Analysis
-
max time kernel
120s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
01-12-2023 18:16
Static task
static1
Behavioral task
behavioral1
Sample
Lightshot.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Lightshot.dll
Resource
win10v2004-20231127-en
Behavioral task
behavioral3
Sample
Lightshot.exe
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
Lightshot.exe
Resource
win10v2004-20231127-en
Behavioral task
behavioral5
Sample
lightshot.hta
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
lightshot.hta
Resource
win10v2004-20231127-en
General
-
Target
Lightshot.dll
-
Size
2.7MB
-
MD5
d25a5b444336b66cc5f36437701b896b
-
SHA1
03a831d6c603b8ad1cc7b6c9fd1e6195bce56e4f
-
SHA256
6866488e8882873a60d2d94e3eb224ab005a5b9e9053146d2b6601b520673929
-
SHA512
6c45648054c0105df984be41bdc3a1124065976c2b5647e8c0b0ed7b98eb77208ec5527392c889c3b6bf33018d449f8cc625f7b37f04c7bdf47038ba95d8a473
-
SSDEEP
24576:dHZrhn7olvHbxA7qQCzt/s7ry5SnCo44Bg85mwFXyEOdT1ZAIe9ae/K4wMIQb6VF:dpqt7sU9s7r/HvCKPy
Malware Config
Extracted
darkgate
A11111
http://trans1ategooglecom.com
http://saintelzearlava.com
-
alternative_c2_port
8080
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_rawstub
true
-
crypto_key
XiOwgXyDLNDEpj
-
internal_mutex
txtMut
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
A11111
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
description pid Process procid_target PID 1448 created 1076 1448 Autoit3.exe 18 PID 1448 created 1076 1448 Autoit3.exe 18 PID 1448 created 1156 1448 Autoit3.exe 9 PID 1448 created 1076 1448 Autoit3.exe 18 PID 1448 created 1076 1448 Autoit3.exe 18 -
Executes dropped EXE 1 IoCs
pid Process 1448 Autoit3.exe -
Loads dropped DLL 1 IoCs
pid Process 2872 rundll32.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Autoit3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Autoit3.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1448 Autoit3.exe 1448 Autoit3.exe 1448 Autoit3.exe 1448 Autoit3.exe 1448 Autoit3.exe 1448 Autoit3.exe 1448 Autoit3.exe 1448 Autoit3.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1864 wrote to memory of 2872 1864 rundll32.exe 28 PID 1864 wrote to memory of 2872 1864 rundll32.exe 28 PID 1864 wrote to memory of 2872 1864 rundll32.exe 28 PID 1864 wrote to memory of 2872 1864 rundll32.exe 28 PID 1864 wrote to memory of 2872 1864 rundll32.exe 28 PID 1864 wrote to memory of 2872 1864 rundll32.exe 28 PID 1864 wrote to memory of 2872 1864 rundll32.exe 28 PID 2872 wrote to memory of 1448 2872 rundll32.exe 29 PID 2872 wrote to memory of 1448 2872 rundll32.exe 29 PID 2872 wrote to memory of 1448 2872 rundll32.exe 29 PID 2872 wrote to memory of 1448 2872 rundll32.exe 29
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1156
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Lightshot.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Lightshot.dll,#12⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2872 -
\??\c:\tmpp\Autoit3.exec:\tmpp\Autoit3.exe c:\tmpp\test.au33⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1448
-
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
872KB
MD5cb7ec6c3e69865e46e49a684146e6564
SHA1a0e464b16936f21bbd9100b9f46a52a10cd2d3e7
SHA25664bc6210dec442292df50dd58b8f7aaa6fcd49931cbb90609f439b86c527d343
SHA51261fe7fa083f82a207c6a464d0b946d97f050c7cea9ee944e56ff7f5ad87e6ff638052d4809aea9fe01591d5346d19f2b7231c36ca94d61778edb15d89efc16b0
-
Filesize
872KB
MD5cb7ec6c3e69865e46e49a684146e6564
SHA1a0e464b16936f21bbd9100b9f46a52a10cd2d3e7
SHA25664bc6210dec442292df50dd58b8f7aaa6fcd49931cbb90609f439b86c527d343
SHA51261fe7fa083f82a207c6a464d0b946d97f050c7cea9ee944e56ff7f5ad87e6ff638052d4809aea9fe01591d5346d19f2b7231c36ca94d61778edb15d89efc16b0
-
Filesize
492KB
MD5dbd1ca08a1b009d1abab3def6ffa967b
SHA1f05c604a879c9396f93f6857f84d6ba58734ae0f
SHA2561744c6621eeb65626f1d0c99ffcb11b61d61e1f1747e4e8310e3e0d921056bb1
SHA5126b28d83aee4eb2b219ed4e665f09bda8d32250b6b2d2a74b2f56243ce60b1a49aa570050b752bcbc27c4deff373d0ca8a6d968714813223648ec58c0a0f7d2cb
-
Filesize
872KB
MD5cb7ec6c3e69865e46e49a684146e6564
SHA1a0e464b16936f21bbd9100b9f46a52a10cd2d3e7
SHA25664bc6210dec442292df50dd58b8f7aaa6fcd49931cbb90609f439b86c527d343
SHA51261fe7fa083f82a207c6a464d0b946d97f050c7cea9ee944e56ff7f5ad87e6ff638052d4809aea9fe01591d5346d19f2b7231c36ca94d61778edb15d89efc16b0