Analysis

  • max time kernel
    146s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    02-02-2024 01:13

General

  • Target

    ea673e0e6986e41a73c19dd2a9cfde3d2d4186ef52c23c1253dde2d54faca7b3.msi

  • Size

    3.7MB

  • MD5

    426a59cd5e215e9f3696c1dcc8455d20

  • SHA1

    255d113da1dc32c3b341e643c01e9f5a13e060de

  • SHA256

    ea673e0e6986e41a73c19dd2a9cfde3d2d4186ef52c23c1253dde2d54faca7b3

  • SHA512

    4b684a97aa6d3b08459b69fb610b6ad5458de56c056f79e91e164cd8914f58ed8734ea4493bbac42c18982a80ffea30d6ba4306ef722bafc49debd4b0f68540a

  • SSDEEP

    49152:TpUPbczduZ0Yx87nxODZGMFLnd+A1m4wcMO6XOf4BmCk2ZlZ:Tp1BB7nxOtFjfBwpOff4BmCk2Zl

Malware Config

Signatures

  • DarkGate

    DarkGate is an infostealer written in C++.

  • Detect DarkGate stealer 2 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 15 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 53 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\ea673e0e6986e41a73c19dd2a9cfde3d2d4186ef52c23c1253dde2d54faca7b3.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1152
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding DB032785993C818CC9960FE9A8C0D9A1
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2884
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-5bb5cfd4-cc8c-4922-ae4a-9ffaa0124967\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
        3⤵
        • Modifies file permissions
        PID:1252
      • C:\Windows\SysWOW64\EXPAND.EXE
        "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
        3⤵
        • Drops file in Windows directory
        PID:912
      • C:\Users\Admin\AppData\Local\Temp\MW-5bb5cfd4-cc8c-4922-ae4a-9ffaa0124967\files\apdproxy.exe
        "C:\Users\Admin\AppData\Local\Temp\MW-5bb5cfd4-cc8c-4922-ae4a-9ffaa0124967\files\apdproxy.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1136
        • \??\c:\temp\Autoit3.exe
          "c:\temp\Autoit3.exe" c:\temp\script.au3
          4⤵
          • Executes dropped EXE
          • Checks processor information in registry
          PID:2148
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1136 -s 164
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1656
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2800
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005C0" "00000000000003AC"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MW-5bb5cfd4-cc8c-4922-ae4a-9ffaa0124967\files.cab

    Filesize

    3.4MB

    MD5

    2bff42a75bcda5b313b7b91261c9d85f

    SHA1

    de1be1be23a3c1d6b410c6af154d19e1e15da388

    SHA256

    b860f09732fad08ddb048b0322bc5df1a61fe7859dd91f6ca769a972bac4f5f3

    SHA512

    1056f0b1e68b4030d916cdff8fe2c1b20110fa05db6457aff6b10b93ff27c7f16eb8506469746fc19e67556ed21af094afdbaba5f1ee56f5c4c2c74a96e4bdaa

  • C:\Users\Admin\AppData\Local\Temp\MW-5bb5cfd4-cc8c-4922-ae4a-9ffaa0124967\files\MSVCP71.dll

    Filesize

    488KB

    MD5

    561fa2abb31dfa8fab762145f81667c2

    SHA1

    c8ccb04eedac821a13fae314a2435192860c72b8

    SHA256

    df96156f6a548fd6fe5672918de5ae4509d3c810a57bffd2a91de45a3ed5b23b

    SHA512

    7d960aa8e3cce22d63a6723d7f00c195de7de83b877eca126e339e2d8cc9859e813e05c5c0a5671a75bb717243e9295fd13e5e17d8c6660eb59f5baee63a7c43

  • C:\Users\Admin\AppData\Local\Temp\MW-5bb5cfd4-cc8c-4922-ae4a-9ffaa0124967\files\MSVCR71.dll

    Filesize

    340KB

    MD5

    86f1895ae8c5e8b17d99ece768a70732

    SHA1

    d5502a1d00787d68f548ddeebbde1eca5e2b38ca

    SHA256

    8094af5ee310714caebccaeee7769ffb08048503ba478b879edfef5f1a24fefe

    SHA512

    3b7ce2b67056b6e005472b73447d2226677a8cadae70428873f7efa5ed11a3b3dbf6b1a42c5b05b1f2b1d8e06ff50dfc6532f043af8452ed87687eefbf1791da

  • C:\Users\Admin\AppData\Local\Temp\MW-5bb5cfd4-cc8c-4922-ae4a-9ffaa0124967\files\apdboot.dll

    Filesize

    931KB

    MD5

    884e21631c0b78aea630fbe540d84778

    SHA1

    a9f4eea988debc35d0aa60efbdee6708c2cc1655

    SHA256

    51d197826bb62d23d4d926c914409ea8c66de149418cdd43137ddf1cafffe347

    SHA512

    2ab6994e822f6174f10264c70d02857a8eb47ddc9f10b414f2e314d5f5d996bd50886a47f58eafffec6f8b823b6d14715320a9f6e332934801182d57e298b714

  • C:\Users\Admin\AppData\Local\Temp\MW-5bb5cfd4-cc8c-4922-ae4a-9ffaa0124967\files\apdproxy.exe

