| File name: | VIRUS.zip |
| Full analysis: | https://app.any.run/tasks/f09e47cc-a866-4a5b-b7e2-a4307212adef |
| Verdict: | Malicious activity |
| Threats: | DarkGate is a loader, which possesses extensive functionality, ranging from keylogging to crypto mining. Written in Delphi, this malware is known for the use of AutoIT scripts in its infection process. Thanks to this malicious software’s versatile architecture, it is widely used by established threat actors. |
| Analysis date: | May 25, 2024, 22:59:54 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v2.0 to extract, compression method=deflate |
| MD5: | 9BB8F303F8D5C08455DFD03017DAAC47 |
| SHA1: | 45ADA203283D0F5DF29AE339C02682D452EFCE7D |
| SHA256: | 9EFA46EC8D9090E49066A184BB55BD03BDE76AE67455F7E213EA37AFAD5E215A |
| SSDEEP: | 98304:DBrRdvzw+aohYmtxW8Guj9bnNOvoEHhEfdyenG8OQCnNjkFaoBUGQlt5cn0fGF4N:kgOcShl |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 20 |
|---|---|
| ZipBitFlag: | - |
| ZipCompression: | Deflated |
| ZipModifyDate: | 2024:05:25 17:56:32 |
| ZipCRC: | 0x2b89da9b |
| ZipCompressedSize: | 6263311 |
| ZipUncompressedSize: | 6302720 |
| ZipFileName: | VIRUS.exe |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 312 | "C:\Program Files\Google\Temp\GUMEA1F.tmp\GoogleUpdate.exe" /update /sessionid "{96F63FE7-6F64-453F-84BF-77E04333C181}" | C:\Program Files\Google\Temp\GUMEA1F.tmp\GoogleUpdate.exe | GoogleUpdateSetup.exe | ||||||||||||
User: SYSTEM Company: Google LLC Integrity Level: SYSTEM Description: Google Installer Exit code: 0 Version: 1.3.36.371 Modules
| |||||||||||||||
| 824 | "C:\Program Files\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc | C:\Program Files\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft Edge Update Exit code: 2147748608 Version: 1.3.175.29 Modules
| |||||||||||||||
| 916 | "C:\Program Files\Google\Update\Install\{F4E41892-891B-4150-9B24-AC13DCD88433}\GoogleUpdateSetup.exe" /update /sessionid "{96F63FE7-6F64-453F-84BF-77E04333C181}" | C:\Program Files\Google\Update\Install\{F4E41892-891B-4150-9B24-AC13DCD88433}\GoogleUpdateSetup.exe | GoogleUpdate.exe | ||||||||||||
User: SYSTEM Company: Google LLC Integrity Level: SYSTEM Description: Google Update Setup Exit code: 0 Version: 1.3.36.372 Modules
| |||||||||||||||
| 948 | "C:\Program Files\Microsoft\Edge\Application\109.0.1518.115\elevation_service.exe" | C:\Program Files\Microsoft\Edge\Application\109.0.1518.115\elevation_service.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft Edge Version: 109.0.1518.115 Modules
| |||||||||||||||
| 1240 | C:\Windows\system32\IEEtwCollector.exe /V | C:\Windows\System32\IEEtwCollector.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: IE ETW Collector Service Exit code: 0 Version: 11.00.9600.19597 (winblue_ltsb_escrow.191216-1311) Modules
| |||||||||||||||
| 1568 | "C:\Program Files\Google\Chrome\Application\109.0.5414.120\elevation_service.exe" | C:\Program Files\Google\Chrome\Application\109.0.5414.120\elevation_service.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Google LLC Integrity Level: SYSTEM Description: Google Chrome Version: 109.0.5414.120 Modules
| |||||||||||||||
| 1616 | "C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe" | C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe | services.exe | ||||||||||||
