Analysis

  • max time kernel
    142s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-11-2023 21:36

General

  • Target

    8b6c6c007efa8e1a7da241564142f8a8a934dcce451c7e522cdd86292e81ead7.msi

  • Size

    8.7MB

  • MD5

    1170e2b02b92895d9db0be336d032d90

  • SHA1

    18f49619d69b057e81163bdf08eab5f355ce662c

  • SHA256

    8b6c6c007efa8e1a7da241564142f8a8a934dcce451c7e522cdd86292e81ead7

  • SHA512

    bd1ceeee7928592e318b7f28b557bfcb97e4bb8f65f8c09001f19a746c7532f4f9d86aa54aab2866b5852921aa04a4f8de18e6c9109cc91c94c34879013c0134

  • SSDEEP

    196608:YeS5hV9/S6WXbfXlTrn7HZ5AQX3AveLukj1w9cNzvhXoZJ+:YdhVs6WXjX9HZ5AQX32WD/oZY

Malware Config

Extracted

Family

darkgate

Botnet

user_871236672

C2

http://adhufdauifadhj13.com

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    true

  • c2_port

    2351

  • check_disk

    false

  • check_ram

    true

  • check_xeon

    true

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_rawstub

    true

  • crypto_key

    stanpttaHMuhnz

  • internal_mutex

    txtMut

  • minimum_disk

    40

  • minimum_ram

    6002

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    user_871236672

Signatures

  • DarkGate

    DarkGate is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 9 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 53 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\8b6c6c007efa8e1a7da241564142f8a8a934dcce451c7e522cdd86292e81ead7.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3800
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4728
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1616
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 7E689699230B4B1C0F38779ECB854C3E
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2436
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-1b945d5f-dcc1-4139-b3e6-85149c287cd4\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
        3⤵
        • Modifies file permissions
        PID:3888
      • C:\Windows\SysWOW64\EXPAND.EXE
        "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
        3⤵
          PID:1664
        • C:\Users\Admin\AppData\Local\Temp\MW-1b945d5f-dcc1-4139-b3e6-85149c287cd4\files\windbg.exe
          "C:\Users\Admin\AppData\Local\Temp\MW-1b945d5f-dcc1-4139-b3e6-85149c287cd4\files\windbg.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1488
          • \??\c:\tmpa\Autoit3.exe
            c:\tmpa\Autoit3.exe c:\tmpa\script.au3
            4⤵
            • Executes dropped EXE
            • Checks processor information in registry
            PID:1508
        • C:\Windows\SysWOW64\ICACLS.EXE
          "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-1b945d5f-dcc1-4139-b3e6-85149c287cd4\." /SETINTEGRITYLEVEL (CI)(OI)LOW
          3⤵
          • Modifies file permissions
          PID:2820
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:1692

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\MW-1b945d5f-dcc1-4139-b3e6-85149c287cd4\files.cab

      Filesize

      8.4MB

      MD5

      c2861c23df5ad7a31c8ae622dc87f867

      SHA1

      0c50bc37cbf26c1e91f34b4a617f7ad663c78b13

      SHA256

      beee92357f4f194dcb2dda5b751939cb7218a090cdf05266c24ba52fcf51f013

      SHA512

      81d756790c8b2c9c3c8ef487968a977cd630bbcd7aa809519fc7358643981b6025556443de2672e9b6d5f8b43611ff771b8a36f99003985aaa068105585a4eb3

    • C:\Users\Admin\AppData\Local\Temp\MW-1b945d5f-dcc1-4139-b3e6-85149c287cd4\msiwrapper.ini

      Filesize

      1010B

      MD5

      69436177ed037af310f80faaaec89d49

      SHA1

      aa680145a5ccf48772b15f972793cc1e76e8a388

      SHA256

      84da0af802426228ece6567e13cbfc435c51ae9564435cb77505acbbb574d6c2

      SHA512

      b5842ba7496178702f760336122d701ff845be47aa984e349bb02f37618be321416e6fef51ac163ccecbb9d4d94c2a3539395393175af2bb03a6e4c994b18c20

    • C:\Users\Admin\AppData\Local\Temp\MW-1b945d5f-dcc1-4139-b3e6-85149c287cd4\msiwrapper.ini

      Filesize

      1KB

      MD5

      a5b228caa1a1f5d21fc451335e831cb7

      SHA1

      108131532a97edc4083f2e7747c9cd6b0fab313d

      SHA256

      6e06f13e32a0610047d4ed0bac9e58dcc42069ab57871e186caada336135e979

      SHA512

      43ffd4a9cbf943d1e5a5237a8aba954bd157858079a63390a337ffdf02564962591a385656ca96efe1f8cafad44c95c468fecddf24b110dcc194256be3ffc352

    • C:\Users\Admin\AppData\Local\Temp\MW-1b945d5f-dcc1-4139-b3e6-85149c287cd4\msiwrapper.ini

