Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 09:03
Static task
static1
Behavioral task
behavioral1
Sample
86114406553868.csv.exe
Resource
win7-20240708-en
General
-
Target
86114406553868.csv.exe
-
Size
3.5MB
-
MD5
0bd370eef60a45fd61634df249b64b91
-
SHA1
6758f0170b8227ad373ec35e12e6f300f2f27b42
-
SHA256
6bef7c9809b35c7a2111872544e68aa29b8323f5936b6b1122c5f4138cf6e1e8
-
SHA512
b06159c59477dba32c69c53194e832ce2335d038761559328cb04f7f5286d4800fd68f9ac1d61f0063cb138e2e191876e13ab5ee0d03ca9bf44b70e086140f52
-
SSDEEP
49152:XwREDDMeGGezwQbVqL+ecrCkwYw4z0g3QjfkRiGqUydHeMxWrP+beY7UY714:XwREBGGezfI2hwYDzJQ7UqzdMwZgN
Malware Config
Extracted
darkgate
seeksoul
version6dkgate.duckdns.org
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
5864
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
hOTwjapB
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
seeksoul
Signatures
-
Detect DarkGate stealer 9 IoCs
resource yara_rule behavioral2/memory/3800-15-0x0000000004020000-0x0000000004311000-memory.dmp family_darkgate_v6 behavioral2/memory/3800-28-0x0000000004020000-0x0000000004311000-memory.dmp family_darkgate_v6 behavioral2/memory/2268-31-0x0000000003250000-0x00000000039F2000-memory.dmp family_darkgate_v6 behavioral2/memory/2268-38-0x0000000003250000-0x00000000039F2000-memory.dmp family_darkgate_v6 behavioral2/memory/2268-39-0x0000000003250000-0x00000000039F2000-memory.dmp family_darkgate_v6 behavioral2/memory/2268-41-0x0000000003250000-0x00000000039F2000-memory.dmp family_darkgate_v6 behavioral2/memory/2268-40-0x0000000003250000-0x00000000039F2000-memory.dmp family_darkgate_v6 behavioral2/memory/2268-37-0x0000000003250000-0x00000000039F2000-memory.dmp family_darkgate_v6 behavioral2/memory/2160-42-0x0000000002A20000-0x00000000031C2000-memory.dmp family_darkgate_v6 -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 3800 created 3892 3800 Autoit3.exe 60 PID 2268 created 2792 2268 GoogleUpdateCore.exe 49 -
Executes dropped EXE 2 IoCs
pid Process 4236 86114406553868.csv.tmp 3800 Autoit3.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kekgakd = "\"C:\\ProgramData\\dachdbh\\Autoit3.exe\" C:\\ProgramData\\dachdbh\\ehabcdh.a3x" GoogleUpdateCore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kekgakd = "\"C:\\ProgramData\\dachdbh\\Autoit3.exe\" C:\\ProgramData\\dachdbh\\ehabcdh.a3x" GoogleUpdateCore.exe -
Command and Scripting Interpreter: AutoIT 1 TTPs 1 IoCs
Using AutoIT for possible automate script.
