Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
31/08/2024, 17:22
Static task
static1
Behavioral task
behavioral1
Sample
DarkWareLoader.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
DarkWareLoader.exe
Resource
win10v2004-20240802-en
General
-
Target
DarkWareLoader.exe
-
Size
2.3MB
-
MD5
c42b185841679c16a7aed9ccf48e0d0d
-
SHA1
0c6ad1cc0e6e8706c5913a8604d42449549c4da3
-
SHA256
03bb14890ec3a3cdf397f6af5e87d4cdf122b564a64f89c5b6672e5cbcc57b01
-
SHA512
c8ce057772905b620a9ea1910ce72410d49b327ce5256a6cf594d4a1df17bb3eed4a2b6664988c755b58ec31ee6e76ba87230edeb56c574e3b8bd0ff5c63135f
-
SSDEEP
49152:4CI01yYHlo9MayICF/Xo1U7AZecga2jp:4CIAyYFS8w3UJd
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral1/memory/2164-102-0x00000000065F0000-0x0000000006802000-memory.dmp family_agenttesla -
Executes dropped EXE 2 IoCs
pid Process 1408 concv1.exe 2164 DarkWare.exe -
Loads dropped DLL 5 IoCs
pid Process 2360 DarkWareLoader.exe 1832 WerFault.exe 1832 WerFault.exe 1832 WerFault.exe 1832 WerFault.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 9 raw.githubusercontent.com 10 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DarkWare.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion DarkWare.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS DarkWare.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer DarkWare.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\ms-settings\Shell\Open reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\348406.vbs" reg.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\ms-settings\Shell\Open\command reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\ms-settings\Shell\Open\command\DelegateExecute reg.exe Key deleted \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\ms-settings\Shell\Open reg.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\ms-settings\Shell reg.exe Key deleted \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\ms-settings\Shell reg.exe Key deleted \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\ms-settings reg.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 DarkWare.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 DarkWare.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 DarkWare.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 DarkWare.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2360 DarkWareLoader.exe Token: SeDebugPrivilege 2164 DarkWare.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2748 ComputerDefaults.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2360 wrote to memory of 1408 2360 DarkWareLoader.exe 31 PID 2360 wrote to memory of 1408 2360 DarkWareLoader.exe 31 PID 2360 wrote to memory of 1408 2360 DarkWareLoader.exe 31 PID 2360 wrote to memory of 2164 2360 DarkWareLoader.exe 32 PID 2360 wrote to memory of 2164 2360 DarkWareLoader.exe 32 PID 2360 wrote to memory of 2164 2360 DarkWareLoader.exe 32 PID 2360 wrote to memory of 2164 2360 DarkWareLoader.exe 32 PID 1408 wrote to memory of 1196 1408 concv1.exe 33 PID 1408 wrote to memory of 1196 1408 concv1.exe 33 PID 1408 wrote to memory of 1196 1408 concv1.exe 33 PID 1196 wrote to memory of 2536 1196 cmd.exe 35 PID 1196 wrote to memory of 2536 1196 cmd.exe 35 PID 1196 wrote to memory of 2536 1196 cmd.exe 35 PID 1408 wrote to memory of 2648 1408 concv1.exe 36 PID 1408 wrote to memory of 2648 1408 concv1.exe 36 PID 1408 wrote to memory of 2648 1408 concv1.exe 36 PID 2648 wrote to memory of 980 2648 cmd.exe 38 PID 2648 wrote to memory of 980 2648 cmd.exe 38 PID 2648 wrote to memory