Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 12:30
Behavioral task
behavioral1
Sample
2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exe
-
Size
4.0MB
-
MD5
fe812223b4ec65e09362ec90e98aeb66
-
SHA1
d63efd92ba34528df23c4666290ccc9b88bb4cc7
-
SHA256
63cf9f5d8fcdb4bc57c17b35b34f0a1edf92d42e4c2ff621a966c7a3cf2b1270
-
SHA512
13ce97105ccf6fbf8cfafdac0a9027fb60d1d68e9d09953849e7e2401f3df6ff5600b53ddcb4d88af29c0fd1cd24bb80ad6ea951fda8fa8b81c912d3e9aaa87e
-
SSDEEP
98304:+nsmtk2aqqanA7Q5RmbBNW9BMhnu5Puhyi1cZ+1KWDQ:ALPBAE/mwqNu5mUit1M
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
Processes:
._cache_2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exeSynaptics.exe._cache_Synaptics.exepid Process 2468 ._cache_2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exe 3024 Synaptics.exe 2892 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
Processes:
2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exeSynaptics.exepid Process 2360 2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exe 2360 2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exe 2360 2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exe 3024 Synaptics.exe 3024 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exe._cache_2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exeSynaptics.exe._cache_Synaptics.exeEXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 1904 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
._cache_2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exe._cache_Synaptics.exedescription pid Process Token: SeDebugPrivilege 2468 ._cache_2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exe Token: SeAssignPrimaryTokenPrivilege 2468 ._cache_2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exe Token: SeIncreaseQuotaPrivilege 2468 ._cache_2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exe Token: SeDebugPrivilege 2892 ._cache_Synaptics.exe Token: SeAssignPrimaryTokenPrivilege 2892 ._cache_Synaptics.exe Token: SeIncreaseQuotaPrivilege 2892 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
._cache_2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exe._cache_Synaptics.exeEXCEL.EXEpid Process 2468 ._cache_2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exe 2892 ._cache_Synaptics.exe 1904 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exeSynaptics.exedescription pid Process procid_target PID 2360 wrote to memory of 2468 2360 2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exe 30 PID 2360 wrote to memory of 2468 2360 2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exe 30 PID 2360 wrote to memory of 2468 2360 2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exe 30 PID 2360 wrote to memory of 2468 2360 2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exe 30 PID 2360 wrote to memory of 3024 2360 2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exe 31 PID 2360 wrote to memory of 3024 2360 2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exe 31 PID 2360 wrote to memory of 3024 2360 2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exe 31 PID 2360 wrote to memory of 3024 2360 2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exe 31 PID 3024 wrote to memory of 2892 3024 Synaptics.exe 32 PID 3024 wrote to memory of 2892 3024 Synaptics.exe 32 PID 3024 wrote to memory of 2892 3024 Synaptics.exe 32 PID 3024 wrote to memory of 2892 3024 Synaptics.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\._cache_2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exe"C:\Users\Admin\AppData\Local\Temp\._cache_2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2468
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2892
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD5fe812223b4ec65e09362ec90e98aeb66
SHA1d63efd92ba34528df23c4666290ccc9b88bb4cc7
SHA25663cf9f5d8fcdb4bc57c17b35b34f0a1edf92d42e4c2ff621a966c7a3cf2b1270
