Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18-08-2024 09:13

General

  • Target

    6bef7c9809b35c7a2111872544e68aa29b8323f5936b6b1122c5f4138cf6e1e8.exe

  • Size

    3.5MB

  • MD5

    0bd370eef60a45fd61634df249b64b91

  • SHA1

    6758f0170b8227ad373ec35e12e6f300f2f27b42

  • SHA256

    6bef7c9809b35c7a2111872544e68aa29b8323f5936b6b1122c5f4138cf6e1e8

  • SHA512

    b06159c59477dba32c69c53194e832ce2335d038761559328cb04f7f5286d4800fd68f9ac1d61f0063cb138e2e191876e13ab5ee0d03ca9bf44b70e086140f52

  • SSDEEP

    49152:XwREDDMeGGezwQbVqL+ecrCkwYw4z0g3QjfkRiGqUydHeMxWrP+beY7UY714:XwREBGGezfI2hwYDzJQ7UqzdMwZgN

Malware Config

Extracted

Family

darkgate

Botnet

seeksoul

C2

version6dkgate.duckdns.org

Attributes
  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    5864

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    hOTwjapB

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    seeksoul

Signatures

  • DarkGate

    DarkGate is an infostealer written in C++.

  • Detect DarkGate stealer 7 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Command and Scripting Interpreter: AutoIT 1 TTPs 1 IoCs

    Using AutoIT for possible automate script.

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1108
      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe
        "C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of WriteProcessMemory
        PID:2732
    • C:\Users\Admin\AppData\Local\Temp\6bef7c9809b35c7a2111872544e68aa29b8323f5936b6b1122c5f4138cf6e1e8.exe
      "C:\Users\Admin\AppData\Local\Temp\6bef7c9809b35c7a2111872544e68aa29b8323f5936b6b1122c5f4138cf6e1e8.exe"
      1⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1660
      • C:\Users\Admin\AppData\Local\Temp\is-5U8Q7.tmp\6bef7c9809b35c7a2111872544e68aa29b8323f5936b6b1122c5f4138cf6e1e8.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-5U8Q7.tmp\6bef7c9809b35c7a2111872544e68aa29b8323f5936b6b1122c5f4138cf6e1e8.tmp" /SL5="$4001C,2630150,845824,C:\Users\Admin\AppData\Local\Temp\6bef7c9809b35c7a2111872544e68aa29b8323f5936b6b1122c5f4138cf6e1e8.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2348
        • C:\Users\Admin\AppData\Local\Temp\is-HDEKM.tmp\Autoit3.exe
          "C:\Users\Admin\AppData\Local\Temp\is-HDEKM.tmp\Autoit3.exe" C:\Users\Admin\AppData\Local\Temp\is-HDEKM.tmp\script.a3x
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Executes dropped EXE
          • Command and Scripting Interpreter: AutoIT
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2800
          • \??\c:\windows\SysWOW64\cmd.exe
            "c:\windows\system32\cmd.exe" /c wmic ComputerSystem get domain > C:\ProgramData\bcghccf\ekekcgh
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2900
            • C:\Windows\SysWOW64\Wbem\WMIC.exe
              wmic ComputerSystem get domain
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:2960
        • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe
          "C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe"
          3⤵
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          PID:2764

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\bcghccf\ebhhgea

      Filesize

      1KB

      MD5

      188ee282e68e8f2b5063e1c0c2361b26

      SHA1

      9cd4300bad71cbde4459b4776577921ea59b18a5

      SHA256

      60374b7f9f02fb8199c8c09850a5303600e867322af829dd5c873766f29ff150

      SHA512

      f6341a76e517069079cdf0d76007e8a2b7682eeea772f60a2315d79992b880adc050382be855e105540f18b358835f6845e7642977328997e210f162678e5113

    • C:\ProgramData\bcghccf\ekekcgh

      Filesize

      54B

      MD5

      c8bbad190eaaa9755c8dfb1573984d81

      SHA1

      17ad91294403223fde66f687450545a2bad72af5

      SHA256

      7f136265128b7175fb67024a6ddd7524586b025725a878c07d76a9d8ad3dc2ac

      SHA512

      05f02cf90969b7b9a2de39eecdf810a1835325e7c83ffe81388c9866c6f79be6cdc8617f606a8fedc6affe6127bede4b143106a90289bbb9bf61d94c648059df

    • C:\Users\Admin\AppData\Local\Temp\is-HDEKM.tmp\script.a3x

      Filesize

      456KB

      MD5

      3694bf115b834e2259ac51b2e6a26f5c

      SHA1

      305ff2b980ecdb533600a61770fd9a865eddaf55

      SHA256

      900c32b827d80a48d734d8e33c1dc694f24fc60c277785808a7cbb2314c8b785

      SHA512

      84790f75b2cd121de977c7be4fe383890be141e10bf854b5da931452ba973758587296bfd1cdb43b0c5cb444e8eca2778ecd62f93b143224a8847f6940890e0d

