Analysis
-
max time kernel
132s -
max time network
142s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
06-07-2024 22:56
Behavioral task
behavioral1
Sample
server.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
server.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
server.exe
Resource
win11-20240704-en
General
-
Target
server.exe
-
Size
611KB
-
MD5
c6c7deda791b7bc737fa1ba19d105d9e
-
SHA1
609ee268f94b63fd134f808ecbc8e1268d4c0c0f
-
SHA256
de4325e09dbb674ea3c417fb87d0b3ef7ea4fca50190415a35a23831ad465d3b
-
SHA512
7a9d009a0f56f95f4c9fd88f6633f9ec753b2a51665d451eb1fa737fe36f626bd9c3785db0844e2c3736fe512c4866d5463d9d01b5d55f8eb06ad943fbaf0d32
-
SSDEEP
12288:7eoNqBrEIfPe0hiRc7PvYtJupNl3mP9XsL5DP4BZs4ixsiNhkApRam:slEIfPb8RevYtJupNl3mP94DQv1ifNhh
Malware Config
Signatures
-
DarkTrack payload 3 IoCs
resource yara_rule behavioral1/files/0x000900000001ab35-3.dat family_darktrack behavioral1/memory/1900-5-0x0000000000400000-0x00000000004A4000-memory.dmp family_darktrack behavioral1/memory/4912-6-0x0000000000400000-0x00000000004A4000-memory.dmp family_darktrack -
Executes dropped EXE 1 IoCs
pid Process 4912 PowerShell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Windows\CurrentVersion\Run\Winshell.exe server.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\PowerShell.exe server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1900 wrote to memory of 508 1900 server.exe 74 PID 1900 wrote to memory of 508 1900 server.exe 74 PID 1900 wrote to memory of 508 1900 server.exe 74 PID 1900 wrote to memory of 4912 1900 server.exe 76 PID 1900 wrote to memory of 4912 1900 server.exe 76 PID 1900 wrote to memory of 4912 1900 server.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\server.exe >> NUL2⤵PID:508
-
-
C:\Windows\PowerShell.exe"C:\Windows\PowerShell.exe"2⤵
- Executes dropped EXE
PID:4912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
611KB
MD5c6c7deda791b7bc737fa1ba19d105d9e
SHA1609ee268f94b63fd134f808ecbc8e1268d4c0c0f
SHA256de4325e09dbb674ea3c417fb87d0b3ef7ea4fca50190415a35a23831ad465d3b
SHA5127a9d009a0f56f95f4c9fd88f6633f9ec753b2a51665d451eb1fa737fe36f626bd9c3785db0844e2c3736fe512c4866d5463d9d01b5d55f8eb06ad943fbaf0d32