Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 03:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-12_e26553384a0f60f66d3e95f11fd4bdb0_avoslocker_hijackloader_luca-stealer.exe
Resource
win7-20240903-en
General
-
Target
2024-12-12_e26553384a0f60f66d3e95f11fd4bdb0_avoslocker_hijackloader_luca-stealer.exe
-
Size
2.2MB
-
MD5
e26553384a0f60f66d3e95f11fd4bdb0
-
SHA1
601809dc0aa1a2d195de9a5bd864b218a8e0c03e
-
SHA256
42062dfe685a1d6b652b0bd4ef0393c165a5c6770d74507cd3defa0b22defb2d
-
SHA512
653bcd2917a7165597ed0f4413babe55623af5d87405b516b9e49003a76152b212cf6fd66c83d2aa3b9e4ab3c8c090e8947c09785aeaa28c385aad0442b0bd34
-
SSDEEP
49152:6EcPUz0VuTpPc4JrA5aR3UD9Cc/rENUwwiw4jm59J92mbd4H57+dIxEZVKzr7n:N0VQP1JrA5+l+92mbOH5zKk
Malware Config
Extracted
darkgate
drk3
todayput.shop
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
sEhfQzVh
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
drk3
Signatures
-
Darkgate family
-
Detect DarkGate stealer 11 IoCs
resource yara_rule behavioral1/memory/3028-12-0x0000000003160000-0x00000000034B5000-memory.dmp family_darkgate_v6 behavioral1/memory/2716-24-0x0000000001FA0000-0x0000000002742000-memory.dmp family_darkgate_v6 behavioral1/memory/3028-25-0x0000000003160000-0x00000000034B5000-memory.dmp family_darkgate_v6 behavioral1/memory/2716-28-0x0000000001FA0000-0x0000000002742000-memory.dmp family_darkgate_v6 behavioral1/memory/2716-35-0x0000000001FA0000-0x0000000002742000-memory.dmp family_darkgate_v6 behavioral1/memory/2716-38-0x0000000001FA0000-0x0000000002742000-memory.dmp family_darkgate_v6 behavioral1/memory/2716-36-0x0000000001FA0000-0x0000000002742000-memory.dmp family_darkgate_v6 behavioral1/memory/2716-37-0x0000000001FA0000-0x0000000002742000-memory.dmp family_darkgate_v6 behavioral1/memory/2716-34-0x0000000001FA0000-0x0000000002742000-memory.dmp family_darkgate_v6 behavioral1/memory/2680-39-0x0000000001FA0000-0x0000000002742000-memory.dmp family_darkgate_v6 behavioral1/memory/2716-40-0x0000000001FA0000-0x0000000002742000-memory.dmp family_darkgate_v6 -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 3028 created 1104 3028 Autoit3.exe 19 PID 2716 created 1388 2716 GoogleUpdateCore.exe 23 -
Executes dropped EXE 1 IoCs
pid Process 3028 Autoit3.exe -
Loads dropped DLL 1 IoCs
pid Process 2084 2024-12-12_e26553384a0f60f66d3e95f11fd4bdb0_avoslocker_hijackloader_luca-stealer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\baadhdc = "\"C:\\ProgramData\\dgceaec\\Autoit3.exe\" C:\\ProgramData\\dgceaec\\cedfbhb.a3x" GoogleUpdateCore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\baadhdc = "\"C:\\ProgramData\\dgceaec\\Autoit3.exe\" C:\\ProgramData\\dgceaec\\cedfbhb.a3x" GoogleUpdateCore.exe -
Command and Scripting Interpreter: AutoIT 1 TTPs 1 IoCs
Using AutoIT for possible automate script.
