Analysis

  • max time kernel
    120s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02-03-2024 19:15

General

  • Target

    fc6ab939f5f2d6f12cb1edbe2babd5b180d8d036fc0b37a77f784d1c52162112.msi

  • Size

    4.3MB

  • MD5

    b88352bde539f79207be209759505f02

  • SHA1

    8ede7ee0a43c4282b41687408ddc38a243ac4bfd

  • SHA256

    fc6ab939f5f2d6f12cb1edbe2babd5b180d8d036fc0b37a77f784d1c52162112

  • SHA512

    104d4330c05e41d2039a0b61438565c88138ec9b2c55632ab0ec8eaf70840b095e1dd5bb5d55b65373099df80896632499ff5b3c85240d7a389824cb72268921

  • SSDEEP

    49152:zpUPB9qhCxzT+WKjSX15zLVI4vLeY9xV4qtGvmKBteU5oBgffUBS88qAU8:zpECQ1FLeYLVTV4WMVf

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

stachmentsuprimeresult.com

Attributes
  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    443

  • check_disk

    false

  • check_ram

    true

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    veVumtze

  • minimum_disk

    30

  • minimum_ram

    4096

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Signatures

  • DarkGate

    DarkGate is an infostealer written in C++.

  • Detect DarkGate stealer 3 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 11 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 53 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\fc6ab939f5f2d6f12cb1edbe2babd5b180d8d036fc0b37a77f784d1c52162112.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1984
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding ADA8868171BAADA1715F86D0B6DBFC96
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1644
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-569b00b3-4437-4386-9825-106456f98bd1\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
        3⤵
        • Modifies file permissions
        PID:2832
      • C:\Windows\SysWOW64\EXPAND.EXE
        "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
        3⤵
        • Drops file in Windows directory
        PID:1816
      • C:\Users\Admin\AppData\Local\Temp\MW-569b00b3-4437-4386-9825-106456f98bd1\files\iTunesHelper.exe
        "C:\Users\Admin\AppData\Local\Temp\MW-569b00b3-4437-4386-9825-106456f98bd1\files\iTunesHelper.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2256
        • \??\c:\temp\Autoit3.exe
          "c:\temp\Autoit3.exe" c:\temp\script.au3
          4⤵
          • Executes dropped EXE
          • Checks processor information in registry
          PID:564
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\Admin\AppData\Local\Temp\MW-569b00b3-4437-4386-9825-106456f98bd1\files"
        3⤵
          PID:1544
        • C:\Windows\SysWOW64\ICACLS.EXE
          "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-569b00b3-4437-4386-9825-106456f98bd1\." /SETINTEGRITYLEVEL (CI)(OI)LOW
          3⤵
          • Modifies file permissions
          PID:1800
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2660
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005B0" "00000000000003AC"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:2500

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\MW-569b00b3-4437-4386-9825-106456f98bd1\files.cab

      Filesize

      4.1MB

      MD5

      7333aa36063f51a7f1f9bb05fa679ab4

      SHA1

      2944bfdccabb766254b94c0a1d3665ec423d114b

      SHA256

      2d550bcc063ba4c3cd852edc0b36c49c1d70fbcd44a63ff035153b9f574b65e3

      SHA512

      0c89804413e0f4cb35c1a6c50d460da241aa8e0d011c1f4e1e813f3002093fc661c59adfc58ea4369f79f0c8d785b72d31ce965ccfe3a259d5eff485b5a80d3d

    • C:\Users\Admin\AppData\Local\Temp\MW-569b00b3-4437-4386-9825-106456f98bd1\files\CoreFoundation.dll

      Filesize

      1.5MB

      MD5

      ce8ee7e4e7b695d4af2c3ecf8411e637

      SHA1

      dd7ea41c7c351e82ab5438b75a3d830574a0aa58

      SHA256

      7cdb07238c8cc903e13e689d4de1129f5fb3b647e4a1c1e98c5a0e8516184ed1

      SHA512

      ad3492b03af2d9b6bf2632fcc65703c0e06116ea3945c4bc401047842514e7789c31912e0887f20e234b58ce970ebd1486d9b5521a76c02dcc5e58804873c3b2

    • C:\Users\Admin\AppData\Local\Temp\MW-569b00b3-4437-4386-9825-106456f98bd1\files\iTunesHelper.exe

      Filesize

      358KB

      MD5

      ed6a1c72a75dee15a6fa75873cd64975

      SHA1

      67a15ca72e3156f8be6c46391e184087e47f4a0d

      SHA256

      0d8878cca08903777888b3681f90e4a07c7aef7d9600a67dfa985844d4bf5eda

      SHA512

      256c2ebfeb42c2d3340d8bb423ef0ae48d5fb9fe5ca09c363595f51a03007482b67a777e4cae7a8194f69bc3a3fbcdb9abb5c9f92097925272431bb9d50f5c03

    • C:\Users\Admin\AppData\Local\Temp\MW-569b00b3-4437-4386-9825-106456f98bd1\files\sqlite3.dll

