71ea6c4f1e75b82f2e9c9

      SHA1

      293ce531cddbf4034782d5dfed1e35c807d75c52

      SHA256

      a8f1ffb62d49d35a0f838f358614333e3d5d68ce5409fdfefcd1aa218d4639cf

      SHA512

      e8c38dc1d7a49d9cb919eae5294cc64379a933cdbd5427ed38c5f915271655f9bd6363e131f9d8a74ffdda23c7b155cc5200ddf999339ea611b98e74355faa0c

    • C:\Users\Admin\AppData\Local\Temp\MW-68aef085-9bd3-4ec3-9811-dcc0d7cc9d19\files\00006-~1.PNG

      Filesize

      1.8MB

      MD5

      173a98c6c7a166db7c3caa3a06fec06c

      SHA1

      3c562051f42353e72ba87b6f54744f6d0107df86

      SHA256

      212a80b3f8e68d00dbd8fc55fc8c4b30ee996348262d5d37e8b3f431a4b2fdad

      SHA512

      9dcd341937eff32762767d3538499d211f5a50fddb4e83d5d1afbeb87a5420c1fb9952ef2ecc744c460b7d53baa2bffbe99087a9f794d25ba78d1af61ea8b54d

    • C:\Users\Admin\AppData\Local\Temp\MW-68aef085-9bd3-4ec3-9811-dcc0d7cc9d19\files\00007-~1.PNG

      Filesize

      1.6MB

      MD5

      94b4895b7b8a60481393b7b8c22ad742

      SHA1

      902796c4aee78ab74e7ba5004625d797d83a8787

      SHA256

      f449409c8747d8e73ac7f8539c6e26d526ef51d267fed40eadce138389db5973

      SHA512

      d1ed6f5a1920eca041a683d71ac562058bc513877e3ae8be18888797d0713e25964c610428f9474d9b539097441002275e1f0023a565bd205cd4153ac282b61e

    • C:\Users\Admin\AppData\Local\Temp\MW-68aef085-9bd3-4ec3-9811-dcc0d7cc9d19\files\data.bin

      Filesize

      92KB

      MD5

      b3996eff179da39465dde1c61370ec05

      SHA1

      0d76bf1627a011a14de0b6fd9bfe9813d5c9b806

      SHA256

      fe4110e1573e0ad989a64ed92e40cf81c80e286d7f474acba89d8a9485a2e2e4

      SHA512

      1b938b4b3e08f32c7125e1f33e40ff2c943f792de385ed0e56edc4717b5935c425587ff25191c283581eebabf176b6a2e7af3405d3ffab586201177aae76e5b2

    • C:\Users\Admin\AppData\Local\Temp\MW-68aef085-9bd3-4ec3-9811-dcc0d7cc9d19\files\data2.bin

      Filesize

      1.8MB

      MD5

      cee302941b279784ec4aaee981748e47

      SHA1

      10a74d4a6a63930751abe514d896f35d6bcb5ae8

      SHA256

      176e09e654a36a174c52ad6ae5aa5b1e10ce276fc0fffbf04180a8fbbc1ceb32

      SHA512

      f55ce7f92e8b778d4028fc3f6162967bd014d885d4bd7e80759fa4e6d482794ca8d6883fc26798bf90ae8ec03c7bda893f56c0538c2734601809797f8818dfc4

    • C:\Users\Admin\AppData\Local\Temp\MW-68aef085-9bd3-4ec3-9811-dcc0d7cc9d19\files\dbgeng.dll

      Filesize

      1.9MB

      MD5

      66e9a858ad4a1dc41b24149195477d46

      SHA1

      9c091a74be0a617f5fc260a7e44b754d73d86ef8

      SHA256

      1fb20c70cc048e603dd747757b84913157c78deeca0799201f218efa8d4ada1e

      SHA512

      35c0872a235168ca18fab97aadde541d35082fbbd090bdb5a25cc6e7752c7e27bda4ac86ab0ce7c6b49bbabbaf3bd3b2fd9a29514fb49de58f2b2f54d50e9dc6

    • C:\Users\Admin\AppData\Local\Temp\MW-68aef085-9bd3-4ec3-9811-dcc0d7cc9d19\files\windbg.exe

