Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-04-2024 10:09

General

  • Target

    e5e94056346367f7a8cf31fd7a2a47b4004623f1c8b74cb8f5d6ae110bef134a.msi

  • Size

    4.3MB

  • MD5

    643541e25802b30249ba4fd2f549e244

  • SHA1

    df45dbb9c09775be5567cf8dd92b8bf8e77dcc43

  • SHA256

    e5e94056346367f7a8cf31fd7a2a47b4004623f1c8b74cb8f5d6ae110bef134a

  • SHA512

    8c8aa5e51f22fc9f3edf3c292b535963745599833b2041746141467a3a490ba92274dfafa27b2d896639a3ca25740261779c129c20e004daa0ea56e6937c66d8

  • SSDEEP

    49152:ipUPP9qhCxzT+WKjSXsE6wsGjXZq5+iLirfmiiiiiiiiiQg7Xgnct6NymxAiOYUI:ipUCQHsWPieI5tjT

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

newdomainfortesteenestle.com

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    443

  • check_disk

    true

  • check_ram

    true

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    GWNUbwRE

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    false

  • username

    admin888

Signatures

  • DarkGate

    DarkGate is an infostealer written in C++.

  • Detect DarkGate stealer 1 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 11 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 53 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\e5e94056346367f7a8cf31fd7a2a47b4004623f1c8b74cb8f5d6ae110bef134a.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:548
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4336
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4104
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding F1EDFBEDE986C1DDDFC65A27FB515330
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1812
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-fd3ae698-5ce3-4b77-b46a-e35a52cdbdd6\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
        3⤵
        • Modifies file permissions
        PID:2660
      • C:\Windows\SysWOW64\EXPAND.EXE
        "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
        3⤵
        • Drops file in Windows directory
        PID:756
      • C:\Users\Admin\AppData\Local\Temp\MW-fd3ae698-5ce3-4b77-b46a-e35a52cdbdd6\files\vlc.exe
        "C:\Users\Admin\AppData\Local\Temp\MW-fd3ae698-5ce3-4b77-b46a-e35a52cdbdd6\files\vlc.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:4524
        • \??\c:\temp\Autoit3.exe
          "c:\temp\Autoit3.exe" c:\temp\script.au3
          4⤵
          • Executes dropped EXE
          • Checks processor information in registry
          PID:1832
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-fd3ae698-5ce3-4b77-b46a-e35a52cdbdd6\." /SETINTEGRITYLEVEL (CI)(OI)LOW
        3⤵
        • Modifies file permissions
        PID:3872
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:2984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MW-fd3ae698-5ce3-4b77-b46a-e35a52cdbdd6\files.cab

    Filesize

    4.0MB

    MD5

    c2271e53a3a03b0d87483d4ac6699d59

    SHA1

    e9a6ab1c3fa3ab19c70508c03677a8caef65c5b4

    SHA256

    29d7e4bf488c2f8951002648a6233b63df30e771cf03481195fca4580ebd8927

    SHA512

    c5e66108183f0c5f863e6b1c12d7d0db58113e6416907bbf3d5a897325789f16ac40e6885f5e4e11a58f9ef5fa75062dbad4f17f62dc8acb3f097c0b5bfe5063

  • C:\Users\Admin\AppData\Local\Temp\MW-fd3ae698-5ce3-4b77-b46a-e35a52cdbdd6\files\libvlc.dll

    Filesize

    1.5MB

    MD5

    40ae15c468001502dac0f06eb58fb302

    SHA1

    3b2599137a27fbc010aacde56b30e6f029bb12ae

    SHA256

    f7524f192f897d6166284ee8bc1caa16335b4d097bcb686f1247c10bef208762

    SHA512

    ae8bc69f806cbf40a24b11a3845bda17bff06ad1dd2fd639280da44474c849e06f4ba0ce17a586aebeb9b1ec04597ba16177a9380ebab720312c71a7758a0530

  • C:\Users\Admin\AppData\Local\Temp\MW-fd3ae698-5ce3-4b77-b46a-e35a52cdbdd6\files\sqlite3.dll

    Filesize

    1.6MB

    MD5

    6c124dce55818674b86161a930bc7445

    SHA1

    f84aa0557d828b7155d1cd5dfe80e94b3875cdb2

    SHA256

    07440467f2f703e1c983dadcd57fe1f439866c0fb77ef3a29b9578f14b3c1730

    SHA512

    2e702e179ea9a0e08da8f90281e21eb3631a0725742d61f6f6fd2ec298440ef7cf90a94542522d976d2c8a14b3a174e98af84d86a11ea5e7d7f080356bd43ba3

  • C:\Users\Admin\AppData\Local\Temp\MW-fd3ae698-5ce3-4b77-b46a-e35a52cdbdd6\files\vlc.exe

    Filesize

    966KB

    MD5

    035860e139ba6db1b38d5346cb6ff5b6

    SHA1

    d515303cbca3a8ae7a0463fecd418d81b314e650

    SHA256

    16197a321fc7b0a2a311e689621fe4a7cd50fdcb2d163973a31e4fd6352232d7

    SHA512

    14dab9108d85af72001631130923b94483dd1440f24a8eedad41756db3030c5e11e80ec894922c389e09c86e8b721bcbd8594bd3646f484560f89963a7e18cc7

  • C:\Users\Admin\AppData\Local\Temp\MW-fd3ae698-5ce3-4b77-b46a-e35a52cdbdd6\msiwrapper.ini

