Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/11/2024, 01:47
Behavioral task
behavioral1
Sample
2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe
-
Size
3.1MB
-
MD5
d9c3f8cff4b2362ea354329f24135766
-
SHA1
64156b0ec78acc4fadc2530ae9e8e6e99088f625
-
SHA256
b055d299e3e97f42977a8964a1392d09042dc4ea8d4a614b352639b2954d514d
-
SHA512
d481eb34ed83069b33033a16cf071a200545bb5ac473ac93e67b7661dffeaf1da8158dea956132ab18c4d1b7b32dacf4f5305c5bf1f725b25f4ccc8d63f04477
-
SSDEEP
98304:xnsmtk2aJqsJisrw7Q5RmDhnu59uh99wrc:NLI3EE/mDNu5ULr
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
resource behavioral1/files/0x00050000000191f3-141.dat behavioral1/files/0x00070000000191f3-165.dat -
Executes dropped EXE 3 IoCs
pid Process 1856 ._cache_2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe 2852 Synaptics.exe 1804 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 2392 2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe 2392 2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe 2392 2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe 2852 Synaptics.exe 2852 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2140 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1856 ._cache_2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe 2140 EXCEL.EXE 1804 ._cache_Synaptics.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2392 wrote to memory of 1856 2392 2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe 31 PID 2392 wrote to memory of 1856 2392 2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe 31 PID 2392 wrote to memory of 1856 2392 2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe 31 PID 2392 wrote to memory of 1856 2392 2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe 31 PID 2392 wrote to memory of 2852 2392 2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe 32 PID 2392 wrote to memory of 2852 2392 2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe 32 PID 2392 wrote to memory of 2852 2392 2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe 32 PID 2392 wrote to memory of 2852 2392 2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe 32 PID 2852 wrote to memory of 1804 2852 Synaptics.exe 33 PID 2852 wrote to memory of 1804 2852 Synaptics.exe 33 PID 2852 wrote to memory of 1804 2852 Synaptics.exe 33 PID 2852 wrote to memory of 1804 2852 Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\._cache_2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe"C:\Users\Admin\AppData\Local\Temp\._cache_2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1856
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1804
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5d9c3f8cff4b2362ea354329f24135766
SHA164156b0ec78acc4fadc2530ae9e8e6e99088f625
SHA256b055d299e3e97f42977a8964a1392d09042dc4ea8d4a614b352639b2954d514d
SHA512d481eb34ed83069b33033a16cf071a200545bb5ac473ac93e67b7661dffeaf1da8158dea956132ab18c4d1b7b32dacf4f5305c5bf1f725b25f4ccc8d63f04477
-
Filesize
1KB
MD54037c9318188e436b6af7849ab31a68d
SHA1b8b35ef3c83445a18a662c465cda819e7ccc60ab
SHA25690797b59cf4ba7f60f63ca0c101766bcebe0af08ddf4c4708a49b24a8c0fb89e
SHA512e2bd992daa146f9bf39a2f8136181254782e58b9fd28291b122600c1535941bf76c1ffb438e4c3cccab32d58a8ce5e98f457da8206c716c4bde1f56e3d384aac
-
Filesize
1KB
MD52a86ef34f315258839e59e5a0a079b6a
SHA197ea29a432a89df2d6fff9bf27d30ca04f9fd271
SHA2563c0430dc9095a538f84135106131cbe2ac1618c4851c9d05eddd2c1115789928
SHA512cad25b8be59cf8c7245b65e7dfae784ad1d5a16ebab3b77fceac346647915ffff25408b8e62c54a0aab578c9e232aaad9f7aadb1ecbe415874f0df77721e6f4c
-
Filesize
1KB
MD56a25e341d40f91b87b11f447d2e4237a
SHA188194bcef787bbf2acca55405d8cfcb21ac2dcb7
SHA256a529d3162289366a251bbebe05adb25f6db925896e54aebf956763133a3d460d
SHA512a0a0be4b82918822b69e33c3dbb39c4f908d605aeb3a8857cb1fbee014adca4d0414b04e101f7c06209639b22443c50549d728778b00ee38ecccfc2485b907ea
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
20KB
MD58632b5814be130e1f52f35de93834fca
SHA1582d76d7e911f7aebe05f11999b7a2dc3f66d680
SHA256f74243c15ce72297641619a82cb95cab5d3d31f1539570d01a5729ed71224b0b
SHA512e7009e9f1a4b958fbb8176a3daab978d4d3214b552f906d7a3c75da180834e76af48f31cb15874ea9f1742a65c28ed76ec6ebd0834454b06d8e8a2bdef910900
-
Filesize
24KB
MD55791c88837d845e7babca972da5f02af
SHA1bdb9a17e81b428fb302b5e3173c7fac09b041e27
SHA256e8c438b33039f5d76d742af3333d60ebcec499c62d4e31077f1de2397a10c7be
SHA5129e1a2071eaa2c7839a42dd8bb9e0a9dcc31e2f76324101dc02148b2374fb8d91904b243c2a1f55547796c68d48c511f9f3ab785c8fcdace0e68f9b331f0e073e
-
Filesize
23KB
MD554bb7dd01d94fa9e44eadb88c3f77a3f
SHA1e8731a34e79de2955aedbc68a25df5d4d77f8093
SHA256199abe672df824f45c13a6893a01d5e3625c8e213ff6d2e14458c58e1224ba06
SHA512fc25e2abcb38222804a1d502ee0b5ded5fbbd5265076bc2f5b9d4f5fda0477cf895bd34f89889dbfd08b1efeb17c8a3670471bf8de6752459ec024a4ff0406ff
-
Filesize
28KB
MD5e483041d83dde54dc1364f3c3c12d547
SHA1a68a4b51ab5cf3fd4a6f17e5b6ba0ca8b63c8ad6
SHA2561c3ed1bba7fa81b77719f4e19389a272622db825d79357b638e63997ac32b081
SHA51245f0c21db40264583e3a7d9bc10e4f9e3186cedb6cb04ad304fc6aa87581dd507fcf4b45856125be5868308fdd22c21423c5356ec75cbb22fa418a92cb54654d
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
\Users\Admin\AppData\Local\Temp\._cache_2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe
Filesize2.3MB
MD52a6403408c4b2fd77e26140b8eaee817
SHA17885e7921b00b627e40476ee583128fd98168e49
SHA256636d3d445834be35ceb487d31d913432da4c60d17aa5c0626249e0541d8af9a7
SHA512498038cce226ef29ed49365331e4ea94cbcd4ebbf9c5ad7905f4d36e9911fa7bba431960ab7cab3b517e039275549d8df152ae4d932b1fb51e74bd90d127ba06