    • C:\Users\Admin\AppData\Roaming\CBBCEKK

      Filesize

      32B

      MD5

      5aab78e95485de68fa029a9e38496f9f

      SHA1

      814fb0f49064571aa3106b9382fed03c78764ad3

      SHA256

      f38e0aadd8d255c745a98536cd82762d9832a789c6398f552298f20716b70be0

      SHA512

      23ab5c073cbe1cc6d19525800c46e300fe60b5236762f65e8ceac59049d0caad1c5241fb3e8c9ec58e31ac66ea2de4585f328d7c56d084d9d282d456c4e0f338

    • C:\temp\aehchfd

      Filesize

      4B

      MD5

      d8a26e9094fb6edbd1c88c182bc60589

      SHA1

      d7b419de0af974b3c2133493c0f8fcd2a55181f6

      SHA256

      17b1b5f3947397e0791be01b38af88cad85ce0b5e5abe0591efcfe7096fe7ca6

      SHA512

      dbfef6fca6ff8e7467e364ba2d47a63d88847a0126059a41ff989eb9a9cf0a2f5f9d1dcbd5001baf751ca7b736d1f1d4321fc696d54938bdc66bce46a0f58cab

    • C:\temp\ffkaage

      Filesize

      4B

      MD5

      becdde31d22f3508b7e6fe5568aebd71

      SHA1

      e01e9c6b8966fb321c218f4ed503f7e3e8457d64

      SHA256

      45ce5bb2d65f408fbc82eae0bc8f8439d7ad3a0c0c8213bd37798a8483a0ec15

      SHA512

      bef2768755bdb98cafee144f547c8bbe00ba8e7eea2db71a3be632565830f8ca8d35d6261b882a4717a0474335db1947d914ea90ab8270ea492a3da5086f8380

    • C:\temp\ffkaage

      Filesize

      4B

      MD5

      14183545d91de4e4848e5f40e8050440

      SHA1

      85092b8646a07eb8481ab8f96e75572dd0350b3c

      SHA256

      535f456bbea3288a204e564137c3de049b1930e0847f7a3f7a0dcf80b26f36d2

      SHA512

      b71bcbfbaa524116879a6e222aa857b4c1f4764c9733f9e658204e1543b11362a2dd911664d374ace8dc0c653b1d351196199fbf1a44301d03654a40721b244d

    • \Users\Admin\AppData\Local\Temp\is-5U8Q7.tmp\6bef7c9809b35c7a2111872544e68aa29b8323f5936b6b1122c5f4138cf6e1e8.tmp

      Filesize

      3.2MB

      MD5

      e587511f17c07622f2e88bde6dc2a499

      SHA1

      08899e43445db2e0d000b3afd80e028636786eeb

      SHA256

      9fbf0748b5d890c2c28b1ae20aad7fc23a93cc7a57c4a51220d9381af7637c60

      SHA512

      2e59d9c525c5383c4ea66c785584aa69256a47ffe928a6595cc2bf07469d2da4dd56dcd3d3d42496e593c39eec6356fc4c8a9cdeee6770c7e6c3319b8b614c6e

    • \Users\Admin\AppData\Local\Temp\is-HDEKM.tmp\Autoit3.exe

      Filesize

      872KB

      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • memory/1660-47-0x0000000000A10000-0x0000000000AEC000-memory.dmp

      Filesize

      880KB

    • memory/1660-0-0x0000000000A10000-0x0000000000AEC000-memory.dmp

      Filesize

      880KB

    • memory/1660-2-0x0000000000A11000-0x0000000000AB9000-memory.dmp

      Filesize

      672KB

    • memory/2348-8-0x0000000000100000-0x0000000000101000-memory.dmp

      Filesize

      4KB

    • memory/2348-45-0x00000000010C0000-0x0000000001403000-memory.dmp

      Filesize

      3.3MB

    • memory/2732-32-0x0000000001E20000-0x00000000025C2000-memory.dmp

      Filesize

      7.6MB

    • memory/2732-42-0x0000000001E20000-0x00000000025C2000-memory.dmp

      Filesize

      7.6MB

    • memory/2732-41-0x0000000001E20000-0x00000000025C2000-memory.dmp

      Filesize

      7.6MB

    • memory/2732-38-0x0000000001E20000-0x00000000025C2000-memory.dmp

      Filesize

      7.6MB

    • memory/2732-40-0x0000000001E20000-0x00000000025C2000-memory.dmp

      Filesize

      7.6MB

    • memory/2732-39-0x0000000001E20000-0x00000000025C2000-memory.dmp

      Filesize

      7.6MB

    • memory/2764-43-0x0000000001F40000-0x00000000026E2000-memory.dmp

      Filesize

      7.6MB