Analysis

  • max time kernel
    15s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 15:43

General

  • Target

    Dark.exe

  • Size

    2.2MB

  • MD5

    b0c952e0a98835d76da62b3bd4cb7828

  • SHA1

    eb7fb06d56bdf35a8d253debf56b4fad947d5505

  • SHA256

    f722a7285a79f697284d7e376ea3122398c84be2a13eed2b2470ff03d752faad

  • SHA512

    26b1654de14667ed5181e136cf70394f280c85758782e28fae86675e93466602f7fdd3d8c1efd0b4a70bb9ddc8be4e527e45797c433067935062c64465245d7c

  • SSDEEP

    49152:/0X0AsmM6YOcXExsPq2QdGcrkEhsuC06aGHYxKGOoz:/tAsmy/y90V8oHlZ

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 11 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Dark.exe
    "C:\Users\Admin\AppData\Local\Temp\Dark.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Users\Admin\AppData\Local\Temp\Com.exe
      "C:\Users\Admin\AppData\Local\Temp\Com.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1152
      • C:\Windows\system32\cmd.exe
        /c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1700
        • C:\Windows\system32\reg.exe
          reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
          4⤵
            PID:2912
        • C:\Windows\system32\cmd.exe
          /c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\870203.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2920
          • C:\Windows\system32\reg.exe
            reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\870203.vbs" /f
            4⤵
            • Modifies registry class
            PID:2976
          • C:\Windows\system32\reg.exe
            reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f
            4⤵
            • Modifies registry class
            PID:2992
        • C:\Windows\system32\cmd.exe
          /c start /B ComputerDefaults.exe
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3056
          • C:\Windows\system32\ComputerDefaults.exe
            ComputerDefaults.exe
            4⤵
              PID:1332
          • C:\Windows\system32\cmd.exe
            /c del /f C:\Users\Admin\AppData\Local\Temp\870203.vbs
            3⤵
              PID:2908
            • C:\Windows\system32\cmd.exe
              /c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2220
              • C:\Windows\system32\reg.exe
                reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
                4⤵
                • Modifies registry class
                PID:2424
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 1152 -s 756
              3⤵
              • Loads dropped DLL
              PID:2024
          • C:\Users\Admin\AppData\Local\Temp\DarkWare.exe
            "C:\Users\Admin\AppData\Local\Temp\DarkWare.exe"
            2⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Enumerates system info in registry
            • Modifies system certificate store
            • Suspicious use of AdjustPrivilegeToken
            PID:2876

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          5caba919293a88071e436d0cbc4ce9bd

          SHA1

          440725a2ece4070811b794346f088048983bf25c

          SHA256

          55062e093685dda2c5145914a7cf4e813f087dd12c0cc80d99cf40779fa52598

          SHA512

          f858bf1fb21df081321cc86c7d4c4ad7251d93c0734414fc8b9b9568e8a2dae69e820593af775ccf3ae5919d016b01aa370562c476289d84d58165ca4b23d9c1

        • C:\Users\Admin\AppData\Local\Temp\870203.vbs

          Filesize

          125B

          MD5

          8b4ed5c47fdddbeba260ef11cfca88c6

          SHA1

          868f11f8ed78ebe871f9da182d053f349834b017

          SHA256

          170226b93ac03ac3178c0429577626add00665e1d71be650a4c46674f6e262a5

          SHA512

          87e5bcaa143e616c365557f5af73e131a10eb380016633b8c7e38c83b0a216a8f6768cfa0166fad208d47830808444517e57d07d850ff2bd575ca67bad9eabdf

        • C:\Users\Admin\AppData\Local\Temp\Cab45E8.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\DarkWare.exe

          Filesize

          2.0MB

          MD5

          20f94ee7f660352e0c8a14810a183350

          SHA1

          1a39916394380b3ba2fba53249fa82ffc88e2876

          SHA256

          7f14473c3d2bc352e829f2c15754cf8a41f43bbadd9413b5765c65913660a922

          SHA512

          c1c4933d81234507cad12a524426e69096f28f710e61ad1a0cdb011567c6ca9b67bf24e2f74d87d1df8d7462de08add33bdbb0d4628efd4d55f6fe0bac96125e

        • C:\Users\Admin\AppData\Local\Temp\Tar46E5.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • \Users\Admin\AppData\Local\Temp\Com.exe

          Filesize

          230KB

          MD5

          f08723bcb5c94651b8df18a3ad027460

          SHA1

          e9f855543aab8f383a34d6a738889034daa6b5a3

          SHA256

          b8ca9e14e7adaa62220329b33138336146a2b3188215fcbd38365efc2f756460

          SHA512

          3f647c85345e08d533d15a3fab7394da3caff2b4fdbaaa83946321312f3f17d5cba018309d4b2206f083f9fd90f568c27399932c2ae5ae79200a05d6dd0da589

        • memory/1152-20-0x0000000000100000-0x0000000000101000-memory.dmp

          Filesize

          4KB

        • memory/1152-17-0x00000000000E0000-0x00000000000E1000-memory.dmp

          Filesize

          4KB

        • memory/2388-16-0x000007FEF5B70000-0x000007FEF655C000-memory.dmp

          Filesize

          9.9MB

        • memory/2388-7-0x000007FEF5B70000-0x000007FEF655C000-memory.dmp

          Filesize

          9.9MB

        • memory/2388-0-0x000007FEF5B73000-0x000007FEF5B74000-memory.dmp

          Filesize

          4KB

        • memory/2388-1-0x0000000001270000-0x00000000014AA000-memory.dmp

          Filesize

          2.2MB

        • memory/2876-18-0x000000007451E000-0x000000007451F000-memory.dmp

          Filesize

          4KB

        • memory/2876-21-0x00000000013C0000-0x00000000015C0000-memory.dmp

          Filesize

          2.0MB

        • memory/2876-22-0x0000000005010000-0x0000000005050000-memory.dmp

          Filesize

          256KB

        • memory/2876-104-0x00000000061A0000-0x00000000063B2000-memory.dmp

          Filesize

          2.1MB

        • memory/2876-107-0x000000007451E000-0x000000007451F000-memory.dmp

          Filesize

          4KB

        • memory/2876-161-0x0000000005010000-0x0000000005050000-memory.dmp

          Filesize

          256KB