Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2024 22:56
Behavioral task
behavioral1
Sample
server.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
server.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
server.exe
Resource
win11-20240704-en
General
-
Target
server.exe
-
Size
611KB
-
MD5
c6c7deda791b7bc737fa1ba19d105d9e
-
SHA1
609ee268f94b63fd134f808ecbc8e1268d4c0c0f
-
SHA256
de4325e09dbb674ea3c417fb87d0b3ef7ea4fca50190415a35a23831ad465d3b
-
SHA512
7a9d009a0f56f95f4c9fd88f6633f9ec753b2a51665d451eb1fa737fe36f626bd9c3785db0844e2c3736fe512c4866d5463d9d01b5d55f8eb06ad943fbaf0d32
-
SSDEEP
12288:7eoNqBrEIfPe0hiRc7PvYtJupNl3mP9XsL5DP4BZs4ixsiNhkApRam:slEIfPb8RevYtJupNl3mP94DQv1ifNhh
Malware Config
Signatures
-
DarkTrack payload 3 IoCs
resource yara_rule behavioral2/files/0x000a0000000233b7-4.dat family_darktrack behavioral2/memory/1640-9-0x0000000000400000-0x00000000004A4000-memory.dmp family_darktrack behavioral2/memory/4368-8-0x0000000000400000-0x00000000004A4000-memory.dmp family_darktrack -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation server.exe -
Executes dropped EXE 1 IoCs
pid Process 1640 PowerShell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Winshell.exe server.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\PowerShell.exe server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4368 wrote to memory of 756 4368 server.exe 81 PID 4368 wrote to memory of 756 4368 server.exe 81 PID 4368 wrote to memory of 756 4368 server.exe 81 PID 4368 wrote to memory of 1640 4368 server.exe 83 PID 4368 wrote to memory of 1640 4368 server.exe 83 PID 4368 wrote to memory of 1640 4368 server.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\server.exe >> NUL2⤵PID:756
-
-
C:\Windows\PowerShell.exe"C:\Windows\PowerShell.exe"2⤵
- Executes dropped EXE
PID:1640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
611KB
MD5c6c7deda791b7bc737fa1ba19d105d9e
SHA1609ee268f94b63fd134f808ecbc8e1268d4c0c0f
SHA256de4325e09dbb674ea3c417fb87d0b3ef7ea4fca50190415a35a23831ad465d3b
SHA5127a9d009a0f56f95f4c9fd88f6633f9ec753b2a51665d451eb1fa737fe36f626bd9c3785db0844e2c3736fe512c4866d5463d9d01b5d55f8eb06ad943fbaf0d32