Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13-02-2024 02:38

General

  • Target

    693ff5db0a085db5094bb96cd4c0ce1d1d3fdc2fbf6b92c32836f3e61a089e7a.msi

  • Size

    5.8MB

  • MD5

    9c02a9298b97fcfc5a75fbedf08002bd

  • SHA1

    2d3bc2856c015914f2856331a0315298f3c34b0c

  • SHA256

    693ff5db0a085db5094bb96cd4c0ce1d1d3fdc2fbf6b92c32836f3e61a089e7a

  • SHA512

    fafe5dddb610068cb1044c803a6d681d1739904d8e0c4b2b0fc05bcd55cf9344f69e77c8627ae73713f759117d81a78855ff937ee8650b47ab18d37cb9ca34bc

  • SSDEEP

    49152:ppUP3UhtSTK+0THkWsN8SDYdvH5eoQDWhbHHhZgWEF94FJy5jvrgFdbBUleY82cp:pp6nFDkEWoyvy5jvcdbBUkYC+XCFmpC

Malware Config

Signatures

  • DarkGate

    DarkGate is an infostealer written in C++.

  • Detect DarkGate stealer 3 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 11 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 53 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\693ff5db0a085db5094bb96cd4c0ce1d1d3fdc2fbf6b92c32836f3e61a089e7a.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2496
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding F35281B2F5A80EAA968C748E47A3B67D
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1660
      • C:\Windows\SysWOW64\EXPAND.EXE
        "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
        3⤵
        • Drops file in Windows directory
        PID:2608
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-adafa94b-d806-4864-b546-7055e41d9fa7\." /SETINTEGRITYLEVEL (CI)(OI)LOW
        3⤵
        • Modifies file permissions
        PID:1632
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\Admin\AppData\Local\Temp\MW-adafa94b-d806-4864-b546-7055e41d9fa7\files"
        3⤵
          PID:2768
        • C:\Users\Admin\AppData\Local\Temp\MW-adafa94b-d806-4864-b546-7055e41d9fa7\files\iTunesHelper.exe
          "C:\Users\Admin\AppData\Local\Temp\MW-adafa94b-d806-4864-b546-7055e41d9fa7\files\iTunesHelper.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2036
        • C:\Windows\SysWOW64\ICACLS.EXE
          "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-adafa94b-d806-4864-b546-7055e41d9fa7\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
          3⤵
          • Modifies file permissions
          PID:2644
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2136
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005B4" "000000000000034C"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:2540
    • \??\c:\temp\Autoit3.exe
      "c:\temp\Autoit3.exe" c:\temp\script.a3x
      1⤵
      • Executes dropped EXE
      • Checks processor information in registry
      PID:2880

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C5C8CC0A7FE31816B4641D0465402560

      Filesize

      1KB

      MD5

      e94fb54871208c00df70f708ac47085b

      SHA1

      4efc31460c619ecae59c1bce2c008036d94c84b8

      SHA256

      7b9d553e1c92cb6e8803e137f4f287d4363757f5d44b37d52f9fca22fb97df86

      SHA512

      2e15b76e16264abb9f5ef417752a1cbb75f29c11f96ac7d73793172bd0864db65f2d2b7be0f16bbbe686068f0c368815525f1e39db5a0d6ca3ab18be6923b898

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a58e510994497c16e7cb941f9be2526f

      SHA1

      769f5946f883a0fbcc327570b408a0545fbf8151

      SHA256

      e4060bc7cd921dfe080e99a9e356623195e668d5dd0c6af27d1d69e41c93f5ab

      SHA512

      a0fe2efaddcde442544c5c16a924b0c88c80c903135f0477622916d323aca2073da687d815fb27a65e1626ca3405d0d2ace1b58aa2a1403ee81de681b9f4ba35

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C5C8CC0A7FE31816B4641D0465402560

      Filesize

      264B

      MD5

      61c1b33767b1add148febf8ee8d62c00

      SHA1

      d2624374eee12d03ba76ec9582166fbc524a7b37

      SHA256

      813acf20022515bf03a871e968ef409aea787eaeded9be50a83bc03131542924

      SHA512

      6cb5e4d6405f54805c2f097c7fbe70e10f71b188e119da7ee4eed6cb15e3babc6e03d81c2bb18847c4b6901110aabf00be4377b0bddc486182def49dff1f5624

    • C:\Users\Admin\AppData\Local\Temp\CabB87.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\MW-adafa94b-d806-4864-b546-7055e41d9fa7\files.cab

      Filesize

      301KB

      MD5

      33f4a96a1ff41e215080a8dc7b5374f3

      SHA1

      64b8562c7331ff6ce295faedee039f2a39f5312a

      SHA256

      41e2823507786d5d9e97d0e1f2bbd7a1d8e4e31286bf8dd8581fa185daa58f98

      SHA512

      52153bcb3cebd3bd15842b0fe1728deda0bac9cd35bbabd8d9bf6ba0a28906e3e676ebca178baaec082496a491425ef54d25418d12c85b6396fe01dd2ea4748c

    • C:\Users\Admin\AppData\Local\Temp\MW-adafa94b-d806-4864-b546-7055e41d9fa7\files\CoreFoundation.dll

      Filesize

      267KB

      MD5

      2d1a1afd8ae37407c51197f831f3caeb

      SHA1

      612f89985e014ae2da8954d9b43210811d8372aa

      SHA256

      c810ba23421b8a114303478d605e9b7ed4287f43bc430e8cd524da8ed451eb0a

      SHA512

      493b830b9140c1d2fbcc0263b9639011d6c05843e51ee1a0a8ab28671d1475558f897c3025135f5fa13ad6f69ff9be7c53686478a0da306371f4c36d84395899