pid Process 3028 Autoit3.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Autoit3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdateCore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdateCore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-12_e26553384a0f60f66d3e95f11fd4bdb0_avoslocker_hijackloader_luca-stealer.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString GoogleUpdateCore.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Autoit3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Autoit3.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 GoogleUpdateCore.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString GoogleUpdateCore.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 GoogleUpdateCore.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3028 Autoit3.exe 3028 Autoit3.exe 2716 GoogleUpdateCore.exe 2716 GoogleUpdateCore.exe 2680 GoogleUpdateCore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2716 GoogleUpdateCore.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2776 WMIC.exe Token: SeSecurityPrivilege 2776 WMIC.exe Token: SeTakeOwnershipPrivilege 2776 WMIC.exe Token: SeLoadDriverPrivilege 2776 WMIC.exe Token: SeSystemProfilePrivilege 2776 WMIC.exe Token: SeSystemtimePrivilege 2776 WMIC.exe Token: SeProfSingleProcessPrivilege 2776 WMIC.exe Token: SeIncBasePriorityPrivilege 2776 WMIC.exe Token: SeCreatePagefilePrivilege 2776 WMIC.exe Token: SeBackupPrivilege 2776 WMIC.exe Token: SeRestorePrivilege 2776 WMIC.exe Token: SeShutdownPrivilege 2776 WMIC.exe Token: SeDebugPrivilege 2776 WMIC.exe Token: SeSystemEnvironmentPrivilege 2776 WMIC.exe Token: SeRemoteShutdownPrivilege 2776 WMIC.exe Token: SeUndockPrivilege 2776 WMIC.exe Token: SeManageVolumePrivilege 2776 WMIC.exe Token: 33 2776 WMIC.exe Token: 34 2776 WMIC.exe Token: 35 2776 WMIC.exe Token: SeIncreaseQuotaPrivilege 2776 WMIC.exe Token: SeSecurityPrivilege 2776 WMIC.exe Token: SeTakeOwnershipPrivilege 2776 WMIC.exe Token: SeLoadDriverPrivilege 2776 WMIC.exe Token: SeSystemProfilePrivilege 2776 WMIC.exe Token: SeSystemtimePrivilege 2776 WMIC.exe Token: SeProfSingleProcessPrivilege 2776 WMIC.exe Token: SeIncBasePriorityPrivilege 2776 WMIC.exe Token: SeCreatePagefilePrivilege 2776 WMIC.exe Token: SeBackupPrivilege 2776 WMIC.exe Token: SeRestorePrivilege 2776 WMIC.exe Token: SeShutdownPrivilege 2776 WMIC.exe Token: SeDebugPrivilege 2776 WMIC.exe Token: SeSystemEnvironmentPrivilege 2776 WMIC.exe Token: SeRemoteShutdownPrivilege 2776 WMIC.exe Token: SeUndockPrivilege 2776 WMIC.exe Token: SeManageVolumePrivilege 2776 WMIC.exe Token: 33 2776 WMIC.exe Token: 34 2776 WMIC.exe Token: 35 2776 WMIC.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2084 wrote to memory of 3028 2084 2024-12-12_e26553384a0f60f66d3e95f11fd4bdb0_avoslocker_hijackloader_luca-stealer.exe 30 PID 2084 wrote to memory of 3028 2084 2024-12-12_e26553384a0f60f66d3e95f11fd4bdb0_avoslocker_hijackloader_luca-stealer.exe 30 PID 2084 wrote to memory of 3028 2084 2024-12-12_e26553384a0f60f66d3e95f11fd4bdb0_avoslocker_hijackloader_luca-stealer.exe 30 PID 2084 wrote to memory of 3028 2084 2024-12-12_e26553384a0f60f66d3e95f11fd4bdb0_avoslocker_hijackloader_luca-stealer.exe 30 PID 3028 wrote to memory of 2376 3028 Autoit3.exe 32 PID 3028 wrote to memory of 2376 3028 Autoit3.exe 32 PID 3028 wrote to memory of 2376 3028 Autoit3.exe 32 PID 3028 wrote to memory of 2376 3028 Autoit3.exe 32 PID 2376 wrote to memory of 2776 2376 cmd.exe 34 PID 2376 wrote to memory of 2776 2376 cmd.exe 34 PID 2376 wrote to memory of 2776 2376 cmd.exe 34 PID 2376 wrote to memory of 2776 2376 cmd.exe 34 PID 3028 wrote to memory of 2716 3028 Autoit3.exe 36 PID 3028 wrote to memory of 2716 3028 Autoit3.exe 36 PID 3028 wrote to memory of 2716 3028 Autoit3.exe 36 PID 3028 wrote to memory of 2716 3028 Autoit3.exe 36 PID 3028 wrote to memory of 2716 3028 Autoit3.exe 36 PID 3028 wrote