Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2024 13:49

General

  • Target

    #DarkGate/AutoHotkey.exe

  • Size

    892KB

  • MD5

    a59a2d3e5dda7aca6ec879263aa42fd3

  • SHA1

    312d496ec90eb30d5319307d47bfef602b6b8c6c

  • SHA256

    897b0d0e64cf87ac7086241c86f757f3c94d6826f949a1f0fec9c40892c0cecb

  • SHA512

    852972ca4d7f9141ea56d3498388c61610492d36ea7d7af1b36d192d7e04dd6d9bc5830e0dcb0a5f8f55350d4d8aaac2869477686b03f998affbac6321a22030

  • SSDEEP

    24576:bGzl9+a4Ne1nEFI56xU+0IdY2Zv952uetfbFEzP4UFhOt:b+tOWnEFZR0El0JEzQAh

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\#DarkGate\AutoHotkey.exe
    "C:\Users\Admin\AppData\Local\Temp\#DarkGate\AutoHotkey.exe"
    1⤵
      PID:4056
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:2208
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:2412
      • C:\Users\Admin\AppData\Local\Temp\#DarkGate\AutoHotkey.exe
        "C:\Users\Admin\AppData\Local\Temp\#DarkGate\AutoHotkey.exe" C:\Users\Admin\AppData\Local\Temp\#DarkGate\script.ahk
        1⤵
        • Checks processor information in registry
        PID:2892
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\#DarkGate\test.txt
        1⤵
          PID:4340
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:5112
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:4428
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:4348
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:1532
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
          • Modifies registry class
          PID:3456

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\N3A1GXDL\microsoft.windows[1].xml

          Filesize

          97B

          MD5

          2a048584ff1532f817c94dc91dcd1288

          SHA1

          a8feaa50ff20598096757253f961ed62cc8e2569

          SHA256

          ac0e9ccd0c2a91247d80d72c35930928c1da245701ca832072bd977c61d3901a

          SHA512

          b6e50c342123202657e524ce15e02851da3b8573494e0ba98f7b70c6438fcbee100df4eac302d1dcbd3d3123bdf14a11d232c96d998c569431887317419c1d86

        • memory/1532-94-0x0000020C9B280000-0x0000020C9B2A0000-memory.dmp

          Filesize

          128KB

        • memory/1532-92-0x0000020499C60000-0x0000020499C80000-memory.dmp

          Filesize

          128KB

        • memory/1532-90-0x0000020499CA0000-0x0000020499CC0000-memory.dmp

          Filesize

          128KB

        • memory/2412-8-0x00000261609B0000-0x00000261609D0000-memory.dmp

          Filesize

          128KB

        • memory/2412-12-0x0000026160FC0000-0x0000026160FE0000-memory.dmp

          Filesize

          128KB

        • memory/2412-6-0x0000026160C00000-0x0000026160C20000-memory.dmp

          Filesize

          128KB

        • memory/4348-69-0x0000013C07770000-0x0000013C07790000-memory.dmp

          Filesize

          128KB

        • memory/4348-73-0x0000013C07B40000-0x0000013C07B60000-memory.dmp

          Filesize

          128KB

        • memory/4348-71-0x0000013C07730000-0x0000013C07750000-memory.dmp

          Filesize

          128KB

        • memory/4428-52-0x00000227E0A00000-0x00000227E0A20000-memory.dmp

          Filesize

          128KB

        • memory/4428-50-0x00000227E03E0000-0x00000227E0400000-memory.dmp

          Filesize

          128KB

        • memory/4428-48-0x00000227E0420000-0x00000227E0440000-memory.dmp

          Filesize

          128KB

        • memory/5112-29-0x000001D4C0600000-0x000001D4C0620000-memory.dmp

          Filesize

          128KB

        • memory/5112-31-0x000001D4C0A10000-0x000001D4C0A30000-memory.dmp

          Filesize

          128KB

        • memory/5112-27-0x000001D4C0640000-0x000001D4C0660000-memory.dmp

          Filesize

          128KB