Overview
overview
10Static
static
10darkgate/0...20.exe
windows7-x64
10darkgate/0...20.exe
windows10-2004-x64
10darkgate/0...24.exe
windows7-x64
1darkgate/0...24.exe
windows10-2004-x64
3darkgate/0...d2.exe
windows7-x64
10darkgate/0...d2.exe
windows10-2004-x64
10darkgate/0...bf.exe
windows7-x64
10darkgate/0...bf.exe
windows10-2004-x64
10darkgate/0...49.exe
windows7-x64
10darkgate/0...49.exe
windows10-2004-x64
10darkgate/0...fd.exe
windows7-x64
1darkgate/0...fd.exe
windows10-2004-x64
1darkgate/0...8f.exe
windows7-x64
darkgate/0...8f.exe
windows10-2004-x64
darkgate/0...be.exe
windows7-x64
10darkgate/0...be.exe
windows10-2004-x64
10darkgate/1...bb.exe
windows7-x64
10darkgate/1...bb.exe
windows10-2004-x64
10darkgate/1...ac.exe
windows7-x64
1darkgate/1...ac.exe
windows10-2004-x64
3darkgate/1...e6.exe
windows7-x64
1darkgate/1...e6.exe
windows10-2004-x64
3darkgate/1...50.exe
windows7-x64
1darkgate/1...50.exe
windows10-2004-x64
1darkgate/1...de.exe
windows7-x64
darkgate/1...de.exe
windows10-2004-x64
darkgate/1...e4.exe
windows7-x64
10darkgate/1...e4.exe
windows10-2004-x64
10darkgate/1...f2.exe
windows7-x64
1darkgate/1...f2.exe
windows10-2004-x64
3darkgate/1...90.exe
windows7-x64
10darkgate/1...90.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23-10-2024 15:01
Static task
static1
Behavioral task
behavioral1
Sample
darkgate/0201fcee89c9b2eb6871f37d9f92c9c16857a1c09543b95abd62948237d48720.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
darkgate/0201fcee89c9b2eb6871f37d9f92c9c16857a1c09543b95abd62948237d48720.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
darkgate/046916c0ec8b2cc15901ed6b724d419de3ed6efbacd544ac7cef9947291ccc24.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
darkgate/046916c0ec8b2cc15901ed6b724d419de3ed6efbacd544ac7cef9947291ccc24.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
darkgate/0758bae88bcbffe93e6022920e7dac6f76c3d00a6d0948eb46eaf6b4db6324d2.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
darkgate/0758bae88bcbffe93e6022920e7dac6f76c3d00a6d0948eb46eaf6b4db6324d2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
darkgate/07dc0c5ad87204c98eeab48bd9a10a7c2c3a69971b44621d06c3d4b09bc4e6bf.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
darkgate/07dc0c5ad87204c98eeab48bd9a10a7c2c3a69971b44621d06c3d4b09bc4e6bf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
darkgate/083c28ace437a34a8811ae161e0d0208336f42cb3a0f416d4f6dd4e7bcde2249.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
darkgate/083c28ace437a34a8811ae161e0d0208336f42cb3a0f416d4f6dd4e7bcde2249.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
darkgate/0b08b4a9a8f624308f41096b687ec06e76d6703dac0bdf7d12362ca9ce3984fd.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
darkgate/0b08b4a9a8f624308f41096b687ec06e76d6703dac0bdf7d12362ca9ce3984fd.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
darkgate/0dee02b21cfc3d8055e4ea59c4df9a4d113dbe5676ce4946ec7406749eeb238f.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
darkgate/0dee02b21cfc3d8055e4ea59c4df9a4d113dbe5676ce4946ec7406749eeb238f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
darkgate/0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be.exe
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
darkgate/0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
darkgate/1059cbb1c50f300b1a9447453e1cca6c51dbd2cc901ea073e78047e71542b4bb.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
darkgate/1059cbb1c50f300b1a9447453e1cca6c51dbd2cc901ea073e78047e71542b4bb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
darkgate/10959b7b9a9d905c9cffdcddfc7567cefdd66bbe44ca7b5e302b57d2fa1b82ac.exe
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
darkgate/10959b7b9a9d905c9cffdcddfc7567cefdd66bbe44ca7b5e302b57d2fa1b82ac.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
darkgate/10e69a62464edb0880e871362e62884136ad3026086d1e6873c9a67d52aea1e6.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
darkgate/10e69a62464edb0880e871362e62884136ad3026086d1e6873c9a67d52aea1e6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
darkgate/13361b8acb85763dbf149732f9d5be0b3d028b958bd3b22411ee976a36dba450.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
darkgate/13361b8acb85763dbf149732f9d5be0b3d028b958bd3b22411ee976a36dba450.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
darkgate/145a0faa4e25006cc3decef0f1541ea5f0e5ab0c8c446cdb921ac7b6c6c87bde.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
darkgate/145a0faa4e25006cc3decef0f1541ea5f0e5ab0c8c446cdb921ac7b6c6c87bde.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
darkgate/14f5e6c5c7e02acf97a44e476850c5c3df08057f6b93a5aae298d98e6a4dcfe4.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
