Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05-03-2024 16:06
Static task
static1
Behavioral task
behavioral1
Sample
06032024_0006_setup.js
Resource
win7-20240221-en
General
-
Target
06032024_0006_setup.js
-
Size
32KB
-
MD5
91129aacf3e4d87a776ca1ee9e358eb2
-
SHA1
3e66e0e3eb6d17055ca1acca942c592141ad8261
-
SHA256
e06efa3ff72da4a73045d31e888e001041a0e9058266d893fda525a90ab4e94c
-
SHA512
975f722719311ebf1a6bee5f17b14e131bd613e955b2bee17401c5af864d08a68240748af08ccb9da957fe2565972339baade1534d0ad018e7a266ce469f0f34
-
SSDEEP
768:rnJRkBVRaR9z6kNyRoRmG6o463cR4RenBRk6ORJRuRzRlnJRkBVRaR9z6kNyRoRx:rnJRkBVRaR9z6kNyRoRmG6o463cR4ReL
Malware Config
Extracted
darkgate
admin888
afdhf198jfadafdkfad.com
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
lrDcZuOq
-
minimum_disk
50
-
minimum_ram
7000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Signatures
-
Detect DarkGate stealer 2 IoCs
resource yara_rule behavioral2/memory/4540-30-0x00000000063D0000-0x000000000671F000-memory.dmp family_darkgate_v6 behavioral2/memory/4540-31-0x00000000063D0000-0x000000000671F000-memory.dmp family_darkgate_v6 -
Blocklisted process makes network request 2 IoCs
flow pid Process 16 3620 wscript.exe 18 3620 wscript.exe -
Dave packer 1 IoCs
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
resource yara_rule behavioral2/files/0x0007000000023305-10.dat dave -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation wscript.exe -
Executes dropped EXE 2 IoCs
pid Process 3516 d0.exe 4540 Autoit3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Autoit3.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Autoit3.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3620 wrote to memory of 3516 3620 wscript.exe 97 PID 3620 wrote to memory of 3516 3620 wscript.exe 97 PID 3620 wrote to memory of 3516 3620 wscript.exe 97 PID 3516 wrote to memory of 4540 3516 d0.exe 100 PID 3516 wrote to memory of 4540 3516 d0.exe 100 PID 3516 wrote to memory of 4540 3516 d0.exe 100
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\06032024_0006_setup.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\users\public\d0.exe"C:\users\public\d0.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3516 -
\??\c:\temp\Autoit3.exe"c:\temp\Autoit3.exe" c:\temp\script.a3x3⤵
- Executes dropped EXE
- Checks processor information in registry
PID:4540
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3888 --field-trial-handle=2228,i,521073434451423547,2311651514500527526,262144 --variations-seed-version /prefetch:81⤵PID:1684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD574019cf8562c516c372e09ce02de7355
SHA13ce6f711cd1ad954b96cb98055a3a40dae8c9a65
SHA2568a2edeef9978d454882bfb233d9cd77505618b854f7899b27aeb095ff8ebb3f4
SHA5127b41d9a1387ebdded1833a655166ffb2cd43b0eb490c5899bf72355a5e2e371b2d0be2231c5252b8fb2a569c92884e8a3391163207fdcb74e66edebcf5cfc771
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
468KB
MD5b285a2a2da41e02edd0e090cf3900db0
SHA1caae12d166fa20fcb5aba44947b379f370d47ec4
SHA256dbb900ab8d921e3faccd6bb827353683e80be4e4ae530488bc90559251e85c2d
SHA5121b6624c1af8b0889acbf1eb0abdfb148c04afeb025ac9a21173334f781692dcead0d3fff79e2f156c016b2700aaa4063bb92daec43e1638be9c76f443d37b60c
-
Filesize
76B
MD5f9c268806eadf724fe06c8485ab592b5
SHA1b462ca6d6639f0d44cb7fa02a69de2f327f9e1d6
SHA2564be8f8d0446ecf4d3213ab354e15591428576531acf5af60f6f07e770944bcdd
SHA512c6bdd408aa3c1a77917dd0f11404cadd8e8f67aea79679ca54817932359e9cf905a5297c9aba945d7de04837fdbe531825d81aab266fd676d6eef2743ac17a33