Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    02-04-2024 10:09

General

  • Target

    fc6ab939f5f2d6f12cb1edbe2babd5b180d8d036fc0b37a77f784d1c52162112.msi

  • Size

    4.3MB

  • MD5

    b88352bde539f79207be209759505f02

  • SHA1

    8ede7ee0a43c4282b41687408ddc38a243ac4bfd

  • SHA256

    fc6ab939f5f2d6f12cb1edbe2babd5b180d8d036fc0b37a77f784d1c52162112

  • SHA512

    104d4330c05e41d2039a0b61438565c88138ec9b2c55632ab0ec8eaf70840b095e1dd5bb5d55b65373099df80896632499ff5b3c85240d7a389824cb72268921

  • SSDEEP

    49152:zpUPB9qhCxzT+WKjSX15zLVI4vLeY9xV4qtGvmKBteU5oBgffUBS88qAU8:zpECQ1FLeYLVTV4WMVf

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

stachmentsuprimeresult.com

Attributes
  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    443

  • check_disk

    false

  • check_ram

    true

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    veVumtze

  • minimum_disk

    30

  • minimum_ram

    4096

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Signatures

  • DarkGate

    DarkGate is an infostealer written in C++.

  • Detect DarkGate stealer 3 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 11 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 53 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\fc6ab939f5f2d6f12cb1edbe2babd5b180d8d036fc0b37a77f784d1c52162112.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2924
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 33A05E2E47153C17C8F3A5DD27BBCE4D
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1096
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-6e8aca63-f8eb-4d4e-a9d3-a6d4a6489462\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
        3⤵
        • Modifies file permissions
        PID:2276
      • C:\Windows\SysWOW64\EXPAND.EXE
        "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
        3⤵
        • Drops file in Windows directory
        PID:3044
      • C:\Users\Admin\AppData\Local\Temp\MW-6e8aca63-f8eb-4d4e-a9d3-a6d4a6489462\files\iTunesHelper.exe
        "C:\Users\Admin\AppData\Local\Temp\MW-6e8aca63-f8eb-4d4e-a9d3-a6d4a6489462\files\iTunesHelper.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:3060
        • \??\c:\temp\Autoit3.exe
          "c:\temp\Autoit3.exe" c:\temp\script.au3
          4⤵
          • Executes dropped EXE
          • Checks processor information in registry
          PID:2892
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\Admin\AppData\Local\Temp\MW-6e8aca63-f8eb-4d4e-a9d3-a6d4a6489462\files"
        3⤵
          PID:1192
        • C:\Windows\SysWOW64\ICACLS.EXE
          "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-6e8aca63-f8eb-4d4e-a9d3-a6d4a6489462\." /SETINTEGRITYLEVEL (CI)(OI)LOW
          3⤵
          • Modifies file permissions
          PID:472
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2268
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000584" "00000000000003AC"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:2516

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\MW-6e8aca63-f8eb-4d4e-a9d3-a6d4a6489462\files.cab

      Filesize

      4.1MB

      MD5

      7333aa36063f51a7f1f9bb05fa679ab4

      SHA1

      2944bfdccabb766254b94c0a1d3665ec423d114b

      SHA256

      2d550bcc063ba4c3cd852edc0b36c49c1d70fbcd44a63ff035153b9f574b65e3

      SHA512

      0c89804413e0f4cb35c1a6c50d460da241aa8e0d011c1f4e1e813f3002093fc661c59adfc58ea4369f79f0c8d785b72d31ce965ccfe3a259d5eff485b5a80d3d

    • C:\Users\Admin\AppData\Local\Temp\MW-6e8aca63-f8eb-4d4e-a9d3-a6d4a6489462\files\iTunesHelper.exe

      Filesize

      358KB

      MD5

      ed6a1c72a75dee15a6fa75873cd64975

      SHA1

      67a15ca72e3156f8be6c46391e184087e47f4a0d

      SHA256

      0d8878cca08903777888b3681f90e4a07c7aef7d9600a67dfa985844d4bf5eda

      SHA512

      256c2ebfeb42c2d3340d8bb423ef0ae48d5fb9fe5ca09c363595f51a03007482b67a777e4cae7a8194f69bc3a3fbcdb9abb5c9f92097925272431bb9d50f5c03

