Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 01:47
Behavioral task
behavioral1
Sample
2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe
-
Size
3.1MB
-
MD5
d9c3f8cff4b2362ea354329f24135766
-
SHA1
64156b0ec78acc4fadc2530ae9e8e6e99088f625
-
SHA256
b055d299e3e97f42977a8964a1392d09042dc4ea8d4a614b352639b2954d514d
-
SHA512
d481eb34ed83069b33033a16cf071a200545bb5ac473ac93e67b7661dffeaf1da8158dea956132ab18c4d1b7b32dacf4f5305c5bf1f725b25f4ccc8d63f04477
-
SSDEEP
98304:xnsmtk2aJqsJisrw7Q5RmDhnu59uh99wrc:NLI3EE/mDNu5ULr
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 2576 ._cache_2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe 404 Synaptics.exe 4224 ._cache_Synaptics.exe -
Loads dropped DLL 6 IoCs
pid Process 2576 ._cache_2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe 2576 ._cache_2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe 2576 ._cache_2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe 4224 ._cache_Synaptics.exe 4224 ._cache_Synaptics.exe 4224 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3364 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2576 ._cache_2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe 4224 ._cache_Synaptics.exe 3364 EXCEL.EXE 3364 EXCEL.EXE 3364 EXCEL.EXE 3364 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1460 wrote to memory of 2576 1460 2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe 83 PID 1460 wrote to memory of 2576 1460 2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe 83 PID 1460 wrote to memory of 2576 1460 2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe 83 PID 1460 wrote to memory of 404 1460 2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe 84 PID 1460 wrote to memory of 404 1460 2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe 84 PID 1460 wrote to memory of 404 1460 2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe 84 PID 404 wrote to memory of 4224 404 Synaptics.exe 85 PID 404 wrote to memory of 4224 404 Synaptics.exe 85 PID 404 wrote to memory of 4224 404 Synaptics.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\._cache_2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe"C:\Users\Admin\AppData\Local\Temp\._cache_2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2576
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4224
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5d9c3f8cff4b2362ea354329f24135766
SHA164156b0ec78acc4fadc2530ae9e8e6e99088f625
SHA256b055d299e3e97f42977a8964a1392d09042dc4ea8d4a614b352639b2954d514d
SHA512d481eb34ed83069b33033a16cf071a200545bb5ac473ac93e67b7661dffeaf1da8158dea956132ab18c4d1b7b32dacf4f5305c5bf1f725b25f4ccc8d63f04477
-
C:\Users\Admin\AppData\Local\Temp\._cache_2024-11-27_d9c3f8cff4b2362ea354329f24135766_darkgate_magniber.exe
Filesize2.3MB
MD52a6403408c4b2fd77e26140b8eaee817
SHA17885e7921b00b627e40476ee583128fd98168e49
SHA256636d3d445834be35ceb487d31d913432da4c60d17aa5c0626249e0541d8af9a7
SHA512498038cce226ef29ed49365331e4ea94cbcd4ebbf9c5ad7905f4d36e9911fa7bba431960ab7cab3b517e039275549d8df152ae4d932b1fb51e74bd90d127ba06
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
1KB
MD52a86ef34f315258839e59e5a0a079b6a
SHA197ea29a432a89df2d6fff9bf27d30ca04f9fd271
SHA2563c0430dc9095a538f84135106131cbe2ac1618c4851c9d05eddd2c1115789928
SHA512cad25b8be59cf8c7245b65e7dfae784ad1d5a16ebab3b77fceac346647915ffff25408b8e62c54a0aab578c9e232aaad9f7aadb1ecbe415874f0df77721e6f4c
-
Filesize
1KB
MD56a25e341d40f91b87b11f447d2e4237a
SHA188194bcef787bbf2acca55405d8cfcb21ac2dcb7
SHA256a529d3162289366a251bbebe05adb25f6db925896e54aebf956763133a3d460d
SHA512a0a0be4b82918822b69e33c3dbb39c4f908d605aeb3a8857cb1fbee014adca4d0414b04e101f7c06209639b22443c50549d728778b00ee38ecccfc2485b907ea
-
Filesize
1KB
MD54037c9318188e436b6af7849ab31a68d
SHA1b8b35ef3c83445a18a662c465cda819e7ccc60ab
SHA25690797b59cf4ba7f60f63ca0c101766bcebe0af08ddf4c4708a49b24a8c0fb89e
SHA512e2bd992daa146f9bf39a2f8136181254782e58b9fd28291b122600c1535941bf76c1ffb438e4c3cccab32d58a8ce5e98f457da8206c716c4bde1f56e3d384aac