Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27-08-2024 16:54
Static task
static1
Behavioral task
behavioral1
Sample
1bc06334849768ebbd7afff675e4e3196984d00c495395ddb9050c8c5f780381.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1bc06334849768ebbd7afff675e4e3196984d00c495395ddb9050c8c5f780381.exe
Resource
win10v2004-20240802-en
General
-
Target
1bc06334849768ebbd7afff675e4e3196984d00c495395ddb9050c8c5f780381.exe
-
Size
4.9MB
-
MD5
9afafb511744b437365662e3647e8e76
-
SHA1
883956c959701ea092515d2262e7f71248bbd08e
-
SHA256
1bc06334849768ebbd7afff675e4e3196984d00c495395ddb9050c8c5f780381
-
SHA512
001010c095798369ea6338cb432f6dffa75f6badb6bd0d4f746a7d2d8c8740a9ab40b1de7ffc519538a312e46fb0621d81646db76b32a3d2aaa8d0283d856e03
-
SSDEEP
49152:C4Y60gIBGEyn4GoXW6WJKjuFs3HSqgblLWgqf8NY:bY6pHNJJ08qb
Malware Config
Extracted
darkgate
rastaa
44-35-63-31.internalsakamai.net
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
xKhQCrdc
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
rastaa
Signatures
-
Detect DarkGate stealer 5 IoCs
resource yara_rule behavioral1/memory/2076-10-0x0000000002F10000-0x000000000328B000-memory.dmp family_darkgate_v6 behavioral1/memory/2076-23-0x0000000002F10000-0x000000000328B000-memory.dmp family_darkgate_v6 behavioral1/memory/3028-33-0x0000000002700000-0x0000000002EA2000-memory.dmp family_darkgate_v6 behavioral1/memory/3028-32-0x0000000002700000-0x0000000002EA2000-memory.dmp family_darkgate_v6 behavioral1/memory/3028-31-0x0000000002700000-0x0000000002EA2000-memory.dmp family_darkgate_v6 -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 2076 created 1148 2076 Autoit3.exe 20 PID 3028 created 1072 3028 GoogleUpdateCore.exe 18 -
Downloads MZ/PE file
-
Deletes itself 1 IoCs
pid Process 1528 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2076 Autoit3.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\cgaaefc = "\"C:\\ProgramData\\adagefe\\Autoit3.exe\" C:\\ProgramData\\adagefe\\chffhdf.a3x" GoogleUpdateCore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\cgaaefc = "\"C:\\ProgramData\\adagefe\\Autoit3.exe\" C:\\ProgramData\\adagefe\\chffhdf.a3x" GoogleUpdateCore.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Autoit3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdateCore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdateCore.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1528 cmd.exe 3024 PING.EXE -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Autoit3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Autoit3.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 GoogleUpdateCore.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString GoogleUpdateCore.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 GoogleUpdateCore.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString GoogleUpdateCore.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3024 PING.EXE -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2076 Autoit3.exe 2076 Autoit3.exe 3028 GoogleUpdateCore.exe 3028 GoogleUpdateCore.exe 2084 GoogleUpdateCore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3028 GoogleUpdateCore.