Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    31/08/2024, 17:22

General

  • Target

    DarkWareLoader.exe

  • Size

    2.3MB

  • MD5

    c42b185841679c16a7aed9ccf48e0d0d

  • SHA1

    0c6ad1cc0e6e8706c5913a8604d42449549c4da3

  • SHA256

    03bb14890ec3a3cdf397f6af5e87d4cdf122b564a64f89c5b6672e5cbcc57b01

  • SHA512

    c8ce057772905b620a9ea1910ce72410d49b327ce5256a6cf594d4a1df17bb3eed4a2b6664988c755b58ec31ee6e76ba87230edeb56c574e3b8bd0ff5c63135f

  • SSDEEP

    49152:4CI01yYHlo9MayICF/Xo1U7AZecga2jp:4CIAyYFS8w3UJd

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 11 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DarkWareLoader.exe
    "C:\Users\Admin\AppData\Local\Temp\DarkWareLoader.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Users\Admin\AppData\Local\Temp\concv1.exe
      "C:\Users\Admin\AppData\Local\Temp\concv1.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1408
      • C:\Windows\system32\cmd.exe
        /c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1196
        • C:\Windows\system32\reg.exe
          reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
          4⤵
            PID:2536
        • C:\Windows\system32\cmd.exe
          /c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\348406.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2648
          • C:\Windows\system32\reg.exe
            reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\348406.vbs" /f
            4⤵
            • Modifies registry class
            PID:980
          • C:\Windows\system32\reg.exe
            reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f
            4⤵
            • Modifies registry class
            PID:2452
        • C:\Windows\system32\cmd.exe
          /c start /B ComputerDefaults.exe
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1076
          • C:\Windows\system32\ComputerDefaults.exe
            ComputerDefaults.exe
            4⤵
            • Suspicious use of FindShellTrayWindow
            PID:2748
        • C:\Windows\system32\cmd.exe
          /c del /f C:\Users\Admin\AppData\Local\Temp\348406.vbs
          3⤵
            PID:2884
          • C:\Windows\system32\cmd.exe
            /c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2024
            • C:\Windows\system32\reg.exe
              reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
              4⤵
              • Modifies registry class
              PID:1580
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 1408 -s 872
            3⤵
            • Loads dropped DLL
            PID:1832
        • C:\Users\Admin\AppData\Local\Temp\DarkWare.exe
          "C:\Users\Admin\AppData\Local\Temp\DarkWare.exe"
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Enumerates system info in registry
          • Modifies system certificate store
          • Suspicious use of AdjustPrivilegeToken
          PID:2164

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        036c606298eacbeabbb227a9e27e89b6

        SHA1

        b06b853d0ea17a76e117ca9de2009cb4a7d7f3a2

        SHA256

        deb592441949097eb7260021d511b5ff6c0fcb3363a1c4e639cca3733f6d55cc

        SHA512

        7b3acdfc94ce1ea83d6829490f5b6743d031c8fc5a0bebaf95fb3d3b4a34c7f62b103b4240c87c7dec88e702d74de2f6d5e93af1c45234be21ca3a637574ef62

      • C:\Users\Admin\AppData\Local\Temp\348406.vbs

        Filesize

        125B

        MD5

        8b4ed5c47fdddbeba260ef11cfca88c6

        SHA1

        868f11f8ed78ebe871f9da182d053f349834b017

        SHA256

        170226b93ac03ac3178c0429577626add00665e1d71be650a4c46674f6e262a5

        SHA512

        87e5bcaa143e616c365557f5af73e131a10eb380016633b8c7e38c83b0a216a8f6768cfa0166fad208d47830808444517e57d07d850ff2bd575ca67bad9eabdf

      • C:\Users\Admin\AppData\Local\Temp\CabF402.tmp

        Filesize

        70KB

        MD5

        49aebf8cbd62d92ac215b2923fb1b9f5

        SHA1

        1723be06719828dda65ad804298d0431f6aff976

        SHA256

        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

        SHA512

        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

      • C:\Users\Admin\AppData\Local\Temp\DarkWare.exe

        Filesize

        1.9MB

        MD5

        2fe735b8323f0a8ad747737d3f3bc183

        SHA1

        4c42b0dc2fe774cb09eb1049897cb2f4205e318c

        SHA256

        6d7a95d3cfd8acdf6e3fafbbe35130db3da4d7281918bce6eb226bc5488f91d5

        SHA512

        022fac37dab002298231c9288c08ed13d812a1ac93c07064d386b539ac6141b39439dec676f70e3677fb89b6482f2ee475d19c67f90b634d5fa06e806f1fd17a

      • C:\Users\Admin\AppData\Local\Temp\TarF481.tmp

        Filesize

        181KB

        MD5

        4ea6026cf93ec6338144661bf1202cd1

        SHA1

        a1dec9044f750ad887935a01430bf49322fbdcb7

        SHA256

        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

        SHA512

        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

      • \Users\Admin\AppData\Local\Temp\concv1.exe

        Filesize

        230KB

        MD5

        f08723bcb5c94651b8df18a3ad027460

        SHA1

        e9f855543aab8f383a34d6a738889034daa6b5a3

        SHA256

        b8ca9e14e7adaa62220329b33138336146a2b3188215fcbd38365efc2f756460

        SHA512

        3f647c85345e08d533d15a3fab7394da3caff2b4fdbaaa83946321312f3f17d5cba018309d4b2206f083f9fd90f568c27399932c2ae5ae79200a05d6dd0da589

      • memory/1408-10-0x00000000001E0000-0x00000000001E1000-memory.dmp

        Filesize

        4KB

      • memory/1408-19-0x00000000001F0000-0x00000000001F1000-memory.dmp

        Filesize

        4KB

      • memory/2164-16-0x0000000074C4E000-0x0000000074C4F000-memory.dmp

        Filesize

        4KB

      • memory/2164-17-0x0000000000AD0000-0x0000000000CC8000-memory.dmp

        Filesize

        2.0MB

      • memory/2164-20-0x0000000004BD0000-0x0000000004C10000-memory.dmp

        Filesize

        256KB

      • memory/2164-102-0x00000000065F0000-0x0000000006802000-memory.dmp

        Filesize

        2.1MB

      • memory/2164-162-0x0000000074C4E000-0x0000000074C4F000-memory.dmp

        Filesize

        4KB

      • memory/2164-163-0x0000000004BD0000-0x0000000004C10000-memory.dmp

        Filesize

        256KB

      • memory/2360-14-0x000007FEF5E10000-0x000007FEF67FC000-memory.dmp

        Filesize

        9.9MB

      • memory/2360-0-0x000007FEF5E13000-0x000007FEF5E14000-memory.dmp

        Filesize

        4KB

      • memory/2360-2-0x000007FEF5E10000-0x000007FEF67FC000-memory.dmp

        Filesize

        9.9MB

      • memory/2360-1-0x0000000000320000-0x0000000000578000-memory.dmp

        Filesize

        2.3MB