      Filesize

      1KB

      MD5

      a5b228caa1a1f5d21fc451335e831cb7

      SHA1

      108131532a97edc4083f2e7747c9cd6b0fab313d

      SHA256

      6e06f13e32a0610047d4ed0bac9e58dcc42069ab57871e186caada336135e979

      SHA512

      43ffd4a9cbf943d1e5a5237a8aba954bd157858079a63390a337ffdf02564962591a385656ca96efe1f8cafad44c95c468fecddf24b110dcc194256be3ffc352

    • C:\Users\Admin\AppData\Local\Temp\MW-1b945d5f-dcc1-4139-b3e6-85149c287cd4\msiwrapper.ini

      Filesize

      1KB

      MD5

      ed6734e27e6586f547c08bb89c8549eb

      SHA1

      51757c49266c70f36cfd460b7732c48af1345828

      SHA256

      deb94c9908f2d6d7666305889fd67774ae877dd184782f5575e5a642e13b3f3d

      SHA512

      3a104f523dfa229f6b3c97137942ccbdece420c1b176ff660cb170f7935b0cf7f203ec990187a50b183be4e92289bf7e06677bf1ff66de1626aa76e1d14197c3

    • C:\Windows\Installer\MSI3BDB.tmp

      Filesize

      208KB

      MD5

      d82b3fb861129c5d71f0cd2874f97216

      SHA1

      f3fe341d79224126e950d2691d574d147102b18d

      SHA256

      107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

      SHA512

      244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

    • C:\Windows\Installer\MSI3BDB.tmp

      Filesize

      208KB

      MD5

      d82b3fb861129c5d71f0cd2874f97216

      SHA1

      f3fe341d79224126e950d2691d574d147102b18d

      SHA256

      107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

      SHA512

      244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

    • C:\Windows\Installer\MSI4F94.tmp

      Filesize

      208KB

      MD5

      d82b3fb861129c5d71f0cd2874f97216

      SHA1

      f3fe341d79224126e950d2691d574d147102b18d

      SHA256

      107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

      SHA512

      244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

    • C:\Windows\Installer\MSI4F94.tmp

      Filesize

      208KB

      MD5

      d82b3fb861129c5d71f0cd2874f97216

      SHA1

      f3fe341d79224126e950d2691d574d147102b18d

      SHA256

      107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

      SHA512

      244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

    • C:\tmpa\Autoit3.exe

      Filesize

      872KB

      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      23.0MB

      MD5

      5d6fba9a0afc855548814a0be3b53bfa

      SHA1

      952d0064fbcc702bd92459b46287419f29ad5830

      SHA256

      688a455260fff1236429d57fc9ae6ccaea9f3e87fadf474cb8cbf3389acf0b83

      SHA512

      baeb2826a8e1f46cd61b253d73ee057e7959d6b6329330668d1368b2093405ef98ed261552a60dfc04b09ab10761b985d3c78e2e7408acfa129a0a66aa01f005

    • \??\Volume{88fae604-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{6009a313-1d4f-4895-b6f4-e6673c96fff3}_OnDiskSnapshotProp

      Filesize

      5KB

      MD5

      f8c38b6c22008f915119b7c5ec418903

      SHA1

      6ed901dfa2c8b37aa7ae9bdb3760a80b9522568e

      SHA256

      c39681947a0b37410f00261047fafb90d4d49046748f55c0b16bc5513b203c4b

      SHA512

      874b2844ba440222f08f16cb89c1efd6c66f3eed851d3b60c3e80ba6f37b62445aa3e6762a51604ad3e116265564f1833fb31f8123264e00dde7b1df6fba5aea

    • \??\c:\tmpa\script.au3

      Filesize

      698KB

      MD5

      74de66e9523816a5b1dfbdb31b56cb3b

      SHA1

      9b0bd88932223c819d2c10d5739abdaf4f1a3cec

      SHA256

      91323b304dead6738f2652334e01bc2219751ea749501cf53f2f04573cd7cdd2

      SHA512

      21da2c017084db3e74447dd95478b4984a99494b8792ebde07fee9ed3c9114abe3491532bb89da47736098de8aa0e76e8313a28e26dca581f284fcc5b2e1df5a

    • memory/1488-67-0x0000000000400000-0x0000000000600000-memory.dmp

      Filesize

      2.0MB

    • memory/1488-68-0x0000000002E30000-0x0000000002EBA000-memory.dmp

      Filesize

      552KB

    • memory/1488-62-0x0000000002E30000-0x0000000002EBA000-memory.dmp

      Filesize

      552KB

    • memory/1508-71-0x0000000004710000-0x00000000048A5000-memory.dmp

      Filesize

      1.6MB

    • memory/1508-72-0x0000000003D90000-0x0000000004190000-memory.dmp

      Filesize

      4.0MB