darkgate/14f5e6c5c7e02acf97a44e476850c5c3df08057f6b93a5aae298d98e6a4dcfe4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
darkgate/186a474be7cd7fcac0e6b2747d0fcb90b7d7dd09ba93cf181780d823ddf6cef2.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
darkgate/186a474be7cd7fcac0e6b2747d0fcb90b7d7dd09ba93cf181780d823ddf6cef2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
darkgate/18d87c514ff25f817eac613c5f2ad39b21b6e04b6da6dbe8291f04549da2c290.exe
Resource
win7-20240903-en
General
-
Target
darkgate/0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be.exe
-
Size
433KB
-
MD5
ba837c850e492f4282bf5e34f30cefa8
-
SHA1
4ae7d8909e58f82408b22187b1085465976b3eae
-
SHA256
0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be
-
SHA512
13b4a6044ac2d5b4a110431060abb5238778880097c6abc7e351b40ccc4e6dd2529114293fb10ef930d7d5b1ddc653f9faa0e9cc9e99c98f40d21663d416969d
-
SSDEEP
12288:3Wy/dWy8VGJcix+d/WS8/Ruv0d5J/zW+hqxqnup/5:3p1p8V0x+d/WS8Hd/W+hqx+uJ5
Malware Config
Extracted
darkgate
http://lampixx.hopto.org
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
61689
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
true
-
crypto_key
raKqdORtLcYsWG
-
internal_mutex
pIzEhw
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
20
-
rootkit
true
-
startup_persistence
true
Signatures
-
Detect DarkGate stealer 12 IoCs
resource yara_rule behavioral15/memory/1996-1-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 behavioral15/memory/2548-2-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 behavioral15/memory/1996-4-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 behavioral15/memory/1996-5-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 behavioral15/memory/1996-3-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 behavioral15/memory/1996-7-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 behavioral15/memory/1996-12-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 behavioral15/memory/1996-14-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 behavioral15/memory/1996-16-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 behavioral15/memory/1996-13-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 behavioral15/memory/1996-11-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 behavioral15/memory/1996-23-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ebaeabg.lnk cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2548 set thread context of 1996 2548 0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString cmd.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 2548 0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be.exe 1996 cmd.exe 1996 cmd.exe 1996 cmd.exe 1996 cmd.exe 1996 cmd.exe 1996 cmd.exe 1996 cmd.exe 1996 cmd.exe 1996 cmd.exe 1996 cmd.exe 1996 cmd.exe 1996 cmd.exe 1996 cmd.exe 1996 cmd.exe 1996 cmd.exe 1996 cmd.exe 1996 cmd.exe 1996 cmd.exe 1996 cmd.exe 1996 cmd.exe 1996 cmd.exe 1996 cmd.exe 1996 cmd.exe 1996 cmd.exe 1996 cmd.exe 1996 cmd.exe 1996 cmd.exe 1996 cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2548 wrote to memory of 1996 2548 0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be.exe 29 PID 2548 wrote to memory of 1996 2548 0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be.exe 29 PID 2548 wrote to memory of 1996 2548 0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be.exe 29 PID 2548 wrote to memory of 1996 2548 0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be.exe 29 PID 2548 wrote to memory of 1996 2548 0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be.exe 29 PID 2548 wrote to memory of 1996 2548 0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\darkgate\0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be.exe"C:\Users\Admin\AppData\Local\Temp\darkgate\0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\cmd.execmd.exe2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176B
MD5b4478db48ca5ab372e908580143f9060
SHA19e313b7e44619ae063c34657551dd691cc774f48
SHA256ef61dd3a10f46ee2dce84c4b6ad1e4ead467a0bc8858720f4583f428cd5fc8c7
SHA5128ce940bec961ca959adfd2ed2d90a8f479e6c15049e2fdc3628de1446ffc59b9dcbbda429dcb7ccb92814d05175a682ea21d0aa08de67de097f869e0b5947a9e
-
Filesize
148B
MD5a7bb562f444cfdf945cc17b441e1c4a0
SHA15f46e69dae1575f685fc9c5bc2324320af6f5ba7
SHA2562f4f23dfbe7e75eae1f49b0ec5581806b89e9d74a18e6e18e0a7979b2d76d0ea
SHA5128e054498f9535dfd9516ef8ab41a841963aefc226d6e79d7e66bbf12070d6da078d69641549164c8f96ecd539ce645a18a36a0457bfcdb694b436975826dc3ea
-
Filesize
891B
MD5278242ad6c5a8709f8e7600b4a6ed266
SHA1014c64bd08c79853ffc7a12a157ef2e8c403b848
SHA256a767a53897b24899be62f3df6bcb59ff95d0d2fe449a94209257f2d280871f20
SHA512c9e4249a95e7e08360859182bba62af96684b4a60b2438735397fb75ba48ed897f90ba1e6b6f81f35dc505a358ee40a69e7c8e20e72bec3efa2a1dcf326f218b