User: SYSTEM Company: Adobe Inc. Integrity Level: SYSTEM Description: Adobe Acrobat Update Service Version: 1.824.39.9311 Modules
| |||||||||||||||
| 1664 | "C:\Users\admin\Desktop\VIRUS.exe" | C:\Users\admin\Desktop\VIRUS.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft Visual C++ 2010 x64 Redistributable Setup Exit code: 5100 Version: 10.0.30319.01 Modules
| |||||||||||||||
| 1816 | c:\7d33a60901582d7154cfa6e9f391\Setup.exe | C:\7d33a60901582d7154cfa6e9f391\Setup.exe | VIRUS.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Setup Installer Exit code: 5100 Version: 10.0.30319.1 built by: RTMRel Modules
| |||||||||||||||
| 1840 | "C:\Program Files\Google\Update\GoogleUpdate.exe" /regsvc | C:\Program Files\Google\Update\GoogleUpdate.exe | — | GoogleUpdate.exe | |||||||||||
User: SYSTEM Company: Google Inc. Integrity Level: SYSTEM Description: Google Installer Exit code: 0 Version: 1.3.33.23 Modules
| |||||||||||||||
| (PID) Process: | (3968) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (3968) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (3968) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3968) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\phacker.zip | |||
| (PID) Process: | (3968) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
| (PID) Process: | (3968) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip | |||
| (PID) Process: | (3968) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\VIRUS.zip | |||
| (PID) Process: | (3968) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (3968) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (3968) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1664 | VIRUS.exe | C:\Users\admin\AppData\Roaming\c4ba3647fd0d6918.bin | binary | |
MD5:660CF16F87846552DAC5F3D59CEDA5A2 | SHA256:2BFCCACDCC277BD7BB77DE1310370C4A807EED93E54867775740ECFB367162B0 | |||
| 3968 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa3968.32342\VIRUS.exe | executable | |
MD5:214A4C47845F4050A5EAE537E622EF80 | SHA256:5137025EEB3FA3347EA7704DD2ADFB061319346B9F19C4D4CD7B1F7B9A5F0601 | |||
| 1664 | VIRUS.exe | C:\7d33a60901582d7154cfa6e9f391\Strings.xml | xml | |
MD5:332ADF643747297B9BFA9527EAEFE084 | SHA256:E49545FEEAE22198728AD04236E31E02035AF7CC4D68E10CBECFFD08669CBECA | |||
| 1664 | VIRUS.exe | C:\7d33a60901582d7154cfa6e9f391\sqmapi.dll | executable | |
MD5:3F0363B40376047EFF6A9B97D633B750 | SHA256:BD6395A58F55A8B1F4063E813CE7438F695B9B086BB965D8AC44E7A97D35A93C | |||
| 1664 | VIRUS.exe | C:\7d33a60901582d7154cfa6e9f391\SetupEngine.dll | executable | |
MD5:84C1DAF5F30FF99895ECAB3A55354BCF | SHA256:7A0D281FA802D615EA1207BD2E9EBB98F3B74F9833BBA3CB964BA7C7E0FB67FD | |||
| 1664 | VIRUS.exe | C:\7d33a60901582d7154cfa6e9f391\DisplayIcon.ico | image | |
MD5:F9657D290048E169FFABBBB9C7412BE0 | SHA256:B74AD253B9B8F9FCADE725336509143828EE739CC2B24782BE3ECFF26F229160 | |||
| 1664 | VIRUS.exe | C:\7d33a60901582d7154cfa6e9f391\Setup.exe | executable | |
MD5:006F8A615020A4A17F5E63801485DF46 | SHA256:D273460AA4D42F0B5764383E2AB852AB9AF6FECB3ED866F1783869F2F155D8BE | |||
| 1664 | VIRUS.exe | C:\7d33a60901582d7154cfa6e9f391\watermark.bmp | image | |
MD5:1A5CAAFACFC8C7766E404D019249CF67 | SHA256:2E87D5742413254DB10F7BD0762B6CDB98FF9C46CA9ACDDFD9B1C2E5418638F2 | |||
| 1664 | VIRUS.exe | C:\7d33a60901582d7154cfa6e9f391\1033\LocalizedData.xml | xml | |
MD5:5486FF60B072102EE3231FD743B290A1 | SHA256:5CA3ECAA12CA56F955D403CA93C4CB36A7D3DCDEA779FC9BDAA0CDD429DAB706 | |||