pid Process 3800 Autoit3.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdateCore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdateCore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86114406553868.csv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86114406553868.csv.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Autoit3.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Autoit3.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 GoogleUpdateCore.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString GoogleUpdateCore.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 GoogleUpdateCore.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString GoogleUpdateCore.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Autoit3.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3800 Autoit3.exe 3800 Autoit3.exe 3800 Autoit3.exe 3800 Autoit3.exe 2268 GoogleUpdateCore.exe 2268 GoogleUpdateCore.exe 2268 GoogleUpdateCore.exe 2268 GoogleUpdateCore.exe 2160 GoogleUpdateCore.exe 2160 GoogleUpdateCore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2268 GoogleUpdateCore.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3192 WMIC.exe Token: SeSecurityPrivilege 3192 WMIC.exe Token: SeTakeOwnershipPrivilege 3192 WMIC.exe Token: SeLoadDriverPrivilege 3192 WMIC.exe Token: SeSystemProfilePrivilege 3192 WMIC.exe Token: SeSystemtimePrivilege 3192 WMIC.exe Token: SeProfSingleProcessPrivilege 3192 WMIC.exe Token: SeIncBasePriorityPrivilege 3192 WMIC.exe Token: SeCreatePagefilePrivilege 3192 WMIC.exe Token: SeBackupPrivilege 3192 WMIC.exe Token: SeRestorePrivilege 3192 WMIC.exe Token: SeShutdownPrivilege 3192 WMIC.exe Token: SeDebugPrivilege 3192 WMIC.exe Token: SeSystemEnvironmentPrivilege 3192 WMIC.exe Token: SeRemoteShutdownPrivilege 3192 WMIC.exe Token: SeUndockPrivilege 3192 WMIC.exe Token: SeManageVolumePrivilege 3192 WMIC.exe Token: 33 3192 WMIC.exe Token: 34 3192 WMIC.exe Token: 35 3192 WMIC.exe Token: 36 3192 WMIC.exe Token: SeIncreaseQuotaPrivilege 3192 WMIC.exe Token: SeSecurityPrivilege 3192 WMIC.exe Token: SeTakeOwnershipPrivilege 3192 WMIC.exe Token: SeLoadDriverPrivilege 3192 WMIC.exe Token: SeSystemProfilePrivilege 3192 WMIC.exe Token: SeSystemtimePrivilege 3192 WMIC.exe Token: SeProfSingleProcessPrivilege 3192 WMIC.exe Token: SeIncBasePriorityPrivilege 3192 WMIC.exe Token: SeCreatePagefilePrivilege 3192 WMIC.exe Token: SeBackupPrivilege 3192 WMIC.exe Token: SeRestorePrivilege 3192 WMIC.exe Token: SeShutdownPrivilege 3192 WMIC.exe Token: SeDebugPrivilege 3192 WMIC.exe Token: SeSystemEnvironmentPrivilege 3192 WMIC.exe Token: SeRemoteShutdownPrivilege 3192 WMIC.exe Token: SeUndockPrivilege 3192 WMIC.exe Token: SeManageVolumePrivilege 3192 WMIC.exe Token: 33 3192 WMIC.exe Token: 34 3192 WMIC.exe Token: 35 3192 WMIC.exe Token: 36 3192 WMIC.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4860 wrote to memory of 4236 4860 86114406553868.csv.exe 83 PID 4860 wrote to memory of 4236 4860 86114406553868.csv.exe 83 PID 4860 wrote to memory of 4236 4860 86114406553868.csv.exe 83 PID 4236 wrote to memory of 3800 4236 86114406553868.csv.tmp 86 PID 4236 wrote to memory of 3800 4236 86114406553868.csv.tmp 86 PID 4236 wrote to memory of 3800 4236 86114406553868.csv.tmp 86 PID 3800 wrote to memory of 4720 3800 Autoit3.exe 88 PID 3800 wrote to memory of 4720 3800 Autoit3.exe 88 PID 3800 wrote to memory of 4720 3800 Autoit3.exe 88 PID 4720 wrote to memory of 3192 4720 cmd.exe 90 PID 4720 wrote to memory of 3192 4720 cmd.exe 90 PID 4720 wrote to memory of 3192 4720 cmd.exe 90 PID 3800 wrote to memory of 2268 3800 Autoit3.exe 94 PID 3800 wrote to memory of 2268 3800 Autoit3.exe 94 PID 3800 wrote to memory of 2268 3800 Autoit3.exe 94 PID 3800 wrote to memory of 2268 3800 Autoit3.exe 94 PID 2268 wrote to memory of 2160 2268 GoogleUpdateCore.exe 96 PID 2268 wrote to memory of 2160 2268 GoogleUpdateCore.exe 96 PID 2268 wrote to memory of 2160 2268 GoogleUpdateCore.exe 96 PID 2268 wrote to memory of 2160 2268 GoogleUpdateCore.exe 96