    • C:\Users\Admin\AppData\Local\Temp\MW-adafa94b-d806-4864-b546-7055e41d9fa7\files\iTunesHelper.exe

      Filesize

      358KB

      MD5

      ed6a1c72a75dee15a6fa75873cd64975

      SHA1

      67a15ca72e3156f8be6c46391e184087e47f4a0d

      SHA256

      0d8878cca08903777888b3681f90e4a07c7aef7d9600a67dfa985844d4bf5eda

      SHA512

      256c2ebfeb42c2d3340d8bb423ef0ae48d5fb9fe5ca09c363595f51a03007482b67a777e4cae7a8194f69bc3a3fbcdb9abb5c9f92097925272431bb9d50f5c03

    • C:\Users\Admin\AppData\Local\Temp\MW-adafa94b-d806-4864-b546-7055e41d9fa7\files\sqlite3.dll

      Filesize

      185KB

      MD5

      9359e975c4b90b38c6f1e7d91189c5bb

      SHA1

      530fbe4dc77f9770900565cea1c5d77822885ef0

      SHA256

      17b37dee5f143869e4bc5f3494d2e5d1b2f6dc49a803d1e34e9a720d8195e041

      SHA512

      3d5790b6d59afc2108051aced10be52832578ea2cf6e13a4edb4d39c376d63347ba1b2f1ca16919a3ed268bf9daa27fdc44c79d5b2aa0c23f1a7bbb634dae480

    • C:\Users\Admin\AppData\Local\Temp\MW-adafa94b-d806-4864-b546-7055e41d9fa7\msiwrapper.ini

      Filesize

      1KB

      MD5

      a65f415c904840bd48114ac14f0f0827

      SHA1

      697cf2abe5d0a0a74cfc8f69f447fee7671e0172

      SHA256

      129220edbc6a0abfc6f8dca01c13ddbad911a0dd62efcb7f4ead964e51bf8226

      SHA512

      e1ee7bf5d4d84270c95933de9db4886d7f870ea3a3619f4d8c6da8c5f19fbefa0ab101a7137ee0505bf4a968929952c3e78826e1b840e6475e9c7012b1deaf6a

    • C:\Users\Admin\AppData\Local\Temp\TarB8A.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Windows\Installer\MSI30A0.tmp

      Filesize

      208KB

      MD5

      d82b3fb861129c5d71f0cd2874f97216

      SHA1

      f3fe341d79224126e950d2691d574d147102b18d

      SHA256

      107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

      SHA512

      244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

    • C:\temp\Autoit3.exe

      Filesize

      93KB

      MD5

      fcaddb0df074a8e6143462e779e5f647

      SHA1

      caca039ec8722120024b0048593a14f2dd34c9ec

      SHA256

      6102e71783bb4834f01b228b1bd6db4ec24842f10374342bd6f337762567dfdb

      SHA512

      cd3cc45b08021ef2ca2a6119af33006b609dfdc0442fc5247cc1d3e27d83c8101c10ce3ac31ea27857bf4ffe321627f65b0d65a22f71f2c06dbd8f29dec9e848

    • \??\c:\temp\script.a3x

      Filesize

      203KB

      MD5

      d1d64d48adc3027646ed55685ccbdc7b

      SHA1

      5ce71f81f3f551a863c8db7aad94eb6cfaa0346c

      SHA256

      57acb94f0f36345a5344aaa168d0cab826bb38b7955bf04f7f30f02aa0080e88

      SHA512

      89247e9af52b136b4d07c4c76e1d1acc9b00e734fbeeac9e70708e11be7f01d7cb142db8f8b887b83dec5e6c2482c9577804d3e55f1fd142bf2f0ef60370c9d4

    • \??\c:\temp\test.txt

      Filesize

      76B

      MD5

      e0cb113b19ce53ef7b72edbb0a4937dc

      SHA1

      2499a76ad9ec4a44571bfd8083e09b23373f9f69

      SHA256

      03bed76f17b8574d05e84b81f81c09a33b1ae1555c2caf4783e059b689879ab6

      SHA512

      0b046a6d16d22c0faa3eb729d9b74bfbc87f3cc847fd5ddfa89e573893d215841bae320f0697090b9a30778a07210929ac9c440fca884e920b369698d90a17ca

    • \Users\Admin\AppData\Local\Temp\MW-adafa94b-d806-4864-b546-7055e41d9fa7\files\CoreFoundation.dll

      Filesize

      184KB

      MD5

      efb3232862a649fbf459bab81e8a9582

      SHA1

      da1f48a808f3e56b67bbeb36d715a6377f869087

      SHA256

      513413fa722a89afb832fd00e0a11dbdc819fb0654ee7a2b855428542de9e1d3

      SHA512

      e7d19d4750b7084e239653211aca70282d69f2d5cd47e418e33ef82a0bd03c170747cd330a72b5d4512082097bfb111f25be624a663074829e926eed92008f79

    • memory/2036-343-0x0000000074070000-0x0000000074418000-memory.dmp

      Filesize

      3.7MB

    • memory/2036-345-0x0000000002350000-0x00000000024F0000-memory.dmp

      Filesize

      1.6MB

    • memory/2036-338-0x0000000002350000-0x00000000024F0000-memory.dmp

      Filesize

      1.6MB

    • memory/2880-354-0x00000000049B0000-0x0000000004D0C000-memory.dmp

      Filesize

      3.4MB

    • memory/2880-353-0x0000000003710000-0x00000000046E0000-memory.dmp

      Filesize

      15.8MB

    • memory/2880-355-0x00000000049B0000-0x0000000004D0C000-memory.dmp

      Filesize

      3.4MB