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2868 WMIC.exe Token: SeSecurityPrivilege 2868 WMIC.exe Token: SeTakeOwnershipPrivilege 2868 WMIC.exe Token: SeLoadDriverPrivilege 2868 WMIC.exe Token: SeSystemProfilePrivilege 2868 WMIC.exe Token: SeSystemtimePrivilege 2868 WMIC.exe Token: SeProfSingleProcessPrivilege 2868 WMIC.exe Token: SeIncBasePriorityPrivilege 2868 WMIC.exe Token: SeCreatePagefilePrivilege 2868 WMIC.exe Token: SeBackupPrivilege 2868 WMIC.exe Token: SeRestorePrivilege 2868 WMIC.exe Token: SeShutdownPrivilege 2868 WMIC.exe Token: SeDebugPrivilege 2868 WMIC.exe Token: SeSystemEnvironmentPrivilege 2868 WMIC.exe Token: SeRemoteShutdownPrivilege 2868 WMIC.exe Token: SeUndockPrivilege 2868 WMIC.exe Token: SeManageVolumePrivilege 2868 WMIC.exe Token: 33 2868 WMIC.exe Token: 34 2868 WMIC.exe Token: 35 2868 WMIC.exe Token: SeIncreaseQuotaPrivilege 2868 WMIC.exe Token: SeSecurityPrivilege 2868 WMIC.exe Token: SeTakeOwnershipPrivilege 2868 WMIC.exe Token: SeLoadDriverPrivilege 2868 WMIC.exe Token: SeSystemProfilePrivilege 2868 WMIC.exe Token: SeSystemtimePrivilege 2868 WMIC.exe Token: SeProfSingleProcessPrivilege 2868 WMIC.exe Token: SeIncBasePriorityPrivilege 2868 WMIC.exe Token: SeCreatePagefilePrivilege 2868 WMIC.exe Token: SeBackupPrivilege 2868 WMIC.exe Token: SeRestorePrivilege 2868 WMIC.exe Token: SeShutdownPrivilege 2868 WMIC.exe Token: SeDebugPrivilege 2868 WMIC.exe Token: SeSystemEnvironmentPrivilege 2868 WMIC.exe Token: SeRemoteShutdownPrivilege 2868 WMIC.exe Token: SeUndockPrivilege 2868 WMIC.exe Token: SeManageVolumePrivilege 2868 WMIC.exe Token: 33 2868 WMIC.exe Token: 34 2868 WMIC.exe Token: 35 2868 WMIC.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2076 2504 1bc06334849768ebbd7afff675e4e3196984d00c495395ddb9050c8c5f780381.exe 30 PID 2504 wrote to memory of 2076 2504 1bc06334849768ebbd7afff675e4e3196984d00c495395ddb9050c8c5f780381.exe 30 PID 2504 wrote to memory of 2076 2504 1bc06334849768ebbd7afff675e4e3196984d00c495395ddb9050c8c5f780381.exe 30 PID 2504 wrote to memory of 2076 2504 1bc06334849768ebbd7afff675e4e3196984d00c495395ddb9050c8c5f780381.exe 30 PID 2504 wrote to memory of 1528 2504 1bc06334849768ebbd7afff675e4e3196984d00c495395ddb9050c8c5f780381.exe 31 PID 2504 wrote to memory of 1528 2504 1bc06334849768ebbd7afff675e4e3196984d00c495395ddb9050c8c5f780381.exe 31 PID 2504 wrote to memory of 1528 2504 1bc06334849768ebbd7afff675e4e3196984d00c495395ddb9050c8c5f780381.exe 31 PID 1528 wrote to memory of 3024 1528 cmd.exe 33 PID 1528 wrote to memory of 3024 1528 cmd.exe 33 PID 1528 wrote to memory of 3024 1528 cmd.exe 33 PID 2076 wrote to memory of 2552 2076 Autoit3.exe 34 PID 2076 wrote to memory of 2552 2076 Autoit3.exe 34 PID 2076 wrote to memory of 2552 2076 Autoit3.exe 34 PID 2076 wrote to memory of 2552 2076 Autoit3.exe 34 PID 2552 wrote to memory of 2868 2552 cmd.exe 36 PID 2552 wrote to memory of 2868 2552 cmd.exe 36 PID 2552 wrote to memory of 2868 2552 cmd.exe 36 PID 2552 wrote to memory of 2868 2552 cmd.exe 36 PID 2076 wrote to memory of 3028 2076 Autoit3.exe 38 PID 2076 wrote to memory of 3028 2076 Autoit3.exe 38 PID 2076 wrote to memory of 3028 2076 Autoit3.exe 38 PID 2076 wrote to memory of 3028 2076 Autoit3.exe 38 PID 2076 wrote to memory of 3028 2076 Autoit3.exe 38 PID 2076 wrote to memory of 3028 2076 Autoit3.exe 38 PID 2076 wrote to memory of 3028 2076 Autoit3.exe 38 PID 2076 wrote to memory of 3028 2076 Autoit3.exe 38 PID 3028 wrote to memory of 2084 3028 GoogleUpdateCore.exe 39 PID 3028 wrote to memory of 2084 3028 GoogleUpdateCore.exe 39 PID 3028 wrote to memory of 2084 3028 GoogleUpdateCore.exe 39 PID 3028 wrote to memory of 2084 3028 GoogleUpdateCore.exe 39 PID 3028 wrote to memory of 2084 3028 GoogleUpdateCore.exe 39 PID 3028 wrote to memory of 2084 3028 GoogleUpdateCore.exe 39 PID 3028 wrote to memory of 2084 3028 GoogleUpdateCore.exe 39 PID 3028 wrote to memory of 2084 3028 GoogleUpdateCore.exe 39