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2792
-
C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe"C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2160
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3892
-
C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe"C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2268
-
-
C:\Users\Admin\AppData\Local\Temp\86114406553868.csv.exe"C:\Users\Admin\AppData\Local\Temp\86114406553868.csv.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\is-JVFV1.tmp\86114406553868.csv.tmp"C:\Users\Admin\AppData\Local\Temp\is-JVFV1.tmp\86114406553868.csv.tmp" /SL5="$5023C,2630150,845824,C:\Users\Admin\AppData\Local\Temp\86114406553868.csv.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\is-LLTGT.tmp\Autoit3.exe"C:\Users\Admin\AppData\Local\Temp\is-LLTGT.tmp\Autoit3.exe" C:\Users\Admin\AppData\Local\Temp\is-LLTGT.tmp\script.a3x3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Command and Scripting Interpreter: AutoIT
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3800 -
\??\c:\windows\SysWOW64\cmd.exe"c:\windows\system32\cmd.exe" /c wmic ComputerSystem get domain > C:\ProgramData\dachdbh\agakhhc4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic ComputerSystem get domain5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3192
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54B
MD5c8bbad190eaaa9755c8dfb1573984d81
SHA117ad91294403223fde66f687450545a2bad72af5
SHA2567f136265128b7175fb67024a6ddd7524586b025725a878c07d76a9d8ad3dc2ac
SHA51205f02cf90969b7b9a2de39eecdf810a1835325e7c83ffe81388c9866c6f79be6cdc8617f606a8fedc6affe6127bede4b143106a90289bbb9bf61d94c648059df
-
Filesize
1KB
MD55243ca20772934a8de1e9b1e0e60067e
SHA1a3cb2084284225d8f753d3b298cd09ee9a752b42
SHA25651e69ed0160b1259a9d7eae93016cd935ea2b1cb31ddd4442ad8c43fa1717e72
SHA512be35a347abf5abebff75c7474480acc1d3b74a815549de142c189f2aa9a8162d88a4f054fdc37a6652154f0ff07073ff94971b2379af8120d93f939260d53bf9
-
Filesize
3.2MB
MD5e587511f17c07622f2e88bde6dc2a499
SHA108899e43445db2e0d000b3afd80e028636786eeb
SHA2569fbf0748b5d890c2c28b1ae20aad7fc23a93cc7a57c4a51220d9381af7637c60
SHA5122e59d9c525c5383c4ea66c785584aa69256a47ffe928a6595cc2bf07469d2da4dd56dcd3d3d42496e593c39eec6356fc4c8a9cdeee6770c7e6c3319b8b614c6e
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
456KB
MD53694bf115b834e2259ac51b2e6a26f5c
SHA1305ff2b980ecdb533600a61770fd9a865eddaf55
SHA256900c32b827d80a48d734d8e33c1dc694f24fc60c277785808a7cbb2314c8b785
SHA51284790f75b2cd121de977c7be4fe383890be141e10bf854b5da931452ba973758587296bfd1cdb43b0c5cb444e8eca2778ecd62f93b143224a8847f6940890e0d
-
Filesize
32B
MD58e36126b29215eac519205d906d225dd
SHA174c1d96481c48cac3ff3a62876278d8e852583da
SHA25640f85271898641a4c3bd9e7976d2d5b0ba543a411116794e3eb3489151ec9d3f
SHA512183b864abe2e86c039e2285eb1c21af0ef735a1bfc748e53cdcbf296a461c71a1beb1a98ffb349e26db307362a360374865431a081ae2bfcb2de07b6d80c82f5
-
Filesize
4B
MD5e4a5967b3789b3740ab2a9978420347a
SHA15cbf9e3ac6d654b16adc498d1971bce8c479e91c
SHA25694c0346f3058dd1043e5aca730fc4463b6e398a11d7da08f4d2cb083c9b3c5cd
SHA51231ee148707f7088e5b3dfce10d0431565592f083b516e0d3177b11764cbaa5728127013596267342e64668dbd8da4c55c3cdbc837e1b5f33dcb446198f782fb2
-
Filesize
4B
MD57378ad0d1c5e83ff9cf27429834b5851
SHA1e9ba220984cd99a88282873163e13d89fab82f0e
SHA256dbb02b30cc8e2cfc7de84ac163c7ee60e22f68609b0eb305879c066cc66f14a5
SHA51209a3fec86a9f4e22ce5998ae4a814d8d6d2f55a81e5ae0b85b8d00abc61114009fb814eb6f6837caa8eb5b2599558ec4b3049bd813252c967e30eef6d890ba96
-
Filesize
4B
MD59f16cc1a6738eecd0e14ee9395539e93
SHA170c5970f2b3e93ef2d3ddbb75b1c74d7a23fa59b
SHA256f0cdc031a8eb18327c2eb3adb1bc3f27a11962164562d5f7581472abf8f70e3c
SHA51279de118b206ee80bfca21a6f662e3b0256a0ad96089df19783c3e47d396788156ee216b4cc1cda82d2900c4ca32ed1d096ce3369645322e4002789903363e15b