Overview
overview
10Static
static
10darkgate/0...20.exe
windows7-x64
10darkgate/0...20.exe
windows10-2004-x64
10darkgate/0...24.exe
windows7-x64
1darkgate/0...24.exe
windows10-2004-x64
3darkgate/0...d2.exe
windows7-x64
10darkgate/0...d2.exe
windows10-2004-x64
10darkgate/0...bf.exe
windows7-x64
10darkgate/0...bf.exe
windows10-2004-x64
10darkgate/0...49.exe
windows7-x64
10darkgate/0...49.exe
windows10-2004-x64
10darkgate/0...fd.exe
windows7-x64
1darkgate/0...fd.exe
windows10-2004-x64
1darkgate/0...8f.exe
windows7-x64
darkgate/0...8f.exe
windows10-2004-x64
darkgate/0...be.exe
windows7-x64
10darkgate/0...be.exe
windows10-2004-x64
10darkgate/1...bb.exe
windows7-x64
10darkgate/1...bb.exe
windows10-2004-x64
10darkgate/1...ac.exe
windows7-x64
1darkgate/1...ac.exe
windows10-2004-x64
3darkgate/1...e6.exe
windows7-x64
1darkgate/1...e6.exe
windows10-2004-x64
3darkgate/1...50.exe
windows7-x64
1darkgate/1...50.exe
windows10-2004-x64
1darkgate/1...de.exe
windows7-x64
darkgate/1...de.exe
windows10-2004-x64
darkgate/1...e4.exe
windows7-x64
10darkgate/1...e4.exe
windows10-2004-x64
10darkgate/1...f2.exe
windows7-x64
1darkgate/1...f2.exe
windows10-2004-x64
3darkgate/1...90.exe
windows7-x64
10darkgate/1...90.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2024 15:01
Static task
static1
Behavioral task
behavioral1
Sample
darkgate/0201fcee89c9b2eb6871f37d9f92c9c16857a1c09543b95abd62948237d48720.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
darkgate/0201fcee89c9b2eb6871f37d9f92c9c16857a1c09543b95abd62948237d48720.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
darkgate/046916c0ec8b2cc15901ed6b724d419de3ed6efbacd544ac7cef9947291ccc24.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
darkgate/046916c0ec8b2cc15901ed6b724d419de3ed6efbacd544ac7cef9947291ccc24.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
darkgate/0758bae88bcbffe93e6022920e7dac6f76c3d00a6d0948eb46eaf6b4db6324d2.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
darkgate/0758bae88bcbffe93e6022920e7dac6f76c3d00a6d0948eb46eaf6b4db6324d2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
darkgate/07dc0c5ad87204c98eeab48bd9a10a7c2c3a69971b44621d06c3d4b09bc4e6bf.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
darkgate/07dc0c5ad87204c98eeab48bd9a10a7c2c3a69971b44621d06c3d4b09bc4e6bf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
darkgate/083c28ace437a34a8811ae161e0d0208336f42cb3a0f416d4f6dd4e7bcde2249.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
darkgate/083c28ace437a34a8811ae161e0d0208336f42cb3a0f416d4f6dd4e7bcde2249.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
darkgate/0b08b4a9a8f624308f41096b687ec06e76d6703dac0bdf7d12362ca9ce3984fd.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
darkgate/0b08b4a9a8f624308f41096b687ec06e76d6703dac0bdf7d12362ca9ce3984fd.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
darkgate/0dee02b21cfc3d8055e4ea59c4df9a4d113dbe5676ce4946ec7406749eeb238f.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
darkgate/0dee02b21cfc3d8055e4ea59c4df9a4d113dbe5676ce4946ec7406749eeb238f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
darkgate/0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be.exe
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
darkgate/0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
darkgate/1059cbb1c50f300b1a9447453e1cca6c51dbd2cc901ea073e78047e71542b4bb.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
darkgate/1059cbb1c50f300b1a9447453e1cca6c51dbd2cc901ea073e78047e71542b4bb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
darkgate/10959b7b9a9d905c9cffdcddfc7567cefdd66bbe44ca7b5e302b57d2fa1b82ac.exe
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
darkgate/10959b7b9a9d905c9cffdcddfc7567cefdd66bbe44ca7b5e302b57d2fa1b82ac.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
darkgate/10e69a62464edb0880e871362e62884136ad3026086d1e6873c9a67d52aea1e6.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
darkgate/10e69a62464edb0880e871362e62884136ad3026086d1e6873c9a67d52aea1e6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
darkgate/13361b8acb85763dbf149732f9d5be0b3d028b958bd3b22411ee976a36dba450.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
darkgate/13361b8acb85763dbf149732f9d5be0b3d028b958bd3b22411ee976a36dba450.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
darkgate/145a0faa4e25006cc3decef0f1541ea5f0e5ab0c8c446cdb921ac7b6c6c87bde.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
darkgate/145a0faa4e25006cc3decef0f1541ea5f0e5ab0c8c446cdb921ac7b6c6c87bde.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