of 980 2648 cmd.exe 38 PID 2648 wrote to memory of 2452 2648 cmd.exe 39 PID 2648 wrote to memory of 2452 2648 cmd.exe 39 PID 2648 wrote to memory of 2452 2648 cmd.exe 39 PID 1408 wrote to memory of 1076 1408 concv1.exe 40 PID 1408 wrote to memory of 1076 1408 concv1.exe 40 PID 1408 wrote to memory of 1076 1408 concv1.exe 40 PID 1076 wrote to memory of 2748 1076 cmd.exe 42 PID 1076 wrote to memory of 2748 1076 cmd.exe 42 PID 1076 wrote to memory of 2748 1076 cmd.exe 42 PID 1408 wrote to memory of 2884 1408 concv1.exe 43 PID 1408 wrote to memory of 2884 1408 concv1.exe 43 PID 1408 wrote to memory of 2884 1408 concv1.exe 43 PID 1408 wrote to memory of 2024 1408 concv1.exe 45 PID 1408 wrote to memory of 2024 1408 concv1.exe 45 PID 1408 wrote to memory of 2024 1408 concv1.exe 45 PID 2024 wrote to memory of 1580 2024 cmd.exe 47 PID 2024 wrote to memory of 1580 2024 cmd.exe 47 PID 2024 wrote to memory of 1580 2024 cmd.exe 47 PID 1408 wrote to memory of 1832 1408 concv1.exe 48 PID 1408 wrote to memory of 1832 1408 concv1.exe 48 PID 1408 wrote to memory of 1832 1408 concv1.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\DarkWareLoader.exe"C:\Users\Admin\AppData\Local\Temp\DarkWareLoader.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\concv1.exe"C:\Users\Admin\AppData\Local\Temp\concv1.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:2536
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\348406.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f3⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\348406.vbs" /f4⤵
- Modifies registry class
PID:980
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵
- Modifies registry class
PID:2452
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe4⤵
- Suspicious use of FindShellTrayWindow
PID:2748
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\348406.vbs3⤵PID:2884
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f3⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵
- Modifies registry class
PID:1580
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1408 -s 8723⤵
- Loads dropped DLL
PID:1832
-
-
-
C:\Users\Admin\AppData\Local\Temp\DarkWare.exe"C:\Users\Admin\AppData\Local\Temp\DarkWare.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5036c606298eacbeabbb227a9e27e89b6
SHA1b06b853d0ea17a76e117ca9de2009cb4a7d7f3a2
SHA256deb592441949097eb7260021d511b5ff6c0fcb3363a1c4e639cca3733f6d55cc
SHA5127b3acdfc94ce1ea83d6829490f5b6743d031c8fc5a0bebaf95fb3d3b4a34c7f62b103b4240c87c7dec88e702d74de2f6d5e93af1c45234be21ca3a637574ef62
-
Filesize
125B
MD58b4ed5c47fdddbeba260ef11cfca88c6
SHA1868f11f8ed78ebe871f9da182d053f349834b017
SHA256170226b93ac03ac3178c0429577626add00665e1d71be650a4c46674f6e262a5
SHA51287e5bcaa143e616c365557f5af73e131a10eb380016633b8c7e38c83b0a216a8f6768cfa0166fad208d47830808444517e57d07d850ff2bd575ca67bad9eabdf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1.9MB
MD52fe735b8323f0a8ad747737d3f3bc183
SHA14c42b0dc2fe774cb09eb1049897cb2f4205e318c
SHA2566d7a95d3cfd8acdf6e3fafbbe35130db3da4d7281918bce6eb226bc5488f91d5
SHA512022fac37dab002298231c9288c08ed13d812a1ac93c07064d386b539ac6141b39439dec676f70e3677fb89b6482f2ee475d19c67f90b634d5fa06e806f1fd17a
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
230KB
MD5f08723bcb5c94651b8df18a3ad027460
SHA1e9f855543aab8f383a34d6a738889034daa6b5a3
SHA256b8ca9e14e7adaa62220329b33138336146a2b3188215fcbd38365efc2f756460
SHA5123f647c85345e08d533d15a3fab7394da3caff2b4fdbaaa83946321312f3f17d5cba018309d4b2206f083f9fd90f568c27399932c2ae5ae79200a05d6dd0da589