| 1664 | VIRUS.exe | C:\7d33a60901582d7154cfa6e9f391\SetupUi.dll | executable | |
MD5:EB881E3DDDC84B20BD92ABCEC444455F | SHA256:11565D97287C01D22AD2E46C78D8A822FA3E6524561D4C02DFC87E8D346C44E7 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1664 | VIRUS.exe | POST | 200 | 54.244.188.177:80 | http://pywolwnvd.biz/uop | unknown | — | — | unknown |
1616 | armsvc.exe | POST | 200 | 54.244.188.177:80 | http://pywolwnvd.biz/ilxyuojqmuxm | unknown | — | — | unknown |
1664 | VIRUS.exe | POST | 200 | 18.141.10.107:80 | http://ssbzmoy.biz/gsnjaxyb | unknown | — | — | unknown |
1616 | armsvc.exe | POST | 200 | 18.141.10.107:80 | http://ssbzmoy.biz/jiylfagauddq | unknown | — | — | unknown |
1664 | VIRUS.exe | POST | 200 | 54.244.188.177:80 | http://cvgrf.biz/rrwfxex | unknown | — | — | unknown |
1616 | armsvc.exe | POST | 200 | 54.244.188.177:80 | http://cvgrf.biz/jhgkmnwych | unknown | — | — | unknown |
1664 | VIRUS.exe | POST | 200 | 44.221.84.105:80 | http://npukfztj.biz/cwtjywvypbmvl | unknown | — | — | unknown |
1616 | armsvc.exe | POST | 200 | 44.221.84.105:80 | http://npukfztj.biz/aokdglt | unknown | — | — | unknown |
1664 | VIRUS.exe | POST | — | 54.157.24.8:80 | http://przvgke.biz/schnawxmj | unknown | — | — | unknown |
1616 | armsvc.exe | POST | — | 54.157.24.8:80 | http://przvgke.biz/fa | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 224.0.0.252:5355 | — | — | — | unknown |
1088 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
1664 | VIRUS.exe | 54.244.188.177:80 | pywolwnvd.biz | AMAZON-02 | US | unknown |
1616 | armsvc.exe | 54.244.188.177:80 | pywolwnvd.biz | AMAZON-02 | US | unknown |
1664 | VIRUS.exe | 18.141.10.107:80 | ssbzmoy.biz | AMAZON-02 | SG | unknown |
1616 | armsvc.exe | 18.141.10.107:80 | ssbzmoy.biz | AMAZON-02 | SG | unknown |
1012 | svchost.exe | 239.255.255.250:1900 | — | — | — | unknown |
1664 | VIRUS.exe | 44.221.84.105:80 | npukfztj.biz | AMAZON-AES | US | unknown |
Domain | IP | Reputation |
|---|---|---|
pywolwnvd.biz |
| unknown |
ssbzmoy.biz |
| unknown |
cvgrf.biz |
| malicious |
npukfztj.biz |
| unknown |
przvgke.biz |
| unknown |
zlenh.biz |
| unknown |
clients2.google.com |
| whitelisted |
update.googleapis.com |
| unknown |
edgedl.me.gvt1.com |
| whitelisted |
knjghuig.biz |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
1088 | svchost.exe | Potentially Bad Traffic | ET INFO Observed DNS Query to .biz TLD |
1088 | svchost.exe | Potentially Bad Traffic | ET INFO Observed DNS Query to .biz TLD |
1088 | svchost.exe | Potentially Bad Traffic | ET INFO Observed DNS Query to .biz TLD |
1088 | svchost.exe | Potentially Bad Traffic | ET INFO Observed DNS Query to .biz TLD |
1664 | VIRUS.exe | A Network Trojan was detected | ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz |
1664 | VIRUS.exe | A Network Trojan was detected | ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst |
1088 | svchost.exe | Potentially Bad Traffic | ET INFO Observed DNS Query to .biz TLD |
1088 | svchost.exe | Potentially Bad Traffic | ET INFO Observed DNS Query to .biz TLD |
1088 | svchost.exe | Potentially Bad Traffic | ET INFO Observed DNS Query to .biz TLD |
— | — | A Network Trojan was detected | ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz |
Process | Message |
|---|---|
Setup.exe | A StopBlock was hit or a System Requirement was not met. |