Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 23:04
Behavioral task
behavioral1
Sample
DarkLoader.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
DarkLoader.exe
Resource
win10v2004-20240508-en
General
-
Target
DarkLoader.exe
-
Size
53KB
-
MD5
933eee79a0a2aeb87b75ae4000c9db84
-
SHA1
3caeb0343dd9d90eb28babae05d596914018a08c
-
SHA256
7c8a1f861858ab660ba9b18d3403f6f11481a78a63f61d266c0803948d9b59fd
-
SHA512
2c15951cc9acb4a45d3caa7ebb3cf08ea1139f3fdefbc26f59bb0b88a541de409a5996c391433738b01704dce4ee00611afe1c5d0cbec071c22c975fe0fa7b00
-
SSDEEP
768:nS7TZ38fvCv3E1c1rM+rMRa8NuKRtiHT:nuTZsHCv3Eau+gRJNBw
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 740 netsh.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
DarkLoader.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d3b2d1f551ce98af809927994e9d4293 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\DarkLoader.exe\" .." DarkLoader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\d3b2d1f551ce98af809927994e9d4293 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\DarkLoader.exe\" .." DarkLoader.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
-
Drops autorun.inf file 1 TTPs 5 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
DarkLoader.exedescription ioc process File created C:\autorun.inf DarkLoader.exe File opened for modification C:\autorun.inf DarkLoader.exe File created D:\autorun.inf DarkLoader.exe File created F:\autorun.inf DarkLoader.exe File opened for modification F:\autorun.inf DarkLoader.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
DarkLoader.exepid process 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe 4616 DarkLoader.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
DarkLoader.exepid process 4616 DarkLoader.exe -
Suspicious behavior: LoadsDriver 6 IoCs
Processes:
pid 4 4 4 4 4 664 -
Suspicious use of AdjustPrivilegeToken 37 IoCs
Processes:
DarkLoader.exedescription pid process Token: SeDebugPrivilege 4616 DarkLoader.exe Token: 33 4616 DarkLoader.exe Token: SeIncBasePriorityPrivilege 4616 DarkLoader.exe Token: 33 4616 DarkLoader.exe Token: SeIncBasePriorityPrivilege 4616 DarkLoader.exe Token: 33 4616 DarkLoader.exe Token: SeIncBasePriorityPrivilege 4616 DarkLoader.exe Token: 33 4616 DarkLoader.exe Token: SeIncBasePriorityPrivilege 4616 DarkLoader.exe Token: 33 4616 DarkLoader.exe Token: SeIncBasePriorityPrivilege 4616 DarkLoader.exe Token: 33 4616 DarkLoader.exe Token: SeIncBasePriorityPrivilege 4616 DarkLoader.exe Token: 33 4616 DarkLoader.exe Token: SeIncBasePriorityPrivilege 4616 DarkLoader.exe Token: 33 4616 DarkLoader.exe Token: SeIncBasePriorityPrivilege 4616 DarkLoader.exe Token: 33 4616 DarkLoader.exe Token: SeIncBasePriorityPrivilege 4616 DarkLoader.exe Token: 33 4616 DarkLoader.exe Token: SeIncBasePriorityPrivilege 4616 DarkLoader.exe Token: 33 4616 DarkLoader.exe Token: SeIncBasePriorityPrivilege 4616 DarkLoader.exe Token: 33 4616 DarkLoader.exe Token: SeIncBasePriorityPrivilege 4616 DarkLoader.exe Token: 33 4616 DarkLoader.exe Token: SeIncBasePriorityPrivilege 4616 DarkLoader.exe Token: 33 4616 DarkLoader.exe Token: SeIncBasePriorityPrivilege 4616 DarkLoader.exe Token: 33 4616 DarkLoader.exe Token: SeIncBasePriorityPrivilege 4616 DarkLoader.exe Token: 33 4616 DarkLoader.exe Token: SeIncBasePriorityPrivilege 4616 DarkLoader.exe Token: 33 4616 DarkLoader.exe Token: SeIncBasePriorityPrivilege 4616 DarkLoader.exe Token: 33 4616 DarkLoader.exe Token: SeIncBasePriorityPrivilege 4616 DarkLoader.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
DarkLoader.exedescription pid process target process PID 4616 wrote to memory of 740 4616 DarkLoader.exe netsh.exe PID 4616 wrote to memory of 740 4616 DarkLoader.exe netsh.exe PID 4616 wrote to memory of 740 4616 DarkLoader.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DarkLoader.exe"C:\Users\Admin\AppData\Local\Temp\DarkLoader.exe"1⤵
- Adds Run key to start application
- Drops autorun.inf file
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\DarkLoader.exe" "DarkLoader.exe" ENABLE2⤵
- Modifies Windows Firewall
PID:740
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1