to memory of 2716 3028 Autoit3.exe 36 PID 3028 wrote to memory of 2716 3028 Autoit3.exe 36 PID 3028 wrote to memory of 2716 3028 Autoit3.exe 36 PID 2716 wrote to memory of 2680 2716 GoogleUpdateCore.exe 37 PID 2716 wrote to memory of 2680 2716 GoogleUpdateCore.exe 37 PID 2716 wrote to memory of 2680 2716 GoogleUpdateCore.exe 37 PID 2716 wrote to memory of 2680 2716 GoogleUpdateCore.exe 37 PID 2716 wrote to memory of 2680 2716 GoogleUpdateCore.exe 37 PID 2716 wrote to memory of 2680 2716 GoogleUpdateCore.exe 37 PID 2716 wrote to memory of 2680 2716 GoogleUpdateCore.exe 37 PID 2716 wrote to memory of 2680 2716 GoogleUpdateCore.exe 37
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1104
-
C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe"C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2716
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1388
-
C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe"C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\2024-12-12_e26553384a0f60f66d3e95f11fd4bdb0_avoslocker_hijackloader_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-12_e26553384a0f60f66d3e95f11fd4bdb0_avoslocker_hijackloader_luca-stealer.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
\??\c:\temp\test\Autoit3.exe"c:\temp\test\Autoit3.exe" c:\temp\test\script.a3x2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Command and Scripting Interpreter: AutoIT
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3028 -
\??\c:\windows\SysWOW64\cmd.exe"c:\windows\system32\cmd.exe" /c wmic ComputerSystem get domain > C:\ProgramData\dgceaec\dakcaeh3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic ComputerSystem get domain4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54B
MD5c8bbad190eaaa9755c8dfb1573984d81
SHA117ad91294403223fde66f687450545a2bad72af5
SHA2567f136265128b7175fb67024a6ddd7524586b025725a878c07d76a9d8ad3dc2ac
SHA51205f02cf90969b7b9a2de39eecdf810a1835325e7c83ffe81388c9866c6f79be6cdc8617f606a8fedc6affe6127bede4b143106a90289bbb9bf61d94c648059df
-
Filesize
1KB
MD5500f607619975019d751ea1615f67a60
SHA1c565090d1650a3f78e5c5f14dd19045f721ea8e5
SHA25671a7192937a4f1ea404db2dbfdc4c4d0a8168fb190bad3e0419b05dfc2fdd7ef
SHA512faa615ee7cefa8cd1b05efa8b12de0e5bc353b0508f12d6a803e2471a045fcb72c9fbea289ecbc48c19218787202ba959cc3c79f434d7bf5350b00c5bb559ab1
-
Filesize
32B
MD5955aa17e358c05ebfbf22dd63996aeb3
SHA186fb9a1b8609909e71c9f1ef7a39625539a1cfde
SHA2560b1c734b004065c1381393216525eed4ec3d708c7725067fcbe7cdc48e2aec7f
SHA512189adc1649b0599d02db3b4610367512d7367bda4e4a9cd6633185dafa4df1b93d1a7f8381431586d458bfd05400d6504f21658a8387701479236b9701d85644
-
Filesize
4B
MD5dd5bd8535217c03e35be05b562d61bc8
SHA1cd036798467941b827fa7e50368da2b98d46eab9
SHA256106f164369c428598952b6b72158b7b6730898800ae2973331c9cc4bc84f4d0d
SHA512f88d017a5efbe1f1ecb11cfd2ff88c078bf1cbce359d3b8dac26ee3ccd78d3e3ce533892135abfacdef697344b2579d4588e481c6120e2dd39cbad7e7ea98904
-
Filesize
4B
MD5afbbcf76e18ee6ab8e4ccf2e076454b4
SHA1b898ffc391fb177527ba515112ca82c062a2030b
SHA256a5ed1f1ebd4d40e20d37ce26b15606b18374cbd82a751ef9a52523c792341646
SHA512feeb498a1e86e9fe44f3a0db9e1f9fde060f0f27d857067d9245de1ae4128dc3b72abcbcb19653a44771c6af9bf9bddcbedc40bd84745c42af9ea22afe2dd4d3
-
Filesize
4B
MD55207cae1db8e44c5d594966da1fdd662
SHA18ccf4a4323b136507f19ffaf1a7e5ae760748df6
SHA256d7c88d1180b9040f3dfc1fabe9600f4ae4c3418260180224b47f227afa3272c1
SHA512bfcb003baed178404b1c3c8d28f05b3d850f4fbf7ec8c3f0d4a1dbe380f35ae374bad26093a5aacc79f6588918aa1e2a6dfc06d7125ec39d269c263e47cdad82
-
Filesize
581KB
MD52bf27a4ef77513aa86659950f589a089
SHA1e5238f7403f90cc1998f312504707c86585f9da5
SHA256fce2d534623887f17922412cd8b9e4313a695db76573d69dda0f2693b3a0353f
SHA5123c599dc4b5b88966f4657130324d122191500e1ecf4ac912a7c7d31c3d35b2fab9e951831484b63e4d0cfcaabfc7a305e4b91c448533fc1f2e2d4f6ad30fdb9d
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c