Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 01:45
Static task
static1
Behavioral task
behavioral1
Sample
75db6f949461cb03a155dd26c781a3c9e00edb917275f3b4d306b7094ed06a14.vbs
Resource
win7-20240221-en
General
-
Target
75db6f949461cb03a155dd26c781a3c9e00edb917275f3b4d306b7094ed06a14.vbs
-
Size
1KB
-
MD5
32f61baa669991fb989439babaf493ff
-
SHA1
4242d545077e3e643854e3148e00c8283533b9ab
-
SHA256
75db6f949461cb03a155dd26c781a3c9e00edb917275f3b4d306b7094ed06a14
-
SHA512
d20bf0b9a664caa9e9fe18dcb3899182b8f8bbb0275907bec6e3e888c0d2cd36a17ba24c49a3b92910ee075e6309aef5b8cf9392acf5833d66c0fbdcd3fdc2df
Malware Config
Extracted
darkgate
admin888
backupssupport.com
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
rNDPYLnH
-
minimum_disk
50
-
minimum_ram
4000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Signatures
-
Detect DarkGate stealer 2 IoCs
resource yara_rule behavioral1/memory/2368-53-0x0000000002370000-0x00000000023E5000-memory.dmp family_darkgate_v6 behavioral1/memory/2368-54-0x0000000002370000-0x00000000023E5000-memory.dmp family_darkgate_v6 -
Blocklisted process makes network request 1 IoCs
flow pid Process 4 2100 WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 2368 Autohotkey.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Autohotkey.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Autohotkey.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2368 Autohotkey.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2368 2100 WScript.exe 29 PID 2100 wrote to memory of 2368 2100 WScript.exe 29 PID 2100 wrote to memory of 2368 2100 WScript.exe 29 PID 2100 wrote to memory of 2368 2100 WScript.exe 29 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\75db6f949461cb03a155dd26c781a3c9e00edb917275f3b4d306b7094ed06a14.vbs"1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\QLlT\Autohotkey.exe"C:\QLlT\Autohotkey.exe" "c:\QLlT\script.ahk"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
892KB
MD5a59a2d3e5dda7aca6ec879263aa42fd3
SHA1312d496ec90eb30d5319307d47bfef602b6b8c6c
SHA256897b0d0e64cf87ac7086241c86f757f3c94d6826f949a1f0fec9c40892c0cecb
SHA512852972ca4d7f9141ea56d3498388c61610492d36ea7d7af1b36d192d7e04dd6d9bc5830e0dcb0a5f8f55350d4d8aaac2869477686b03f998affbac6321a22030
-
Filesize
777KB
MD560817831fc3ea259d45c9a537172f080
SHA1bc6be7d44565b13e1008a3b962abc9bc6ee44217
SHA25675d89fd4aa29e97e8859bdf734602490da0f90a4fd5213f737857d971c82e80c
SHA51202fc5b1202897e0d1d99ff636ab43b9d4bb6335f1fc538bd63d361b4025584f8196504f4366668dc919c1c8cb52eea3742fdf8746748dae00bef4af0c606ebdd
-
Filesize
930KB
MD509d0df57b9e2d00852322828d9791bec
SHA19c31734e88aaa19934cfd490a088d1d255103db7
SHA25651163c6eb169dfe30ebdbdc3193c25ecb264b7bd6e2e250be9824563f383464f
SHA51211479b5c09a3bb0b0216908895b7f6c6f6f640fc493b7463402ce796c3cd54bfca8443e8889f5a4f352d830074c08c6e75035618ee17db4f144023b853709ba6
-
Filesize
441B
MD5334f3fd6c9fe35fa7d5e7d2780d636ee
SHA1127f6bc9b9a42bf7036c3f39d66c87d32cddeaa2
SHA2561c4d704dcf8a341a8a6129743b1eb84681d53c4459cdb62fe2954e41adfed961
SHA51203389f83f96d6641e60003b6787a2f2726fc0affb6de9b9f92512fc79c49ca1c8d5448e3111f696ca1aa1c2b7268017f819e56292e8a3ed7d2d5f9224efb8e22