    Filesize

    396B

    MD5

    7547af99edfdf4f4894cb5995da09849

    SHA1

    e3e1774b4b0c581785788cd12127ca6c1ec5bd7c

    SHA256

    ed5fe2db40599c01fe443e394b7544e767b5ccb1722f974cca4b7ebbe66463af

    SHA512

    9b753ce2d3966751dfb1a2a6093bedd2fc0c234b5e0e53538a8d987a92f5bce68116e8e91aef4c10c842a050a57e9629aa34855e3d2354dc3f3a97970ddacc45

  • C:\Users\Admin\AppData\Local\Temp\MW-fd3ae698-5ce3-4b77-b46a-e35a52cdbdd6\msiwrapper.ini

    Filesize

    1KB

    MD5

    1212a2b060a0a5077916baa0d0ecae9f

    SHA1

    98a619418383731d14f27be22385839bbaa01eb0

    SHA256

    fbda6a1c523ccf4cdcbdefa5f024e2bf8ace92a84e27ee575c03387f1dccf978

    SHA512

    88bb9183e85ba94ddbf38368f76f91f86030e11cc9faca982d63088d76a89e96d51e5b4e85ea59425e06a0d2204e646ba53833947b7fcabef07e37c96934a066

  • C:\Users\Admin\AppData\Local\Temp\MW-fd3ae698-5ce3-4b77-b46a-e35a52cdbdd6\msiwrapper.ini

    Filesize

    1KB

    MD5

    fc175c043200dcd3f2986b9536ea850e

    SHA1

    2ff8786c42680f58cae5737b6b6876fc6a1d6ef8

    SHA256

    cf09bec8d86a1cd796069a302eb2f1edb24153a1f3cb9a538d171337fc4fca2e

    SHA512

    19e0cc66cd3c78f6fe5b083ab28892ec30e00ca4c3437bb01601318b9e7f2ade8c61d00ea1edccfd548dcb590baf892b3b1688a7b869265d5df58db83465a14b

  • C:\Windows\Installer\MSID476.tmp

    Filesize

    208KB

    MD5

    d82b3fb861129c5d71f0cd2874f97216

    SHA1

    f3fe341d79224126e950d2691d574d147102b18d

    SHA256

    107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

    SHA512

    244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

  • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

    Filesize

    23.7MB

    MD5

    b4570fda983b11fc4cc83716ba1d553b

    SHA1

    857134d8b97d91f44c19a63f95ccd96a4c7997c2

    SHA256

    701bd718538cca8ddddfd8b70888a25c3c83ec3641cea0bb157edd0f57f28516

    SHA512

    a8a43133c3a604c7ca4f519ef14dc55f8e08dc1243163b3fdd5fab8c3aa9b2000cc95086554e8d81d1d7b5d7878b3ed91ec4ff235abdb12097ae14fed4535911

  • \??\Volume{e992337d-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{c38f9c33-e495-422c-981c-cf7a2f2ef0b9}_OnDiskSnapshotProp

    Filesize

    6KB

    MD5

    d9c725b016755f6ef0ef9f5a6bb2e37a

    SHA1

    cb9d502dd7a8e9ea5acbbad3879c6402e1066a64

    SHA256

    753ced7813ab416d273c5ca702432c08fb7f74a8d754a332a74210f197a1a50c

    SHA512

    462c9d76334f94f6a05774d7ed5bcd0290394f6087613ba93e3d76df06da1426f93c87524c1e08774c10ede429084672987afb097cebc42a7e0e2b0812910f92

  • \??\c:\temp\Autoit3.exe

    Filesize

    872KB

    MD5

    c56b5f0201a3b3de53e561fe76912bfd

    SHA1

    2a4062e10a5de813f5688221dbeb3f3ff33eb417

    SHA256

    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

    SHA512

    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

  • \??\c:\temp\script.au3

    Filesize

    466KB

    MD5

    b395d416df27709427c17c04725a4c45

    SHA1

    c407d97bdb9bf1cd461fa40c66f261e3f92dd602

    SHA256

    78b3702f5c0f7efdf4598a2284cf3c7b3b51a6ae93a001029290bcc6a97bdc0a

    SHA512

    ec1b985bdb793e1acb9ed95681682ff712e8e518544214b0d648643b28a59c9c8cf6812879ea90a7319bd7853803a6fb3def19c5c897bd61b49c67c73c9c61c3

  • \??\c:\temp\test.txt

    Filesize

    76B

    MD5

    5e21c8ec8315c76c2e60eb1ff99040ca

    SHA1

    5b691e8bcf0967cc2b46aeb6dd7af91d8992ea25

    SHA256

    9e6861ac7aa15474d2d00afd67b2fdec473cf67a13116fddecf1495088e853ba

    SHA512

    ab10cda631047028e9321952430a9f7b1cd9a78cb59c8c192aaa72cc5a95cdeee96ef432f422e11bcddeb72170d97ba0093e29cc0ad07bb78e1c61c571f2553b

  • memory/1832-100-0x0000000005220000-0x00000000061F0000-memory.dmp

    Filesize

    15.8MB

  • memory/1832-101-0x0000000006710000-0x0000000006A5E000-memory.dmp

    Filesize

    3.3MB

  • memory/4524-83-0x00007FF618EC0000-0x00007FF618FB8000-memory.dmp

    Filesize

    992KB

  • memory/4524-86-0x000002D714B40000-0x000002D714CDE000-memory.dmp

    Filesize

    1.6MB

  • memory/4524-85-0x0000000055B40000-0x0000000055CCD000-memory.dmp

    Filesize

    1.6MB

  • memory/4524-79-0x000002D714B40000-0x000002D714CDE000-memory.dmp

    Filesize

    1.6MB