      Filesize

      474KB

      MD5

      04ec4f58a1f4a87b5eeb1f4b7afc48e0

      SHA1

      58dcb1cbbec071d036a07f0e8feb858e4c5b96e7

      SHA256

      bd1af3dba56b129e6c624297eeed40c898fa2981fce5caafe467d88a748988a4

      SHA512

      5b572a504fac599e7e3f726d391e8ffdc2d083745609315a203000e8dc79b94d777fc520eb6530444d84f1ac9aad51406b91b527d8434077a58524feeccbbd80

    • C:\Users\Admin\AppData\Local\Temp\MW-68aef085-9bd3-4ec3-9811-dcc0d7cc9d19\files\windbg.exe

      Filesize

      474KB

      MD5

      04ec4f58a1f4a87b5eeb1f4b7afc48e0

      SHA1

      58dcb1cbbec071d036a07f0e8feb858e4c5b96e7

      SHA256

      bd1af3dba56b129e6c624297eeed40c898fa2981fce5caafe467d88a748988a4

      SHA512

      5b572a504fac599e7e3f726d391e8ffdc2d083745609315a203000e8dc79b94d777fc520eb6530444d84f1ac9aad51406b91b527d8434077a58524feeccbbd80

    • C:\Users\Admin\AppData\Local\Temp\MW-68aef085-9bd3-4ec3-9811-dcc0d7cc9d19\msiwrapper.ini

      Filesize

      370B

      MD5

      f0dd49a8cefd8317b6963063e37a9b30

      SHA1

      437c325d6934090fdcab6fc2e713160fe5f6b958

      SHA256

      2b84a9d71212fd1b9a4f43912dc0befee7807e2a3bea06eb25a5eb104af5ba9c

      SHA512

      cebaf1b0882783e57bf321aac2479b096548c4b37b9131661d3d9c112bda28a3c548bbd4018db06cf985b05e6fd534e2026e702855e474a7bd3e7dddd1486b0b

    • C:\Users\Admin\AppData\Local\Temp\MW-68aef085-9bd3-4ec3-9811-dcc0d7cc9d19\msiwrapper.ini

      Filesize

      1KB

      MD5

      66e57d6512fb3d8e0c93a24805b14b40

      SHA1

      f7e9f541de75792fee21e3895398e53f1b250cfc

      SHA256

      55b9d6d1483dbf3ad76afc1c4f77440d0c9e1984b3d6fea25049425b1217da6f

      SHA512

      16e9b23c8e75b6aff5f48fdd655e690f54757a36daa54fbc5003a39338bed3a055314ea9e83710cce770adc608826d9b6ceae7c5f1a246329b9777bd07f10f11

    • C:\Users\Admin\AppData\Local\Temp\MW-68aef085-9bd3-4ec3-9811-dcc0d7cc9d19\msiwrapper.ini

      Filesize

      1KB

      MD5

      66e57d6512fb3d8e0c93a24805b14b40

      SHA1

      f7e9f541de75792fee21e3895398e53f1b250cfc

      SHA256

      55b9d6d1483dbf3ad76afc1c4f77440d0c9e1984b3d6fea25049425b1217da6f

      SHA512

      16e9b23c8e75b6aff5f48fdd655e690f54757a36daa54fbc5003a39338bed3a055314ea9e83710cce770adc608826d9b6ceae7c5f1a246329b9777bd07f10f11

    • C:\Windows\Installer\MSIECBF.tmp

      Filesize

      208KB

      MD5

      d82b3fb861129c5d71f0cd2874f97216

      SHA1

      f3fe341d79224126e950d2691d574d147102b18d

      SHA256

      107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

      SHA512

      244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

    • C:\tmpa\Autoit3.exe

      Filesize

      872KB

      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • \??\c:\tmpa\script.au3

      Filesize

      502KB

      MD5

      b90622bf3e980bd62f8fbec24a3f9c7b

      SHA1

      b0af2387eadb6b54a826359fe97764022aa0f700

      SHA256

      3db87fa681abac74b44c8fafb73193b155c2c543b66c9f753f3ba6b455c4589e

      SHA512

      26ceba2c1d493c45722d06db0f2e770532a4fe525c1d822bf1520cd9fc1d104469d95c5bd48d86346100f986034fdc8920e91ef238c041b1f0574e8e72217433

    • \Users\Admin\AppData\Local\Temp\MW-68aef085-9bd3-4ec3-9811-dcc0d7cc9d19\files\dbgeng.dll