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1072
-
C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe"C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2084
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1148
-
C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe"C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3028
-
-
C:\Users\Admin\AppData\Local\Temp\1bc06334849768ebbd7afff675e4e3196984d00c495395ddb9050c8c5f780381.exe"C:\Users\Admin\AppData\Local\Temp\1bc06334849768ebbd7afff675e4e3196984d00c495395ddb9050c8c5f780381.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
\??\c:\tes2\Autoit3.exec:\tes2\Autoit3.exe c:\tes2\mytes2.au32⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2076 -
\??\c:\windows\SysWOW64\cmd.exe"c:\windows\system32\cmd.exe" /c wmic ComputerSystem get domain > C:\ProgramData\adagefe\fafkfhc3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic ComputerSystem get domain4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c ping localhost & del /q /f "C:\Users\Admin\AppData\Local\Temp\1bc06334849768ebbd7afff675e4e3196984d00c495395ddb9050c8c5f780381.exe"2⤵
- Deletes itself
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\system32\PING.EXEping localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3024
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5447be72251d34f1c28b7a895b62f45ae
SHA1c86e243c596807ec66d23543d06899751ad206b6
SHA2567103f6eab49cad09648dd10c07bcb3224fbbcffdcb5dfce46cae393ccc5eb4af
SHA512488112e03477247872bd7e9ca86e2da61f13a76390f764b72908b2129d2a0f3ab9bf2379d358c25ff1272c96e2073b3678c1908a6d94e9b1fa2b3e0f5e631703
-
Filesize
54B
MD5c8bbad190eaaa9755c8dfb1573984d81
SHA117ad91294403223fde66f687450545a2bad72af5
SHA2567f136265128b7175fb67024a6ddd7524586b025725a878c07d76a9d8ad3dc2ac
SHA51205f02cf90969b7b9a2de39eecdf810a1835325e7c83ffe81388c9866c6f79be6cdc8617f606a8fedc6affe6127bede4b143106a90289bbb9bf61d94c648059df
-
Filesize
32B
MD5bf368fbb965829c82448e1fa701911a5
SHA102dc2a77f8d5c57b8cfa7a33805addc5b98b5f3f
SHA256ca2ac9552a553b6344f6ae7d1dd2f8aac7b4d8a92ad6a828149ad9c2a5af0cf3
SHA512ed44571a8b29a35a0fae219a503cbc0f2e3f1edc0827b10390319ea968336e0bb0c7f4dab89df9eb955a1891675e698c632e517050cc515c037c730a69df7d3b
-
Filesize
4B
MD555bfcae8a168976fd101b1e6b88dca33
SHA14eaecd28614a428d402d92dd8c4de8c2022af70e
SHA256203df76a32827c0ce0edbfb1c756000f924e4b47797bed4bd2876edc348e5647
SHA51220c68b6502283984611b7c4ebed55ad33bbd0f90bd1f9ee012b43246dafa6b6843fd463b7f4c20b4c1aec36fc684ad4532551fb1c3818c3bd5601dff1b9b3f62
-
Filesize
4B
MD5db2a2cf25af38c01818b6a154e510b9d
SHA1cb1034395324fb795da762ebd2bf98f6ccd71939
SHA256313d63a0ece058a5d5aecc9719f9be93628625d2d61498e01212c822f8bca325
SHA512d38c4e2df098545bd2dd252132a6a684dddee3ba91565cf9bbc96f693cf10728b2cd981e5ca373d2e9bc99d865017aff5663a7af2997c6f6134b0d3273a2b9d1
-
Filesize
4B
MD505f949a724d4faf9f5bfca45a9e43823
SHA19a47c5c48abb6f70ec77eaf041a80596ab1e9a9b
SHA256abf403139cb82e654d179dd52fc4186d997cd6a82845d030edc10d339c9db909
SHA512a9de5e9629d9db60fcb709aca97538c03dd82d0b2476aed98b0e54d08ef11e41e456495061064605f52f5e85917e901490d7e42df475fa3f6845a8ad5d830ffc
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
516KB
MD5d91891cae02a24735853100a3511d74f
SHA14ace59e166ec0632fb3a6668b2d58ff809250ec2
SHA256e2c3b31ee3615e2f39843d035f1990b94c12af1e42c34ce8e83c28b29c85567d
SHA512ec41191df9451a5ebbae58a743cff8db87ea1dd0adf23d3cb5bb8853db5ffc3d819fbf096ca8ee1d0767e44490e804a9f58341ef49979138ef958ee7e6f12903