Analysis

  • max time kernel
    143s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 00:26

General

  • Target

    2024-05-23_19e407b6fe29797017c45ab33c80de0b_darkgate_magniber.exe

  • Size

    6.4MB

  • MD5

    19e407b6fe29797017c45ab33c80de0b

  • SHA1

    668a39cf3db3aa8fdb5d95481506de888c0ebbde

  • SHA256

    4ba6d134d0b56c39622ff5978f1582d1707d809090b46020c1a3ad489a102282

  • SHA512

    be6bf3f757e8dcd92a30d325221c9f15f467637f735c3842a22b8de302b31bcbae4524fe07ce9aa4a34883926c2fc77c659b619f11c95bfdd28a07b91cbebbf1

  • SSDEEP

    196608:GLnrxUCGSTOuajel1vEEBhyc7EYrTouj0k:GRaiD84ycxLj0k

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-23_19e407b6fe29797017c45ab33c80de0b_darkgate_magniber.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-23_19e407b6fe29797017c45ab33c80de0b_darkgate_magniber.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Users\Admin\AppData\Local\Temp\._cache_2024-05-23_19e407b6fe29797017c45ab33c80de0b_darkgate_magniber.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_2024-05-23_19e407b6fe29797017c45ab33c80de0b_darkgate_magniber.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2180
      • C:\Windows\system32\MSIEXEC.EXE
        "C:\Windows\system32\MSIEXEC.EXE" /i "C:\Users\Admin\AppData\Local\Temp\{CFF97961-C54F-447F-883F-5E97A6BFF9E7}\DIAS Installer Module.msi" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp" SETUPEXENAME="._cache_2024-05-23_19e407b6fe29797017c45ab33c80de0b_darkgate_magniber.exe"
        3⤵
        • Enumerates connected drives
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:2724
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:2028
      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        PID:2752
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2836
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding 9652BA43F327858127F138200F17F8D9 C
      2⤵
      • Loads dropped DLL
      PID:1480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    6.4MB

    MD5

    19e407b6fe29797017c45ab33c80de0b

    SHA1

    668a39cf3db3aa8fdb5d95481506de888c0ebbde

    SHA256

    4ba6d134d0b56c39622ff5978f1582d1707d809090b46020c1a3ad489a102282

    SHA512

    be6bf3f757e8dcd92a30d325221c9f15f467637f735c3842a22b8de302b31bcbae4524fe07ce9aa4a34883926c2fc77c659b619f11c95bfdd28a07b91cbebbf1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\MSI122A.tmp

    Filesize

    210KB

    MD5

    d0e93d8f24c62d3d419ff831d2141f60

    SHA1

    6115cab23ff1423d6920a75a19b76434d3f1ab0b

    SHA256

    61e63c049d6dd933703b53603cbc4437583483aa586c802c91f57cbc4453f5ac

    SHA512

    9300e22640406d83e6864d89d17c0e7944898e16add6faa77ec7ce8803fcee3e9859599440cd77c7010d143ca1bb6eb29d194c05f751d7e1c3632bbb7e2673bd

  • C:\Users\Admin\AppData\Local\Temp\{68622E8E-B1EC-43C8-AA01-8EEE5B23A6DA}\_ISMSIDEL.INI

    Filesize

    20B

    MD5

    db9af7503f195df96593ac42d5519075

    SHA1

    1b487531bad10f77750b8a50aca48593379e5f56

    SHA256

    0a33c5dffabcf31a1f6802026e9e2eef4b285e57fd79d52fdcd98d6502d14b13

    SHA512

    6839264e14576fe190260a4b82afc11c88e50593a20113483851bf4abfdb7cca9986bef83f4c6b8f98ef4d426f07024cf869e8ab393df6d2b743b9b8e2544e1b

  • C:\Users\Admin\AppData\Local\Temp\{CFF97961-C54F-447F-883F-5E97A6BFF9E7}\0x0409.ini

    Filesize

    21KB

    MD5

    be345d0260ae12c5f2f337b17e07c217

    SHA1

    0976ba0982fe34f1c35a0974f6178e15c238ed7b

    SHA256

    e994689a13b9448c074f9b471edeec9b524890a0d82925e98ab90b658016d8f3

    SHA512

    77040dbee29be6b136a83b9e444d8b4f71ff739f7157e451778fb4fccb939a67ff881a70483de16bcb6ae1fea64a89e00711a33ec26f4d3eea8e16c9e9553eff

  • C:\Users\Admin\AppData\Local\Temp\{CFF97961-C54F-447F-883F-5E97A6BFF9E7}\DIAS Installer Module.msi

    Filesize

    2.4MB

    MD5

    6d79149cc3f1f111d9c7b669d19251aa

    SHA1

    fa78d2799a7de687951edd3b5ac8e1995f3b0929

    SHA256

    3e6a00678821ecda14e7f791c27daf27b89007493cabba9264cda50487bc34df

    SHA512

    1fc5c71aca969f6599f9461d679cc11108444f107d18bbc3942ede356632230574d14ea86f62ff98e300f3023382027ed22bd8d27507e6361c12b38c357b1d8f

  • C:\Users\Admin\AppData\Local\Temp\~FD81.tmp

    Filesize

    5KB

    MD5

    5ebba1745981b75348ab33ef1fd77ee5

    SHA1

    f457a3da8349c112509fca2b16e988679fad66ec

    SHA256

    ed28f5e3ccd6e3f06705f8b74e639ed79a1d14275405d4222faf028cd140af5e

    SHA512

    6ab41dce132159edfef0013059e9347e1d64946615ac82f0a760b1935396a13dcfae557ef3c65033ee22fb00bc3e79c73758fa7a74e9b668a1c366ac6721e7b9

  • \Users\Admin\AppData\Local\Temp\._cache_2024-05-23_19e407b6fe29797017c45ab33c80de0b_darkgate_magniber.exe

    Filesize

    5.7MB

    MD5

    953078f0242c7028b50c96a62989e331

    SHA1

    6f5805dc5eb0c35c8d34f05862c5f01ed21f68e1

    SHA256

    484595fbbdb007fbb2bd16e609ba1c1371fd9749c1c8bb6b40a7f257fdb67c3d

    SHA512

    9cdb2cd87b7505f6482cd0c47e886864300392634f45f310342af32a042f79412c31560e4f9fca469bc5e7ec0b4c99ca682833df85fd9d1bded2c90164f44bf3

  • memory/2028-91-0x0000000000400000-0x0000000000A6F000-memory.dmp

    Filesize

    6.4MB

  • memory/2028-157-0x0000000000400000-0x0000000000A6F000-memory.dmp

    Filesize

    6.4MB

  • memory/2028-162-0x0000000000400000-0x0000000000A6F000-memory.dmp

    Filesize

    6.4MB

  • memory/2244-55-0x0000000000400000-0x0000000000A6F000-memory.dmp

    Filesize

    6.4MB

  • memory/2244-0-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB