Overview
overview
10Static
static
10exe/crypte...te.bat
windows10-1703-x64
10exe/crypte...er.vbs
windows10-1703-x64
10exe/crypte...-0.dll
windows10-1703-x64
1exe/crypte...e3.exe
windows10-1703-x64
3exe/crypte...-0.dll
windows10-1703-x64
3exe/crypte...in.exe
windows10-1703-x64
10exe/crypte...e3.dll
windows10-1703-x64
1libssp-0.dll
windows10-1703-x64
3pidgin.exe
windows10-1703-x64
10sqlite3.dll
windows10-1703-x64
1exe/non cr...x.html
windows10-1703-x64
4exe/non cr...ed.exe
windows10-1703-x64
10exe/non cr...x.html
windows10-1703-x64
4Resubmissions
25-08-2024 09:52
240825-lwb7jsxgmh 1022-08-2024 07:27
240822-h98wwsvdrh 1022-08-2024 07:21
240822-h651tsxhrk 1021-08-2024 20:21
240821-y44b8aydje 10Analysis
-
max time kernel
78s -
max time network
83s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
21-08-2024 20:21
Behavioral task
behavioral1
Sample
exe/crypted/Dakrgate 5864 startup plus rootkit/Batch file for 5864v dll crypted darkgate/update.bat
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
exe/crypted/Dakrgate 5864 startup plus rootkit/Crypted_with AU3 with startup only with decoded Launcher VBS/launcher.vbs
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
exe/crypted/Dakrgate 5864 startup plus rootkit/Crypted_with AU3 with startup only with decoded Launcher VBS/libssp-0.dll
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
exe/crypted/Dakrgate 5864 startup plus rootkit/Crypted_with AU3 with startup only with decoded Launcher VBS/sqlite3.exe
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
exe/crypted/Dakrgate 5864 startup plus rootkit/protected_AU3_cGig/libssp-0.dll
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
exe/crypted/Dakrgate 5864 startup plus rootkit/protected_AU3_cGig/pidgin.exe
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
exe/crypted/Dakrgate 5864 startup plus rootkit/protected_AU3_cGig/sqlite3.dll
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
libssp-0.dll
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
pidgin.exe
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
sqlite3.dll
Resource
win10-20240611-en
Behavioral task
behavioral11
Sample
exe/non crypted/Darkgate 5864 port sample not startup/index.html
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
exe/non crypted/Darkgate 5864 port sample not startup/stubbed.exe
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
exe/non crypted/index.html
Resource
win10-20240404-en
General
-
Target
exe/crypted/Dakrgate 5864 startup plus rootkit/protected_AU3_cGig/libssp-0.dll
-
Size
88KB
-
MD5
1f521e8b258d2b09f66fb8c940452b72
-
SHA1
7d669fe4108d40ed431a6728a27a2efc5c153bd0
-
SHA256
7786e9e3c7fe54f52b54e4bb922ef569ad68dc14f4096d530824556975e0f462
-
SHA512
61058ec95c20ff46f3613f3bd7647231943b64f8171eb0327ee72613a079bd9d8e639434208bb120b1d5242075a13be6686c0dfd31c04932a93f1bef413192d3
-
SSDEEP
1536:+wzc7A4bn7UPoru9A6KKsmD2LNEVYxi485/xchTF/fBcA7Oola9:Jc0on7UPoru93VrD2ZqYxi485ZcvniAm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1768 wrote to memory of 2784 1768 rundll32.exe 73 PID 1768 wrote to memory of 2784 1768 rundll32.exe 73 PID 1768 wrote to memory of 2784 1768 rundll32.exe 73
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\exe\crypted\Dakrgate 5864 startup plus rootkit\protected_AU3_cGig\libssp-0.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\exe\crypted\Dakrgate 5864 startup plus rootkit\protected_AU3_cGig\libssp-0.dll",#12⤵
- System Location Discovery: System Language Discovery
PID:2784
-