Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 06:53
Behavioral task
behavioral1
Sample
8a93eabf56949eb69dc5c81a39645fec215d967d126751a8bb72e2f90a3c41c7.exe
Resource
win10v2004-20240802-en
General
-
Target
8a93eabf56949eb69dc5c81a39645fec215d967d126751a8bb72e2f90a3c41c7.exe
-
Size
434KB
-
MD5
32779bb4eda0b1834dc50d88f4930c3e
-
SHA1
7041fb14c8593d2657d4244d6930a35a2745f96e
-
SHA256
8a93eabf56949eb69dc5c81a39645fec215d967d126751a8bb72e2f90a3c41c7
-
SHA512
aeb8e88e9b016df87228be72517694f1c382fde0e1f42bb3e91f0fba22ef8abc7298aec89cb8439d1c1bb20ae2429f1d4bee5a99f9fd78f4a8d7840ca856b0c8
-
SSDEEP
12288:ObfJmY1oCMa3Wyex7ykWynLSKJ13oqnuj/ro:O7bKCM0ax7ykWynLRJ1Y+uTro
Malware Config
Extracted
darkgate
http://sanibroadbandcommunicton.duckdns.org
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
5864
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
true
-
crypto_key
LAbQdWWsbybjAY
-
internal_mutex
bbcAde
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
10
-
rootkit
false
-
startup_persistence
false
Signatures
-
Detect DarkGate stealer 11 IoCs
resource yara_rule behavioral1/memory/1868-2-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 behavioral1/memory/1868-4-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 behavioral1/memory/1868-3-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 behavioral1/memory/1868-6-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 behavioral1/memory/3408-5-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 behavioral1/memory/1868-11-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 behavioral1/memory/1868-13-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 behavioral1/memory/1868-12-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 behavioral1/memory/1868-10-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 behavioral1/memory/1868-14-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 behavioral1/memory/1868-15-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 -
Blocklisted process makes network request 12 IoCs
flow pid Process 20 1868 cmd.exe 21 1868 cmd.exe 32 1868 cmd.exe 45 1868 cmd.exe 49 1868 cmd.exe 55 1868 cmd.exe 60 1868 cmd.exe 66 1868 cmd.exe 79 1868 cmd.exe 81 1868 cmd.exe 83 1868 cmd.exe 85 1868 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3408 set thread context of 1868 3408 8a93eabf56949eb69dc5c81a39645fec215d967d126751a8bb72e2f90a3c41c7.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a93eabf56949eb69dc5c81a39645fec215d967d126751a8bb72e2f90a3c41c7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 8a93eabf56949eb69dc5c81a39645fec215d967d126751a8bb72e2f90a3c41c7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 8a93eabf56949eb69dc5c81a39645fec215d967d126751a8bb72e2f90a3c41c7.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3408 8a93eabf56949eb69dc5c81a39645fec215d967d126751a8bb72e2f90a3c41c7.exe 3408 8a93eabf56949eb69dc5c81a39645fec215d967d126751a8bb72e2f90a3c41c7.exe 1868 cmd.exe 1868 cmd.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3408 wrote to memory of 1868 3408 8a93eabf56949eb69dc5c81a39645fec215d967d126751a8bb72e2f90a3c41c7.exe 88 PID 3408 wrote to memory of 1868 3408 8a93eabf56949eb69dc5c81a39645fec215d967d126751a8bb72e2f90a3c41c7.exe 88 PID 3408 wrote to memory of 1868 3408 8a93eabf56949eb69dc5c81a39645fec215d967d126751a8bb72e2f90a3c41c7.exe 88 PID 3408 wrote to memory of 1868 3408 8a93eabf56949eb69dc5c81a39645fec215d967d126751a8bb72e2f90a3c41c7.exe 88 PID 3408 wrote to memory of 1868 3408 8a93eabf56949eb69dc5c81a39645fec215d967d126751a8bb72e2f90a3c41c7.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a93eabf56949eb69dc5c81a39645fec215d967d126751a8bb72e2f90a3c41c7.exe"C:\Users\Admin\AppData\Local\Temp\8a93eabf56949eb69dc5c81a39645fec215d967d126751a8bb72e2f90a3c41c7.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\SysWOW64\cmd.execmd.exe2⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180B
MD5f76b8e86aff46445f847c609f54da70a
SHA1847bbfe3a30543cc8af9b2d5c1b778fd07549196
SHA256a1fc74424e08f789ebe2e59a9f5b8866cca001a47fc39699087886cab836599d
SHA512fffd00fe63b93eeafa5314a5816c36c813d58a88698bf9948aa9335718411aebdf7477bd9cfbced735ea4597965e67314714416dcab7377c46bbdc1db6c7884e
-
Filesize
136B
MD5d0a223e4e19538f6cd46e0c62f26da49
SHA1420dbf4d876635fccf7f34df79ee7cd3574ec8d2
SHA256d709668a4d75eab598a62b4fa36e1edef03d873ec96241426d8a56a0ad2363e6
SHA512e51b59e9a2cbf84e0016b59f4f06ff349ba2b3aa32dd9c012cb6d2851f70c853b9f869b2a6b09ca3b74c9dbc688da2b3174f4b1f492948edd5d36a5b4971083a