Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-03-2024 16:06

General

  • Target

    06032024_0006_setup.js

  • Size

    32KB

  • MD5

    91129aacf3e4d87a776ca1ee9e358eb2

  • SHA1

    3e66e0e3eb6d17055ca1acca942c592141ad8261

  • SHA256

    e06efa3ff72da4a73045d31e888e001041a0e9058266d893fda525a90ab4e94c

  • SHA512

    975f722719311ebf1a6bee5f17b14e131bd613e955b2bee17401c5af864d08a68240748af08ccb9da957fe2565972339baade1534d0ad018e7a266ce469f0f34

  • SSDEEP

    768:rnJRkBVRaR9z6kNyRoRmG6o463cR4RenBRk6ORJRuRzRlnJRkBVRaR9z6kNyRoRx:rnJRkBVRaR9z6kNyRoRmG6o463cR4ReL

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

afdhf198jfadafdkfad.com

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    lrDcZuOq

  • minimum_disk

    50

  • minimum_ram

    7000

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Signatures

  • DarkGate

    DarkGate is an infostealer written in C++.

  • Detect DarkGate stealer 2 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Dave packer 1 IoCs

    Detects executable using a packer named 'Dave' by the community, based on a string at the end.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\06032024_0006_setup.js
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3620
    • C:\users\public\d0.exe
      "C:\users\public\d0.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3516
      • \??\c:\temp\Autoit3.exe
        "c:\temp\Autoit3.exe" c:\temp\script.a3x
        3⤵
        • Executes dropped EXE
        • Checks processor information in registry
        PID:4540
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3888 --field-trial-handle=2228,i,521073434451423547,2311651514500527526,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1684

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    3
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Public\d0.exe
      Filesize

      4.2MB

      MD5

      74019cf8562c516c372e09ce02de7355

      SHA1

      3ce6f711cd1ad954b96cb98055a3a40dae8c9a65

      SHA256

      8a2edeef9978d454882bfb233d9cd77505618b854f7899b27aeb095ff8ebb3f4

      SHA512

      7b41d9a1387ebdded1833a655166ffb2cd43b0eb490c5899bf72355a5e2e371b2d0be2231c5252b8fb2a569c92884e8a3391163207fdcb74e66edebcf5cfc771

    • C:\temp\Autoit3.exe
      Filesize

      872KB

      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • \??\c:\temp\script.a3x
      Filesize

      468KB

      MD5

      b285a2a2da41e02edd0e090cf3900db0

      SHA1

      caae12d166fa20fcb5aba44947b379f370d47ec4

      SHA256

      dbb900ab8d921e3faccd6bb827353683e80be4e4ae530488bc90559251e85c2d

      SHA512

      1b6624c1af8b0889acbf1eb0abdfb148c04afeb025ac9a21173334f781692dcead0d3fff79e2f156c016b2700aaa4063bb92daec43e1638be9c76f443d37b60c

    • \??\c:\temp\test.txt
      Filesize

      76B

      MD5

      f9c268806eadf724fe06c8485ab592b5

      SHA1

      b462ca6d6639f0d44cb7fa02a69de2f327f9e1d6

      SHA256

      4be8f8d0446ecf4d3213ab354e15591428576531acf5af60f6f07e770944bcdd

      SHA512

      c6bdd408aa3c1a77917dd0f11404cadd8e8f67aea79679ca54817932359e9cf905a5297c9aba945d7de04837fdbe531825d81aab266fd676d6eef2743ac17a33

    • memory/3516-19-0x0000000002BF0000-0x0000000002D4F000-memory.dmp
      Filesize

      1.4MB

    • memory/3516-24-0x0000000002BF0000-0x0000000002D4F000-memory.dmp
      Filesize

      1.4MB

    • memory/4540-29-0x0000000004EE0000-0x0000000005EB0000-memory.dmp
      Filesize

      15.8MB

    • memory/4540-30-0x00000000063D0000-0x000000000671F000-memory.dmp
      Filesize

      3.3MB

    • memory/4540-31-0x00000000063D0000-0x000000000671F000-memory.dmp
      Filesize

      3.3MB