      Filesize

      2.2MB

      MD5

      8ff72509379eadfc85f931774e98172f

      SHA1

      4f33f0ccc1941f0f0125c9ebb91049d3487dfda8

      SHA256

      3ef7f95dedb16181d57ad5fa39f748dc92ea9fb102a24ab7c2f22601fbc24147

      SHA512

      4f8d8442fdd08c5f8b1f3e9683ae24f046a5e3894dd97d26a63d1e9d261107015127e817384d222368e29cd2cc2d3ed344b7019eb0cc7978cdabc2e3e57a5d83

    • C:\Users\Admin\AppData\Local\Temp\MW-569b00b3-4437-4386-9825-106456f98bd1\msiwrapper.ini

      Filesize

      448B

      MD5

      e6d99cf68fe051af9131c5949f6a278f

      SHA1

      e878f60461addcf83c090d5b246341a5f019a988

      SHA256

      c666ea82ae5eee5c3c17ac57a8201c68ea51d4632e11839a38d4183fc6f54164

      SHA512

      2398b7beb1a93b13a7bf8ad0a8857911e87f617da906a11cc19d004d57bcb08020d5e51dc329b6f512a94990ba6003e0ebf8b725fe081b54b18291a53c12ea1a

    • C:\Users\Admin\AppData\Local\Temp\MW-569b00b3-4437-4386-9825-106456f98bd1\msiwrapper.ini

      Filesize

      1KB

      MD5

      a0aa5f7de44301b5809c2276ea0a87f8

      SHA1

      fa043a0190835ff6385198b3a8ad8b36a69858e7

      SHA256

      a857f632a17526b287e073f869642ec1786bebc94af3323963259937f121cf15

      SHA512

      b958b07756dee49f1b21e64ea78a176b250eb8f138fc3abc2a844b8c7e6d9aae3319989da14261be9d49827b4551df9dbc40b0f045a5b37dff6194675aac9222

    • C:\Users\Admin\AppData\Local\Temp\MW-569b00b3-4437-4386-9825-106456f98bd1\msiwrapper.ini

      Filesize

      1KB

      MD5

      2070b5c6ff75be7483a41d48082dd887

      SHA1

      946e0bcbb4dd049dc414a003b6bf799840208b56

      SHA256

      e639ebda8c210af0385bc8fb130b8bd822d271c1b5fc65f1e0ecb92fe4bc487d

      SHA512

      8d8237efbe4060d9bce96e70ef2857c7e7b2bfb5a0f4f4eb6b268260e3fcae2f7cd138524fb425a783843d4b846d61506e7d2dbe15ad3aeb1ad79ca882e7a3b7

    • C:\Windows\Installer\MSI9EBF.tmp

      Filesize

      208KB

      MD5

      d82b3fb861129c5d71f0cd2874f97216

      SHA1

      f3fe341d79224126e950d2691d574d147102b18d

      SHA256

      107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

      SHA512

      244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

    • C:\temp\Autoit3.exe

      Filesize

      64KB

      MD5

      c20ac95a96af05227875d7060bfb9fc2

      SHA1

      26d2c5d5774731f7ee49636f692bf1712530e8fe

      SHA256

      00457e22fc18fa4adc06c0b52d008a1b9e117176df4b8a56e71586eeae74146c

      SHA512

      d305eea0f714d0de07a8b49ea295c7eaba5aed5e9812a604a2c5f39bf1f85f9df0544bd64d7ee2cf7be6b6937ecb917ac851bf2b0585d17c6932b591cf007fc8

    • \??\c:\temp\script.au3

      Filesize

      1.0MB

      MD5

      ff77fd2453e50e3d846587ec60ac8027

      SHA1

      4a7c389d241f7f486ee24229d13c0e553d255a8a

      SHA256

      43ed3e85a7f0c80a9b532c11853a30a39a570b57f9e61703426bd6f25c30dbab

      SHA512

      bf79b53049f947e9947a383677a6e797e703fada5eef96a762b11b7df727db6630c1697485861d9bfad0057865e119c86d10198d269cd144e4289b97992f040c

    • \??\c:\temp\test.txt

      Filesize

      76B

      MD5

      2b5beed06469bc15ef9d3fc81026d520

      SHA1

      32b9af19321d3a95a566f2720bf3594c8709017e

      SHA256

      bc694c165646842697db370a7688753a08bed7803aa9aaaf626e54ad77b3b0fe

      SHA512

      78963f15247f17099214e7c33d2fb9c3b01f1986334da01c2cddda957d7d916f74a0e7f1cf2d57b1afe6f52eb999e1cf2cf6b9fd3d2afdf7f6ec6b0a8532742a

    • memory/564-90-0x00000000036F0000-0x00000000046C0000-memory.dmp

      Filesize

      15.8MB

    • memory/564-93-0x0000000005100000-0x000000000544E000-memory.dmp

      Filesize

      3.3MB

    • memory/564-92-0x0000000005100000-0x000000000544E000-memory.dmp

      Filesize

      3.3MB

    • memory/2256-78-0x00000000020B0000-0x00000000022E5000-memory.dmp

      Filesize

      2.2MB

    • memory/2256-87-0x00000000020B0000-0x00000000022E5000-memory.dmp

      Filesize

      2.2MB

    • memory/2256-85-0x0000000073DB0000-0x0000000073F4D000-memory.dmp

      Filesize

      1.6MB