Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2024 13:56
Static task
static1
Behavioral task
behavioral1
Sample
dark_drop.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
dark_drop.exe
Resource
win11-20240214-en
General
-
Target
dark_drop.exe
-
Size
1.4MB
-
MD5
86fa1c9350bd54a32202d47f35e7f9a6
-
SHA1
40243988b97eb12450e3c73f8787ca8e3866a993
-
SHA256
128d1a417bc1c7258c505ffd1a250366f37d0074c44b08a10ef3e9accb57f56b
-
SHA512
916dc6626ab253f03cbf9a02e462d91ff8795ba00940469e53a26369e924d87b3db6f5b9ca744bef342fe95a964b6338b03ff19b126e68162d1872fb2a64218a
-
SSDEEP
24576:cnT3E53Myyzl0hMf1tr7Caw8M0fYnejlgFYel36NG5ADcYz/V2sksJZx/Q:cT3EZpBh211Waw30wncloYel36NeMF2x
Malware Config
Extracted
darkgate
kaitoshiba123
45.63.52.184
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
8094
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
EhuJByqk
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
kaitoshiba123
Signatures
-
Detect DarkGate stealer 2 IoCs
resource yara_rule behavioral1/memory/4068-11-0x00000000059B0000-0x0000000005D3A000-memory.dmp family_darkgate_v6 behavioral1/memory/4068-12-0x00000000059B0000-0x0000000005D3A000-memory.dmp family_darkgate_v6 -
Executes dropped EXE 1 IoCs
pid Process 4068 Autoit3.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Autoit3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Autoit3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2540 wrote to memory of 4068 2540 dark_drop.exe 86 PID 2540 wrote to memory of 4068 2540 dark_drop.exe 86 PID 2540 wrote to memory of 4068 2540 dark_drop.exe 86
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
497KB
MD5c0c95d1fdb4869d5dcdebf71f1020f70
SHA153185cef67cbdfc5f691aeeba5cdf2dba27b359a
SHA256025bd7399df23c0c8c4335b74a77eac8f0ec79ab0860279f73f78a4e6393cff1
SHA51290dc03c63e139ed6398bc5676d3cf8b56c72d23497ea841b68cd8e4c953e7085f1754f6414bec603ced4679432ea1a7c412881e5cce45e3df1afc7590235df6f
-
Filesize
76B
MD50ba726a9e4dc56556d86a1f7b2e7be74
SHA160e8031fc78884c5e593f645656544fade59435c
SHA25679a979299ea480989fe7cfefe64da2f99e527418bdc6db7f109fd132e3183ac2
SHA512cdb206f9d8fac3d1533760a79129fd562d580e9b300117663e0fb877f31dfdc7121a5c051fd2af6380a04cd5bac370f9b6bb1c55bdfd25dadda7d6ec386f2d3c