      Filesize

      1.9MB

      MD5

      66e9a858ad4a1dc41b24149195477d46

      SHA1

      9c091a74be0a617f5fc260a7e44b754d73d86ef8

      SHA256

      1fb20c70cc048e603dd747757b84913157c78deeca0799201f218efa8d4ada1e

      SHA512

      35c0872a235168ca18fab97aadde541d35082fbbd090bdb5a25cc6e7752c7e27bda4ac86ab0ce7c6b49bbabbaf3bd3b2fd9a29514fb49de58f2b2f54d50e9dc6

    • \Users\Admin\AppData\Local\Temp\MW-68aef085-9bd3-4ec3-9811-dcc0d7cc9d19\files\windbg.exe

      Filesize

      474KB

      MD5

      04ec4f58a1f4a87b5eeb1f4b7afc48e0

      SHA1

      58dcb1cbbec071d036a07f0e8feb858e4c5b96e7

      SHA256

      bd1af3dba56b129e6c624297eeed40c898fa2981fce5caafe467d88a748988a4

      SHA512

      5b572a504fac599e7e3f726d391e8ffdc2d083745609315a203000e8dc79b94d777fc520eb6530444d84f1ac9aad51406b91b527d8434077a58524feeccbbd80

    • \Users\Admin\AppData\Local\Temp\MW-68aef085-9bd3-4ec3-9811-dcc0d7cc9d19\files\windbg.exe

      Filesize

      474KB

      MD5

      04ec4f58a1f4a87b5eeb1f4b7afc48e0

      SHA1

      58dcb1cbbec071d036a07f0e8feb858e4c5b96e7

      SHA256

      bd1af3dba56b129e6c624297eeed40c898fa2981fce5caafe467d88a748988a4

      SHA512

      5b572a504fac599e7e3f726d391e8ffdc2d083745609315a203000e8dc79b94d777fc520eb6530444d84f1ac9aad51406b91b527d8434077a58524feeccbbd80

    • \Users\Admin\AppData\Local\Temp\MW-68aef085-9bd3-4ec3-9811-dcc0d7cc9d19\files\windbg.exe

      Filesize

      474KB

      MD5

      04ec4f58a1f4a87b5eeb1f4b7afc48e0

      SHA1

      58dcb1cbbec071d036a07f0e8feb858e4c5b96e7

      SHA256

      bd1af3dba56b129e6c624297eeed40c898fa2981fce5caafe467d88a748988a4

      SHA512

      5b572a504fac599e7e3f726d391e8ffdc2d083745609315a203000e8dc79b94d777fc520eb6530444d84f1ac9aad51406b91b527d8434077a58524feeccbbd80

    • \Users\Admin\AppData\Local\Temp\MW-68aef085-9bd3-4ec3-9811-dcc0d7cc9d19\files\windbg.exe

      Filesize

      474KB

      MD5

      04ec4f58a1f4a87b5eeb1f4b7afc48e0

      SHA1

      58dcb1cbbec071d036a07f0e8feb858e4c5b96e7

      SHA256

      bd1af3dba56b129e6c624297eeed40c898fa2981fce5caafe467d88a748988a4

      SHA512

      5b572a504fac599e7e3f726d391e8ffdc2d083745609315a203000e8dc79b94d777fc520eb6530444d84f1ac9aad51406b91b527d8434077a58524feeccbbd80

    • \Windows\Installer\MSIECBF.tmp

      Filesize

      208KB

      MD5

      d82b3fb861129c5d71f0cd2874f97216

      SHA1

      f3fe341d79224126e950d2691d574d147102b18d

      SHA256

      107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

      SHA512

      244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

    • \tmpa\Autoit3.exe

      Filesize

      872KB

      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • memory/2376-106-0x0000000000300000-0x000000000038A000-memory.dmp

      Filesize

      552KB

    • memory/2376-104-0x00000000007D0000-0x00000000009D0000-memory.dmp

      Filesize

      2.0MB

    • memory/2376-98-0x0000000000300000-0x000000000038A000-memory.dmp

      Filesize

      552KB

    • memory/2376-95-0x00000000007D0000-0x00000000009D0000-memory.dmp

      Filesize

      2.0MB

    • memory/2872-115-0x0000000000C13000-0x0000000000C21000-memory.dmp

      Filesize

      56KB

    • memory/2872-116-0x0000000002F30000-0x00000000030C5000-memory.dmp

      Filesize

      1.6MB