Analysis
-
max time kernel
150s -
max time network
163s -
platform
windows11-21h2_x64 -
resource
win11-20240704-en -
resource tags
arch:x64arch:x86image:win11-20240704-enlocale:en-usos:windows11-21h2-x64system -
submitted
06/07/2024, 22:56
Behavioral task
behavioral1
Sample
server.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
server.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
server.exe
Resource
win11-20240704-en
General
-
Target
server.exe
-
Size
611KB
-
MD5
c6c7deda791b7bc737fa1ba19d105d9e
-
SHA1
609ee268f94b63fd134f808ecbc8e1268d4c0c0f
-
SHA256
de4325e09dbb674ea3c417fb87d0b3ef7ea4fca50190415a35a23831ad465d3b
-
SHA512
7a9d009a0f56f95f4c9fd88f6633f9ec753b2a51665d451eb1fa737fe36f626bd9c3785db0844e2c3736fe512c4866d5463d9d01b5d55f8eb06ad943fbaf0d32
-
SSDEEP
12288:7eoNqBrEIfPe0hiRc7PvYtJupNl3mP9XsL5DP4BZs4ixsiNhkApRam:slEIfPb8RevYtJupNl3mP94DQv1ifNhh
Malware Config
Signatures
-
DarkTrack payload 16 IoCs
resource yara_rule behavioral3/files/0x000800000002a868-4.dat family_darktrack behavioral3/memory/3220-8-0x0000000000400000-0x00000000004A4000-memory.dmp family_darktrack behavioral3/memory/3304-9-0x0000000000400000-0x00000000004A4000-memory.dmp family_darktrack behavioral3/memory/3304-10-0x0000000000400000-0x00000000004A4000-memory.dmp family_darktrack behavioral3/memory/3304-11-0x0000000000400000-0x00000000004A4000-memory.dmp family_darktrack behavioral3/memory/3304-12-0x0000000000400000-0x00000000004A4000-memory.dmp family_darktrack behavioral3/memory/3304-13-0x0000000000400000-0x00000000004A4000-memory.dmp family_darktrack behavioral3/memory/3304-14-0x0000000000400000-0x00000000004A4000-memory.dmp family_darktrack behavioral3/memory/3304-15-0x0000000000400000-0x00000000004A4000-memory.dmp family_darktrack behavioral3/memory/3304-16-0x0000000000400000-0x00000000004A4000-memory.dmp family_darktrack behavioral3/memory/3304-17-0x0000000000400000-0x00000000004A4000-memory.dmp family_darktrack behavioral3/memory/3304-18-0x0000000000400000-0x00000000004A4000-memory.dmp family_darktrack behavioral3/memory/3304-19-0x0000000000400000-0x00000000004A4000-memory.dmp family_darktrack behavioral3/memory/3304-20-0x0000000000400000-0x00000000004A4000-memory.dmp family_darktrack behavioral3/memory/3304-21-0x0000000000400000-0x00000000004A4000-memory.dmp family_darktrack behavioral3/memory/3304-22-0x0000000000400000-0x00000000004A4000-memory.dmp family_darktrack -
Executes dropped EXE 1 IoCs
pid Process 3304 PowerShell.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2133704870-72480668-1360283475-1000\Software\Microsoft\Windows\CurrentVersion\Run\Winshell.exe server.exe Set value (str) \REGISTRY\USER\S-1-5-21-2133704870-72480668-1360283475-1000\Software\Microsoft\Windows\CurrentVersion\Run\Winshell.exe PowerShell.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\PowerShell.exe server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3304 PowerShell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3220 wrote to memory of 3332 3220 server.exe 81 PID 3220 wrote to memory of 3332 3220 server.exe 81 PID 3220 wrote to memory of 3332 3220 server.exe 81 PID 3220 wrote to memory of 3304 3220 server.exe 83 PID 3220 wrote to memory of 3304 3220 server.exe 83 PID 3220 wrote to memory of 3304 3220 server.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\server.exe >> NUL2⤵PID:3332
-
-
C:\Windows\PowerShell.exe"C:\Windows\PowerShell.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
PID:3304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
611KB
MD5c6c7deda791b7bc737fa1ba19d105d9e
SHA1609ee268f94b63fd134f808ecbc8e1268d4c0c0f
SHA256de4325e09dbb674ea3c417fb87d0b3ef7ea4fca50190415a35a23831ad465d3b
SHA5127a9d009a0f56f95f4c9fd88f6633f9ec753b2a51665d451eb1fa737fe36f626bd9c3785db0844e2c3736fe512c4866d5463d9d01b5d55f8eb06ad943fbaf0d32