darkgate/14f5e6c5c7e02acf97a44e476850c5c3df08057f6b93a5aae298d98e6a4dcfe4.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
darkgate/14f5e6c5c7e02acf97a44e476850c5c3df08057f6b93a5aae298d98e6a4dcfe4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
darkgate/186a474be7cd7fcac0e6b2747d0fcb90b7d7dd09ba93cf181780d823ddf6cef2.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
darkgate/186a474be7cd7fcac0e6b2747d0fcb90b7d7dd09ba93cf181780d823ddf6cef2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
darkgate/18d87c514ff25f817eac613c5f2ad39b21b6e04b6da6dbe8291f04549da2c290.exe
Resource
win7-20240903-en
General
-
Target
darkgate/0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be.exe
-
Size
433KB
-
MD5
ba837c850e492f4282bf5e34f30cefa8
-
SHA1
4ae7d8909e58f82408b22187b1085465976b3eae
-
SHA256
0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be
-
SHA512
13b4a6044ac2d5b4a110431060abb5238778880097c6abc7e351b40ccc4e6dd2529114293fb10ef930d7d5b1ddc653f9faa0e9cc9e99c98f40d21663d416969d
-
SSDEEP
12288:3Wy/dWy8VGJcix+d/WS8/Ruv0d5J/zW+hqxqnup/5:3p1p8V0x+d/WS8Hd/W+hqx+uJ5
Malware Config
Extracted
darkgate
http://lampixx.hopto.org
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
61689
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
true
-
crypto_key
raKqdORtLcYsWG
-
internal_mutex
pIzEhw
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
20
-
rootkit
true
-
startup_persistence
true
Signatures
-
Detect DarkGate stealer 12 IoCs
resource yara_rule behavioral16/memory/4956-1-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 behavioral16/memory/4956-4-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 behavioral16/memory/4956-3-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 behavioral16/memory/4956-5-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 behavioral16/memory/212-2-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 behavioral16/memory/4956-7-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 behavioral16/memory/4956-12-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 behavioral16/memory/4956-13-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 behavioral16/memory/4956-11-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 behavioral16/memory/4956-16-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 behavioral16/memory/4956-14-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 behavioral16/memory/4956-23-0x0000000000400000-0x0000000000473000-memory.dmp family_darkgate_v6 -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\kdchefa.lnk cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 212 set thread context of 4956 212 0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString cmd.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 212 0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be.exe 212 0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe 4956 cmd.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 212 wrote to memory of 4956 212 0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be.exe 86 PID 212 wrote to memory of 4956 212 0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be.exe 86 PID 212 wrote to memory of 4956 212 0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be.exe 86 PID 212 wrote to memory of 4956 212 0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be.exe 86 PID 212 wrote to memory of 4956 212 0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\darkgate\0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be.exe"C:\Users\Admin\AppData\Local\Temp\darkgate\0e5f17f2697aea5447d90d79a827a72610238355bb29f0d7b27012d4e8a3c3be.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\cmd.execmd.exe2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176B
MD53ce42e93adeefdd0dda1ddfe79505852
SHA117807c2061741c4698fcb3ef124a476d669451b1
SHA25616125e0a133f319893866e0b76cae8ef96d3a53ea8e8d975a8f796fbeb7271f4
SHA512fb9a13e31da371c3802022be374fd3b4ce0357c470b5d33ba81212a5ff63afbeb40db03c779e9cbf22cfcaf9c865338f0819845ecc9fd83b75d8d2607c34cc36
-
Filesize
148B
MD5a7bb562f444cfdf945cc17b441e1c4a0
SHA15f46e69dae1575f685fc9c5bc2324320af6f5ba7
SHA2562f4f23dfbe7e75eae1f49b0ec5581806b89e9d74a18e6e18e0a7979b2d76d0ea
SHA5128e054498f9535dfd9516ef8ab41a841963aefc226d6e79d7e66bbf12070d6da078d69641549164c8f96ecd539ce645a18a36a0457bfcdb694b436975826dc3ea
-
Filesize
863B
MD52a1f0eb2bdb2da04d6a41303cc6d8433
SHA13431169a7f3d9939f4280df95503be369eb26e44
SHA2569ecca9d0014963726fe2a79933f050bbf3c2e17da8064d2873a012001af7a634
SHA512f5c898d383a29956a4937415512442228513d7e381e67d334bf34f6044fb06dfcc774d6660ae3bc444393efeea4596a48feb086d784710b03193b57e037a2855