SHA51213ce97105ccf6fbf8cfafdac0a9027fb60d1d68e9d09953849e7e2401f3df6ff5600b53ddcb4d88af29c0fd1cd24bb80ad6ea951fda8fa8b81c912d3e9aaa87e
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
23KB
MD52200ba84df9c64dd8f32bf14d83f10c9
SHA1a4118339d72406fbd033848d22a799cd29245a3f
SHA256d3ae49a942c7c9111175a2fc29ee6b562dd2abfa39dc2db0016cf6d7a6a80c7f
SHA5122e3e61d2f371f5d23b37763c06d88319636c9b377923a10e1864fe268cdd0a7f35a95157868ea57e20b300b27001fff7be64f621a553cb0fe04ea63977dcf838
-
Filesize
27KB
MD5a31f7213fbf8636efe81a2fbf15ffaee
SHA1deb9c21d51f62515fcab0f170092ea8357521b62
SHA256110d06b567e1b8845e6f5b12a391841e4a264f118aea466b435404e3198ae015
SHA5121659a3c1d395c2604da2449fbd258f3c7aca6c6816070117a1581b41050f17bc1e484e95905742edce4ab4cf7f91dca3e250b65d9a1c0d3a4f988d8c126a1ccc
-
Filesize
28KB
MD51cabf2c20e8b761015e1683063a2f851
SHA1123f480a942297aef32cec0329ddc526c97942d1
SHA2562ca47121db1e8df927b98c3410557848d9fae702bd1fe9a8fb496624d45f15c3
SHA512dd506bcfebf150064d2df42113e489d58031d1ce76394d8c7f2bb6e81bbb63ed8b37973369b612c53021da2cb7ba797991d5df676ac28079b1baed229550018a
-
Filesize
1KB
MD54037c9318188e436b6af7849ab31a68d
SHA1b8b35ef3c83445a18a662c465cda819e7ccc60ab
SHA25690797b59cf4ba7f60f63ca0c101766bcebe0af08ddf4c4708a49b24a8c0fb89e
SHA512e2bd992daa146f9bf39a2f8136181254782e58b9fd28291b122600c1535941bf76c1ffb438e4c3cccab32d58a8ce5e98f457da8206c716c4bde1f56e3d384aac
-
Filesize
1KB
MD5bb52da2afef96834a101a86f99c9eea2
SHA1bc0a5987024339989202c13c2dd334d654ab3387
SHA2569df6e8f19d890b7ad50b4625aba5af7da4bff84c58e3a3de51b450e637b84147
SHA51275558e179da51cf392ea00aa64cd7039567f9848b87cf8d4c6a229141ff42412f1c7872ec6d0656481d620da4e218e463847c1e6a231ab52c90dc7623398938c
-
Filesize
1KB
MD52a86ef34f315258839e59e5a0a079b6a
SHA197ea29a432a89df2d6fff9bf27d30ca04f9fd271
SHA2563c0430dc9095a538f84135106131cbe2ac1618c4851c9d05eddd2c1115789928
SHA512cad25b8be59cf8c7245b65e7dfae784ad1d5a16ebab3b77fceac346647915ffff25408b8e62c54a0aab578c9e232aaad9f7aadb1ecbe415874f0df77721e6f4c
-
Filesize
1KB
MD56a25e341d40f91b87b11f447d2e4237a
SHA188194bcef787bbf2acca55405d8cfcb21ac2dcb7
SHA256a529d3162289366a251bbebe05adb25f6db925896e54aebf956763133a3d460d
SHA512a0a0be4b82918822b69e33c3dbb39c4f908d605aeb3a8857cb1fbee014adca4d0414b04e101f7c06209639b22443c50549d728778b00ee38ecccfc2485b907ea
-
Filesize
1KB
MD58d5a3c47f0d0cccd9b8ef6872bf845a8
SHA12e24f1f90870405cd7dc743b2560d8f334319701
SHA256a41f406995addeb19a5b456b34504df9e9ae35ba2a05d029a20741131cb01c44
SHA5126d2c133a923e2b945b5d9de2c729d1ca36b3498270d343c8475d0566d760ce5ad15c79d5674b7b48cfecfa1ebb2f73de9205cda379df2c0b3ff47c3df7a563b1
-
Filesize
1KB
MD5fc41f921283d788505e600c39138a735
SHA19d64742e27ccd68f76c6af3ecb28519b3c009481
SHA25680b5408dadc8155573719ac6a031eb741478c9f4f7d63e9d508455bd0b5717fc
SHA512c008bba0ff1d607c5371667490e1f928b257550f9d4cec29ccca03518eb20b591d2267a609cf746174a7bc5522e49f5ec8711b8274091fbaaba244241282c03d
-
Filesize
1KB
MD57e750f44816d30edebfbc9e17eb820d9
SHA1d471fb00b758bdbaeac36657367332b97c3d0d31
SHA25656dddf1d34a7bd5243c0983a1d4b5c76abc29a98a9f932d9c6c55f352cfe8d03
SHA51262678c595083e9415a767c1f4ccbbf1a1aa4ab92354bbda7d73ed4cd3b2d0239ba4afa4d47ef1f2778051a63178c0b480c51aedbfc78813accdbfb5551c0f4dd
-
Filesize
1KB
MD533ce91de20ac8ec5f04e2fb241b6f4fc
SHA1d0b7682c2b82595da7ab2a4f36e3019468b6c41f
SHA256d9c23116ba8788e27b61b3e45a6101b762464a4c1ecba8a36a6ae2c91dc91dd1
SHA512dda5d17b1c4a24f2b34fc8a2d917893227ac447d1297f72d5efb7ad82707b821cfafc989157d9489f3b0db9b311156330a6f005923b3827647c676380827cad9
-
\Users\Admin\AppData\Local\Temp\._cache_2024-12-03_fe812223b4ec65e09362ec90e98aeb66_darkgate_magniber.exe
Filesize3.3MB
MD5f0e5feb33456e9d07be9cd6c475076ba
SHA169e24ec64e8825b9f639a417aaadf6386087b61a
SHA2562f009ce8426068f39eaa5c8df77d340f40090d422a6ab5fdfd0f5416c2f62a41
SHA51216b7b933dcb1d6c7f033601808ff0367810dd86f6f3aad03d0739f42845e5755643aed3837866420adbb17db0ed20b1c9006ea4847cead9f3ad08d75705d6eba