Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    31/08/2024, 17:37

General

  • Target

    DarkWareLoader.exe

  • Size

    2.3MB

  • MD5

    c42b185841679c16a7aed9ccf48e0d0d

  • SHA1

    0c6ad1cc0e6e8706c5913a8604d42449549c4da3

  • SHA256

    03bb14890ec3a3cdf397f6af5e87d4cdf122b564a64f89c5b6672e5cbcc57b01

  • SHA512

    c8ce057772905b620a9ea1910ce72410d49b327ce5256a6cf594d4a1df17bb3eed4a2b6664988c755b58ec31ee6e76ba87230edeb56c574e3b8bd0ff5c63135f

  • SSDEEP

    49152:4CI01yYHlo9MayICF/Xo1U7AZecga2jp:4CIAyYFS8w3UJd

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 11 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DarkWareLoader.exe
    "C:\Users\Admin\AppData\Local\Temp\DarkWareLoader.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2312
    • C:\Users\Admin\AppData\Local\Temp\concv1.exe
      "C:\Users\Admin\AppData\Local\Temp\concv1.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Windows\system32\cmd.exe
        /c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1772
        • C:\Windows\system32\reg.exe
          reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
          4⤵
            PID:2816
        • C:\Windows\system32\cmd.exe
          /c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\830441.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2356
          • C:\Windows\system32\reg.exe
            reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\830441.vbs" /f
            4⤵
            • Modifies registry class
            PID:1236
          • C:\Windows\system32\reg.exe
            reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f
            4⤵
            • Modifies registry class
            PID:2796
        • C:\Windows\system32\cmd.exe
          /c start /B ComputerDefaults.exe
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1204
          • C:\Windows\system32\ComputerDefaults.exe
            ComputerDefaults.exe
            4⤵
              PID:1624
          • C:\Windows\system32\cmd.exe
            /c del /f C:\Users\Admin\AppData\Local\Temp\830441.vbs
            3⤵
              PID:1248
            • C:\Windows\system32\cmd.exe
              /c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1212
              • C:\Windows\system32\reg.exe
                reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
                4⤵
                • Modifies registry class
                PID:1684
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 2748 -s 876
              3⤵
              • Loads dropped DLL
              PID:832
          • C:\Users\Admin\AppData\Local\Temp\DarkWare.exe
            "C:\Users\Admin\AppData\Local\Temp\DarkWare.exe"
            2⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Enumerates system info in registry
            • Modifies system certificate store
            • Suspicious use of AdjustPrivilegeToken
            PID:1416

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          619d1bd1f3c0e920a5e1e9d29d9627b2

          SHA1

          5d00b5c59410e8560732276ea88cc14b178e0dd0

          SHA256

          6ff79fe83e87a309fd64a3c9fe92545a53786e5c5fede5b9b537b6aebe25da53

          SHA512

          0d8fcd146b213fb352f35855a76484507a4ee5684ee2879f4b203ad81f296baa6523ac871ea27995e1496ef5a56c01ff0b40f22b57bcae96b4835c427d8376d6

        • C:\Users\Admin\AppData\Local\Temp\830441.vbs

          Filesize

          125B

          MD5

          8b4ed5c47fdddbeba260ef11cfca88c6

          SHA1

          868f11f8ed78ebe871f9da182d053f349834b017

          SHA256

          170226b93ac03ac3178c0429577626add00665e1d71be650a4c46674f6e262a5

          SHA512

          87e5bcaa143e616c365557f5af73e131a10eb380016633b8c7e38c83b0a216a8f6768cfa0166fad208d47830808444517e57d07d850ff2bd575ca67bad9eabdf

        • C:\Users\Admin\AppData\Local\Temp\CabED0F.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\DarkWare.exe

          Filesize

          1.9MB

          MD5

          2fe735b8323f0a8ad747737d3f3bc183

          SHA1

          4c42b0dc2fe774cb09eb1049897cb2f4205e318c

          SHA256

          6d7a95d3cfd8acdf6e3fafbbe35130db3da4d7281918bce6eb226bc5488f91d5

          SHA512

          022fac37dab002298231c9288c08ed13d812a1ac93c07064d386b539ac6141b39439dec676f70e3677fb89b6482f2ee475d19c67f90b634d5fa06e806f1fd17a

        • C:\Users\Admin\AppData\Local\Temp\TarEDDD.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • \Users\Admin\AppData\Local\Temp\concv1.exe

          Filesize

          230KB

          MD5

          f08723bcb5c94651b8df18a3ad027460

          SHA1

          e9f855543aab8f383a34d6a738889034daa6b5a3

          SHA256

          b8ca9e14e7adaa62220329b33138336146a2b3188215fcbd38365efc2f756460

          SHA512

          3f647c85345e08d533d15a3fab7394da3caff2b4fdbaaa83946321312f3f17d5cba018309d4b2206f083f9fd90f568c27399932c2ae5ae79200a05d6dd0da589

        • memory/1416-163-0x0000000004B90000-0x0000000004BD0000-memory.dmp

          Filesize

          256KB

        • memory/1416-16-0x00000000747BE000-0x00000000747BF000-memory.dmp

          Filesize

          4KB

        • memory/1416-162-0x00000000747BE000-0x00000000747BF000-memory.dmp

          Filesize

          4KB

        • memory/1416-19-0x0000000001260000-0x0000000001458000-memory.dmp

          Filesize

          2.0MB

        • memory/1416-20-0x0000000004B90000-0x0000000004BD0000-memory.dmp

          Filesize

          256KB

        • memory/1416-102-0x00000000065D0000-0x00000000067E2000-memory.dmp

          Filesize

          2.1MB

        • memory/2312-15-0x000007FEF6130000-0x000007FEF6B1C000-memory.dmp

          Filesize

          9.9MB

        • memory/2312-0-0x000007FEF6133000-0x000007FEF6134000-memory.dmp

          Filesize

          4KB

        • memory/2312-2-0x000007FEF6130000-0x000007FEF6B1C000-memory.dmp

          Filesize

          9.9MB

        • memory/2312-1-0x0000000000030000-0x0000000000288000-memory.dmp

          Filesize

          2.3MB

        • memory/2748-8-0x0000000000070000-0x0000000000071000-memory.dmp

          Filesize

          4KB

        • memory/2748-17-0x0000000000080000-0x0000000000081000-memory.dmp

          Filesize

          4KB