Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02-04-2024 10:09

General

  • Target

    9c71b3dd94329b2649fd36ccd5f0df919126284883543cff573e103076ce3506.msi

  • Size

    3.8MB

  • MD5

    4b2e289610400400a87a347ac2010c59

  • SHA1

    b8ec5f89be7282a376e1026afdf68ed46753b978

  • SHA256

    9c71b3dd94329b2649fd36ccd5f0df919126284883543cff573e103076ce3506

  • SHA512

    4e1eef2cf6e355549e0eb10309e6b6efb538d88e86ff25c77c201aaff37500b7daa6489a8fef88cf93d53771fe8c80bcf16f4b71d00e3a4824fd20a615c2b0f5

  • SSDEEP

    49152:9pUPW9qhCxzT+WKjSXVRzLVI4s2kF6Wua/tB2KJP9C9/q6ZXc5vpSOCH7p76yTJF:9prCQVNLe6kcL+j2CP9CaCbp7

Malware Config

Signatures

  • DarkGate

    DarkGate is an infostealer written in C++.

  • Detect DarkGate stealer 2 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 11 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 8 IoCs
  • Program crash 1 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 53 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\9c71b3dd94329b2649fd36ccd5f0df919126284883543cff573e103076ce3506.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2020
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding F853D9DF18CF96569086ADF1526EF354
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1424
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-399d6037-2d1e-435a-b31f-a26a21a1f27f\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
        3⤵
        • Modifies file permissions
        PID:936
      • C:\Windows\SysWOW64\EXPAND.EXE
        "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
        3⤵
        • Drops file in Windows directory
        PID:2408
      • C:\Users\Admin\AppData\Local\Temp\MW-399d6037-2d1e-435a-b31f-a26a21a1f27f\files\iTunesHelper.exe
        "C:\Users\Admin\AppData\Local\Temp\MW-399d6037-2d1e-435a-b31f-a26a21a1f27f\files\iTunesHelper.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1380
        • \??\c:\temp\Autoit3.exe
          "c:\temp\Autoit3.exe" c:\temp\script.au3
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1140
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1140 -s 280
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:2796
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\Admin\AppData\Local\Temp\MW-399d6037-2d1e-435a-b31f-a26a21a1f27f\files"
        3⤵
          PID:2236
        • C:\Windows\SysWOW64\ICACLS.EXE
          "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-399d6037-2d1e-435a-b31f-a26a21a1f27f\." /SETINTEGRITYLEVEL (CI)(OI)LOW
          3⤵
          • Modifies file permissions
          PID:2348
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2592
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000550" "00000000000005AC"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:2460

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\MW-399d6037-2d1e-435a-b31f-a26a21a1f27f\files.cab

      Filesize

      3.5MB

      MD5

      2ca32763a836bda6629439dfdf7574fb

      SHA1

      73df86b5c6efddef1759b803fe075f9f0414a75a

      SHA256

      249ccc81506722721da5774e2d3718b02fa79f1a2f4024e609e6fcf1b6bedf0a

      SHA512

      248df241c4de5fc942163ec9c447328aadaf824c4323a676b3c261027237f3cf72390a372b67c678b97ce8f62e3b92f3e218f6d29be47bb45ba604b4d7b1df1a

    • C:\Users\Admin\AppData\Local\Temp\MW-399d6037-2d1e-435a-b31f-a26a21a1f27f\files\CoreFoundation.dll

      Filesize

      1.5MB

      MD5

      ce2e53da2015987538d794b04c4ae0d5

      SHA1

      6952ba24fcc3bb41d4dd03d41c56ca12f4cce95a

      SHA256

      1e3bddd68b9dbdf728afa28a29db324b21d71fa145e6efff8d44b46f3637d9f4

      SHA512

      ddd0d0746a180f1782cb9c13cf37992d80e2b8f3c0e043fe5ba96f80adac066de79e59d10d5e1e91e22c434eca65793efc17459ab2d6565b2fc6986c86b146b0

    • C:\Users\Admin\AppData\Local\Temp\MW-399d6037-2d1e-435a-b31f-a26a21a1f27f\files\iTunesHelper.exe

      Filesize

      358KB

      MD5

      ed6a1c72a75dee15a6fa75873cd64975

      SHA1

      67a15ca72e3156f8be6c46391e184087e47f4a0d

      SHA256

      0d8878cca08903777888b3681f90e4a07c7aef7d9600a67dfa985844d4bf5eda

      SHA512

      256c2ebfeb42c2d3340d8bb423ef0ae48d5fb9fe5ca09c363595f51a03007482b67a777e4cae7a8194f69bc3a3fbcdb9abb5c9f92097925272431bb9d50f5c03