    Filesize

    62KB

    MD5

    fc9e59fe8bc4fe05382cff5c8fc59de1

    SHA1

    69423bc900644a910936d2c5828348d188e5d750

    SHA256

    a16b93c374e77f98889d7ad7f38b2282dbc5a40511541b9105b1dcf9216c3cf3

    SHA512

    1d34be70cd701b606873aaf6910ab7fa7a3c4a81e0398d9bdcf8e8aac3dd63ec888c478e45600bf7e34301bec231038e8dccb457e49db8b5ff1c0740b68d072c

  • C:\Users\Admin\AppData\Local\Temp\MW-5bb5cfd4-cc8c-4922-ae4a-9ffaa0124967\files\sqlite3.dll

    Filesize

    1.6MB

    MD5

    13914f35fce12f03d0a3f3eda68b1b8e

    SHA1

    5490e690e87d944bf5186d13e5f3a5a23d0c350f

    SHA256

    b6c0d1c8dfb907ce2d5bc7e493cfb1c5e1940f200475327dded1d3390c1d5c96

    SHA512

    ac06235fd132b36a80979f34aab4b382de3e33f0d91cdc8a94c9da09e7fbd65c13ae52dcf191671e46d9f390e62471a2c509fee81c666f4904e4a2e231e4d0ce

  • C:\Users\Admin\AppData\Local\Temp\MW-5bb5cfd4-cc8c-4922-ae4a-9ffaa0124967\msiwrapper.ini

    Filesize

    440B

    MD5

    e6ab09e83fcdc8b5ab1aa6dd9d5e733d

    SHA1

    4856710d4ded7fd918c81ccee55e08c28e44d8b8

    SHA256

    d3dcbe424349a49aaccc7329ce1bbde708b3cc1fe4bd6e3f4f289003e2fb691d

    SHA512

    7654570927ec83163bd2cedcc72f64142e6d858ce2f072625403d15d4d68e968a60cf10ca963d120b22347d1d54a72c62807912dc158073f1b41f39e7a8c465e

  • C:\Users\Admin\AppData\Local\Temp\MW-5bb5cfd4-cc8c-4922-ae4a-9ffaa0124967\msiwrapper.ini

    Filesize

    1KB

    MD5

    77e81efabf154d223d96cba7e214e805

    SHA1

    adc1ad081d6188e8f219cc476e86450616280fd7

    SHA256

    f3c67527d36599ca23e936992272ef3b31cfe733d9b65b2e40ab0a5565a369ea

    SHA512

    e8133bf6da900b57957d2627685bf5bbf87ef08969be5bf0a0112794a00e15fd7c82b965cc27914bd84af2eeebc2a6b03fc8507873d5ef71b52b1bda74afc9a7

  • C:\Windows\Installer\MSI9F0D.tmp

    Filesize

    208KB

    MD5

    d82b3fb861129c5d71f0cd2874f97216

    SHA1

    f3fe341d79224126e950d2691d574d147102b18d

    SHA256

    107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

    SHA512

    244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

  • \??\c:\temp\script.au3

    Filesize

    595KB

    MD5

    07b5686c91ff17a1d86271601f9904b0

    SHA1

    99fd675e912909af895a917c950e5ecc37b67869

    SHA256

    64e1563ceef99893a1fe4ba93cd38763a68f2db5537545a08061e83af9fe299b

    SHA512

    321e27bb1cb5c020b4979c6dce687fb734cf24a8a6e420850019d087e61ec902dbb97e7ed164c9b7fbd7f8996eaf6c4e0bb65775355e8a7075b239424dd780c6

  • \??\c:\temp\test.txt

    Filesize

    76B

    MD5

    4b1e3cb8c33b582a74656ec001aaaf7a

    SHA1

    576cfd0d0538ca5ab90183139473895c3b8440ba

    SHA256

    99426e8b0d9b6366436d7db6883c98d6a8c2e5825b13a167a0c7495494182276

    SHA512

    b7899e2236be8702f2852233f37cb98732e2f1ac97b909d0fdce216721d02337b4b3f5045464e2d13ac9c7e2320f56c574f7654aa348e96cba5932d1f7edba4f

  • \temp\Autoit3.exe

    Filesize

    872KB

    MD5

    c56b5f0201a3b3de53e561fe76912bfd

    SHA1

    2a4062e10a5de813f5688221dbeb3f3ff33eb417

    SHA256

    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

    SHA512

    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

  • memory/1136-91-0x0000000001FB0000-0x0000000002154000-memory.dmp

    Filesize

    1.6MB

  • memory/1136-112-0x0000000074A40000-0x0000000074B34000-memory.dmp

    Filesize

    976KB

  • memory/1136-113-0x0000000001FB0000-0x0000000002154000-memory.dmp

    Filesize

    1.6MB

  • memory/2148-106-0x00000000035F0000-0x00000000045C0000-memory.dmp

    Filesize

    15.8MB

  • memory/2148-107-0x0000000004CD0000-0x000000000501E000-memory.dmp

    Filesize

    3.3MB

  • memory/2148-109-0x0000000004CD0000-0x000000000501E000-memory.dmp

    Filesize

    3.3MB