    • C:\Users\Admin\AppData\Local\Temp\MW-6e8aca63-f8eb-4d4e-a9d3-a6d4a6489462\files\sqlite3.dll

      Filesize

      2.2MB

      MD5

      7f84dfa82977609c70e15708df513a0e

      SHA1

      4bc3db683396cda2b80e0e35650234574e6f78f3

      SHA256

      087ff871a8d10cb876601850d8c2bc976ac213ededda4fcc29056639f0888074

      SHA512

      adec7d2cd6776e8da52ccbb968d29f3b2ff1d091173211f7fc7e972f46cdbb486544fe877327b28295a3f53fce162f9179a20d6b5e60d950fb13fae3e4c00863

    • C:\Users\Admin\AppData\Local\Temp\MW-6e8aca63-f8eb-4d4e-a9d3-a6d4a6489462\msiwrapper.ini

      Filesize

      1KB

      MD5

      fb5f7d38f13554500dcfbad6f26f8f73

      SHA1

      0c2777b42777eee7aa139a04011c4cb7d08766fa

      SHA256

      3fec5ce2640a2b1de72be1d9d9b2fc964baedded28c963359db2e54c9479a581

      SHA512

      28cb64596aaecd8ea44ca816aec61f3334b865ab491baab841c50997018727858001762cfda54c9493c28cd3f42027cd142067c381892a096af19c477f425c2c

    • C:\Windows\Installer\MSI386E.tmp

      Filesize

      208KB

      MD5

      d82b3fb861129c5d71f0cd2874f97216

      SHA1

      f3fe341d79224126e950d2691d574d147102b18d

      SHA256

      107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

      SHA512

      244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

    • C:\temp\Autoit3.exe

      Filesize

      872KB

      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • \??\c:\temp\script.au3

      Filesize

      1.0MB

      MD5

      ff77fd2453e50e3d846587ec60ac8027

      SHA1

      4a7c389d241f7f486ee24229d13c0e553d255a8a

      SHA256

      43ed3e85a7f0c80a9b532c11853a30a39a570b57f9e61703426bd6f25c30dbab

      SHA512

      bf79b53049f947e9947a383677a6e797e703fada5eef96a762b11b7df727db6630c1697485861d9bfad0057865e119c86d10198d269cd144e4289b97992f040c

    • \??\c:\temp\test.txt

      Filesize

      76B

      MD5

      2b5beed06469bc15ef9d3fc81026d520

      SHA1

      32b9af19321d3a95a566f2720bf3594c8709017e

      SHA256

      bc694c165646842697db370a7688753a08bed7803aa9aaaf626e54ad77b3b0fe

      SHA512

      78963f15247f17099214e7c33d2fb9c3b01f1986334da01c2cddda957d7d916f74a0e7f1cf2d57b1afe6f52eb999e1cf2cf6b9fd3d2afdf7f6ec6b0a8532742a

    • \Users\Admin\AppData\Local\Temp\MW-6e8aca63-f8eb-4d4e-a9d3-a6d4a6489462\files\CoreFoundation.dll

      Filesize

      1.5MB

      MD5

      ce8ee7e4e7b695d4af2c3ecf8411e637

      SHA1

      dd7ea41c7c351e82ab5438b75a3d830574a0aa58

      SHA256

      7cdb07238c8cc903e13e689d4de1129f5fb3b647e4a1c1e98c5a0e8516184ed1

      SHA512

      ad3492b03af2d9b6bf2632fcc65703c0e06116ea3945c4bc401047842514e7789c31912e0887f20e234b58ce970ebd1486d9b5521a76c02dcc5e58804873c3b2

    • memory/2892-90-0x0000000003700000-0x00000000046D0000-memory.dmp

      Filesize

      15.8MB

    • memory/2892-92-0x0000000005110000-0x000000000545E000-memory.dmp

      Filesize

      3.3MB

    • memory/2892-93-0x0000000005110000-0x000000000545E000-memory.dmp

      Filesize

      3.3MB

    • memory/3060-78-0x00000000020B0000-0x00000000022E5000-memory.dmp

      Filesize

      2.2MB

    • memory/3060-84-0x00000000746B0000-0x000000007484D000-memory.dmp

      Filesize

      1.6MB

    • memory/3060-86-0x00000000020B0000-0x00000000022E5000-memory.dmp

      Filesize

      2.2MB