Resubmissions

14-05-2024 20:04

240514-ytkr5adh7v 10

14-05-2024 18:58

240514-xmglfsbc3x 10

Analysis

  • max time kernel
    48s
  • max time network
    35s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-05-2024 20:04

General

  • Target

    umkglnks.ps1

  • Size

    246B

  • MD5

    f2e4351aa516a1f2e59ade5d9e7aa1d6

  • SHA1

    1b751a2ee3af91c4cdf020914de19169fceb51ac

  • SHA256

    e9ad648589aa3e15ce61c6a3be4fc98429581be738792ed17a713b4980c9a4a2

  • SHA512

    ffc8ff99ea34d87efb5b869b1bc45acb5dd4557806afee79cdc32dc4fee66077ff4809d0918d266458c65044fc2516e8cd9aeac11a2a98128514de676d0a8e5c

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

flexiblemaria.com

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    rZyBgHHD

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Signatures

  • DarkGate

    DarkGate is an infostealer written in C++.

  • Detect DarkGate stealer 2 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Command and Scripting Interpreter: AutoIT 1 TTPs 1 IoCs

    Using AutoIT for possible automate script.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\umkglnks.ps1
    1⤵
    • Blocklisted process makes network request
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3356
    • C:\nkll\Autoit3.exe
      "C:\nkll\Autoit3.exe" script.a3x
      2⤵
      • Executes dropped EXE
      • Command and Scripting Interpreter: AutoIT
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:624
    • C:\Windows\system32\attrib.exe
      "C:\Windows\system32\attrib.exe" +h C:/nkll/
      2⤵
      • Views/modifies file attributes
      PID:3076
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4900
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe" "C:\Users\Admin\AppData\Local\Temp\umkglnks.ps1"
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2244

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_dvbjp3so.awj.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\nkll\Autoit3.exe

      Filesize

      872KB

      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • C:\nkll\script.a3x

      Filesize

      546KB

      MD5

      4d52ea9aa7cd3a0e820a9421d936073f

      SHA1

      562bf1190c92318d85b024689e6ecb2d021732f7

      SHA256

      2f05419f0baf87feb1c1f4ecb6d391fd9e8083e9e5219fba09875aaca85001a2

      SHA512

      1ea67e5807e8af5204994b78ddfdde611bb4dc465ceffdf5607dbc3c6faf0cfd09de820db912f3af71bb2053b049f6eb14458da540f8dae9364b7bef14f6a6a2

    • memory/624-39-0x00000000048C0000-0x0000000004C47000-memory.dmp

      Filesize

      3.5MB

    • memory/624-35-0x0000000001390000-0x0000000001790000-memory.dmp

      Filesize

      4.0MB

    • memory/624-36-0x00000000048C0000-0x0000000004C47000-memory.dmp

      Filesize

      3.5MB

    • memory/2244-41-0x000001B6FFAC0000-0x000001B6FFB0A000-memory.dmp

      Filesize

      296KB

    • memory/2244-42-0x000001B6FFA60000-0x000001B6FFA6E000-memory.dmp

      Filesize

      56KB

    • memory/2244-61-0x000001B6FFBE0000-0x000001B6FFC06000-memory.dmp

      Filesize

      152KB

    • memory/2244-60-0x000001B6FFAA0000-0x000001B6FFAA8000-memory.dmp

      Filesize

      32KB

    • memory/2244-59-0x000001B6FFA90000-0x000001B6FFA98000-memory.dmp

      Filesize

      32KB

    • memory/2244-58-0x000001B6FFA80000-0x000001B6FFA88000-memory.dmp

      Filesize

      32KB

    • memory/2244-48-0x000001B6FFA70000-0x000001B6FFA78000-memory.dmp

      Filesize

      32KB

    • memory/2244-43-0x000001B6FFB10000-0x000001B6FFB48000-memory.dmp

      Filesize

      224KB

    • memory/2244-40-0x000001B6FF6F0000-0x000001B6FF728000-memory.dmp

      Filesize

      224KB

    • memory/3356-11-0x00007FFE5BD20000-0x00007FFE5C7E1000-memory.dmp

      Filesize

      10.8MB

    • memory/3356-0-0x00007FFE5BD23000-0x00007FFE5BD25000-memory.dmp

      Filesize

      8KB

    • memory/3356-1-0x0000023640B10000-0x0000023640B32000-memory.dmp

      Filesize

      136KB

    • memory/3356-37-0x00007FFE5BD20000-0x00007FFE5C7E1000-memory.dmp

      Filesize

      10.8MB

    • memory/3356-16-0x0000023658F00000-0x0000023658F0A000-memory.dmp

      Filesize

      40KB

    • memory/3356-12-0x00007FFE5BD20000-0x00007FFE5C7E1000-memory.dmp

      Filesize

      10.8MB

    • memory/3356-14-0x00007FFE5BD20000-0x00007FFE5C7E1000-memory.dmp

      Filesize

      10.8MB

    • memory/3356-15-0x0000023658F20000-0x0000023658F32000-memory.dmp

      Filesize

      72KB