    • C:\Users\Admin\AppData\Local\Temp\MW-399d6037-2d1e-435a-b31f-a26a21a1f27f\files\sqlite3.dll

      Filesize

      1.6MB

      MD5

      076ed533d27f3bd8678ab4b7015f0976

      SHA1

      657aa4110236c4e3cfa429fc039ca49486a1ee82

      SHA256

      3035fb3598ef2dfce3e0472c44a6c53a7c0e18b451ca58d8ad6def288d890ca3

      SHA512

      22b3e3fc5f18e368763c1dbfd63990a5eec99a39fb6590c92fa37ff7798fe075dbaf03fc1dcae5cb4b045e300e57a55b80fe951e11325e7be7414b862015df0f

    • C:\Users\Admin\AppData\Local\Temp\MW-399d6037-2d1e-435a-b31f-a26a21a1f27f\msiwrapper.ini

      Filesize

      396B

      MD5

      6d538d558f60b802ecd9f9a227afe373

      SHA1

      04fdc186fc70a26c9e62087bfa09a321b3c440e3

      SHA256

      e942ce3a5c929af8ee986df09aa0ca8b47cfb02a3a467b3d813237c88f7d9eb1

      SHA512

      775ed02de2f218056f6bbf48c421f272515e249ce09627e5a6750f386388bcbe63019f968bd3fdb5753a962ad4160e0581ecd992d0cc6c36a6074078ca2d4d77

    • C:\Users\Admin\AppData\Local\Temp\MW-399d6037-2d1e-435a-b31f-a26a21a1f27f\msiwrapper.ini

      Filesize

      1KB

      MD5

      d927eb9396406cd3de8fc0c7405785ac

      SHA1

      b392765d2486fa2213d4e45d5745ed22177b136f

      SHA256

      32104ae90976bfda1c6dca53ad159939234863963ee3e9c5da790526afb34de8

      SHA512

      40e81278d7526ff20e070803ee92a5c6a6e9e8def093da3aacc81d6a9b405b721c206c794a84ac35b12f1edafd51029879ed719d793905b67349984c8ac02531

    • C:\Windows\Installer\MSI9DE5.tmp

      Filesize

      208KB

      MD5

      d82b3fb861129c5d71f0cd2874f97216

      SHA1

      f3fe341d79224126e950d2691d574d147102b18d

      SHA256

      107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

      SHA512

      244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

    • C:\temp\Autoit3.exe

      Filesize

      872KB

      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • \??\c:\temp\script.au3

      Filesize

      470KB

      MD5

      51cac8ad7fca3b404d7bb89beef8890b

      SHA1

      ba76502def5d65af3d98569a9812bcbb4d52a973

      SHA256

      97c6d302415978c1e3b6e336f213fc4a66c814f489604e27d277cfd259342fe0

      SHA512

      6e7ad62e4e7cb7da412fec06885a367e82ae61f7c3658f9b36148cfe1be2cfa3270cd00a46d519b15bb62b77cdcc87eda54799bd7ce395a0d2d0627b548677d5

    • \??\c:\temp\test.txt

      Filesize

      76B

      MD5

      3f252d7956c3e1472a0f208aac6da8ce

      SHA1

      41a5e96c5ca98f5f8e78894c0ce03590c9bf6cb3

      SHA256

      1e5385399bd1a8d6d531b820da88d0b217b863ec2e7100e1533e64605fadd898

      SHA512

      1ab1c23095d5061f73df8569c2fb2ed235e478ffa716ffd93801d52a75e631bb0bac4cf39ef0dcd4a186460e4c93fcec4f4d6c07fa4b91d926b54a61b5b2c00a

    • memory/1140-91-0x00000000037C0000-0x0000000004790000-memory.dmp

      Filesize

      15.8MB

    • memory/1140-99-0x00000000037C0000-0x0000000004790000-memory.dmp

      Filesize

      15.8MB

    • memory/1380-84-0x0000000074470000-0x000000007460D000-memory.dmp

      Filesize

      1.6MB

    • memory/1380-85-0x0000000001F80000-0x000000000211F000-memory.dmp

      Filesize

      1.6MB

    • memory/1380-81-0x0000000001F80000-0x000000000211F000-memory.dmp

      Filesize

      1.6MB