Analysis
-
max time kernel
591s -
max time network
446s -
platform
windows10-1703_x64 -
resource
win10-20240214-en -
resource tags
arch:x64arch:x86image:win10-20240214-enlocale:en-usos:windows10-1703-x64system -
submitted
18-02-2024 21:13
Static task
static1
Behavioral task
behavioral1
Sample
iTunesHelper.exe
Resource
win10-20240214-en
Behavioral task
behavioral2
Sample
iTunesHelper.exe
Resource
win10v2004-20231222-en
General
-
Target
iTunesHelper.exe
-
Size
358KB
-
MD5
ed6a1c72a75dee15a6fa75873cd64975
-
SHA1
67a15ca72e3156f8be6c46391e184087e47f4a0d
-
SHA256
0d8878cca08903777888b3681f90e4a07c7aef7d9600a67dfa985844d4bf5eda
-
SHA512
256c2ebfeb42c2d3340d8bb423ef0ae48d5fb9fe5ca09c363595f51a03007482b67a777e4cae7a8194f69bc3a3fbcdb9abb5c9f92097925272431bb9d50f5c03
-
SSDEEP
6144:TjZtNtzxEFQVLEhZbblN4W6ZDNFfEai23+FM2+zIv+98vS:ZRxMQLEhZXybF8Ut4o8a
Malware Config
Signatures
-
Detect DarkGate stealer 2 IoCs
resource yara_rule behavioral1/memory/220-11-0x0000000005F80000-0x00000000062DB000-memory.dmp family_darkgate_v6 behavioral1/memory/220-12-0x0000000005F80000-0x00000000062DB000-memory.dmp family_darkgate_v6 -
Executes dropped EXE 1 IoCs
pid Process 220 Autoit3.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Autoit3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Autoit3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2348 wrote to memory of 220 2348 iTunesHelper.exe 74 PID 2348 wrote to memory of 220 2348 iTunesHelper.exe 74 PID 2348 wrote to memory of 220 2348 iTunesHelper.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\iTunesHelper.exe"C:\Users\Admin\AppData\Local\Temp\iTunesHelper.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
\??\c:\temp\Autoit3.exe"c:\temp\Autoit3.exe" c:\temp\script.a3x2⤵
- Executes dropped EXE
- Checks processor information in registry
PID:220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
474KB
MD56354b28ac4bc8fa465d80c3ea3893116
SHA10eea737ad0a1a0cb5c3f14279a05d1fba6c6216d
SHA2569515b7b3ebe97e51842be2e91241f0332916d6ec8aecb767ba418de4d21f57f7
SHA5126150a7b646326f01118535c2469628de79e20b7461dccf44a2311d0c1f7e4ed2d8523e7671e26d9c843fabce2946ea33adf4cc4e6acfd3216e1e06cdc1efa53b
-
Filesize
76B
MD545306f5622da212035662680f1c09e0e
SHA1a89ae25df7b6bc8a30c4dcfdc267cf912e17f1bb
SHA2562a5eaa4fb540232306ee036ed870369570744b34d8bd17743293e4763d19933e
SHA51299c9a4c77b346cf95930575fdb6a0c7ef4fe3cc75831e8f4c5d8114d0b35ff8c7fa6ca4f4dca6b34b53bd133766565318da0904fb467f88a1d7f47d0577115b0