Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 19:25
Behavioral task
behavioral1
Sample
2025-01-16_a471854facb61ad4d760001845c57469_darkgate_luca-stealer_magniber.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2025-01-16_a471854facb61ad4d760001845c57469_darkgate_luca-stealer_magniber.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-16_a471854facb61ad4d760001845c57469_darkgate_luca-stealer_magniber.exe
-
Size
9.7MB
-
MD5
a471854facb61ad4d760001845c57469
-
SHA1
6275477c5ddfe99db225b580193b6b26e3ae7152
-
SHA256
56bdfa76e1f0629bbde6b7fa28d8efb7e77252ff190b90470078d9a3ab80a15f
-
SHA512
f0e89a7c39a6095be8e932a235ceaba5218fed9cdc1e55af9c92e6b5f6ceb02acf20a616b76eb5515c878d11fa7242d26a589fdb8ef211d1f104e08e861d14f9
-
SSDEEP
196608:zLo73STvxTfg6AiQBhyQbEAkZQdnkW9AVSGfGIJXvaI6HMaJTtGbp:zc73ATfzyyu4JfdJXx
Malware Config
Extracted
https://mrodevicemgr.officeapps.live.com/mrodevicemgrsvc/api/v2/C2RReleaseData
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 27 2484 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 2025-01-16_a471854facb61ad4d760001845c57469_darkgate_luca-stealer_magniber.exe -
Executes dropped EXE 3 IoCs
pid Process 4808 ._cache_2025-01-16_a471854facb61ad4d760001845c57469_darkgate_luca-stealer_magniber.exe 2804 Synaptics.exe 2216 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 2025-01-16_a471854facb61ad4d760001845c57469_darkgate_luca-stealer_magniber.exe -
pid Process 2484 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-16_a471854facb61ad4d760001845c57469_darkgate_luca-stealer_magniber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_2025-01-16_a471854facb61ad4d760001845c57469_darkgate_luca-stealer_magniber.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2025-01-16_a471854facb61ad4d760001845c57469_darkgate_luca-stealer_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1268 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2484 powershell.exe 2484 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4808 ._cache_2025-01-16_a471854facb61ad4d760001845c57469_darkgate_luca-stealer_magniber.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2484 powershell.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1268 EXCEL.EXE 1268 EXCEL.EXE 1268 EXCEL.EXE 1268 EXCEL.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4416 wrote to memory of 4808 4416 2025-01-16_a471854facb61ad4d760001845c57469_darkgate_luca-stealer_magniber.exe 82 PID 4416 wrote to memory of 4808 4416 2025-01-16_a471854facb61ad4d760001845c57469_darkgate_luca-stealer_magniber.exe 82 PID 4416 wrote to memory of 4808 4416 2025-01-16_a471854facb61ad4d760001845c57469_darkgate_luca-stealer_magniber.exe 82 PID 4808 wrote to memory of 3932 4808 ._cache_2025-01-16_a471854facb61ad4d760001845c57469_darkgate_luca-stealer_magniber.exe 83 PID 4808 wrote to memory of 3932 4808 ._cache_2025-01-16_a471854facb61ad4d760001845c57469_darkgate_luca-stealer_magniber.exe 83 PID 4808 wrote to memory of 3932 4808 ._cache_2025-01-16_a471854facb61ad4d760001845c57469_darkgate_luca-stealer_magniber.exe 83 PID 4416 wrote to memory of 2804 4416 2025-01-16_a471854facb61ad4d760001845c57469_darkgate_luca-stealer_magniber.exe 85 PID 4416 wrote to memory of 2804 4416 2025-01-16_a471854facb61ad4d760001845c57469_darkgate_luca-stealer_magniber.exe 85 PID 4416 wrote to memory of 2804 4416 2025-01-16_a471854facb61ad4d760001845c57469_darkgate_luca-stealer_magniber.exe 85 PID 2804 wrote to memory of 2216 2804 Synaptics.exe 86 PID 2804 wrote to memory of 2216 2804 Synaptics.exe 86 PID 2804 wrote to memory of 2216 2804 Synaptics.exe 86 PID 4808 wrote to memory of 2484 4808 ._cache_2025-01-16_a471854facb61ad4d760001845c57469_darkgate_luca-stealer_magniber.exe 91 PID 4808 wrote to memory of 2484 4808 ._cache_2025-01-16_a471854facb61ad4d760001845c57469_darkgate_luca-stealer_magniber.exe 91 PID 4808 wrote to memory of 2484 4808 ._cache_2025-01-16_a471854facb61ad4d760001845c57469_darkgate_luca-stealer_magniber.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-16_a471854facb61ad4d760001845c57469_darkgate_luca-stealer_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-16_a471854facb61ad4d760001845c57469_darkgate_luca-stealer_magniber.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\._cache_2025-01-16_a471854facb61ad4d760001845c57469_darkgate_luca-stealer_magniber.exe"C:\Users\Admin\AppData\Local\Temp\._cache_2025-01-16_a471854facb61ad4d760001845c57469_darkgate_luca-stealer_magniber.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\reg.exe"reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Script Host\Settings" /v "Enabled" /t REG_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
PID:3932
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -nop -command "& { (New-Object Net.WebClient).DownloadFile('https://mrodevicemgr.officeapps.live.com/mrodevicemgrsvc/api/v2/C2RReleaseData', 'C:\Users\Admin\AppData\Local\Temp\files\ver.txt') }"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2484
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2216
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.7MB
MD5a471854facb61ad4d760001845c57469
SHA16275477c5ddfe99db225b580193b6b26e3ae7152
SHA25656bdfa76e1f0629bbde6b7fa28d8efb7e77252ff190b90470078d9a3ab80a15f
SHA512f0e89a7c39a6095be8e932a235ceaba5218fed9cdc1e55af9c92e6b5f6ceb02acf20a616b76eb5515c878d11fa7242d26a589fdb8ef211d1f104e08e861d14f9
-
C:\Users\Admin\AppData\Local\Temp\._cache_2025-01-16_a471854facb61ad4d760001845c57469_darkgate_luca-stealer_magniber.exe
Filesize9.0MB
MD5bb47521d553de207b420f7a16dddf152
SHA1ed2fb53becb4b161d58bd90ea42211751bc36c78
SHA256167fb686a8182b4380c699306a3c533eb3c264665925ad086329a752e0b2bde1
SHA512e0cda4ddccc70b9791a74b27a3c2b3453cbfa1d2a7e78fdb44c3150e90dea061b324e6b76e56a8ef6af7268516fbc97ee278e870b720a4a08887576b09b52801
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
57KB
MD5a475b7bd3073826426111f5a710a235f
SHA18f6583edb25eac306d6201627a03b4ce1d233ae6
SHA25680ffe7b51b859e8fa9fafba0212c094df89bb0969ed76816ae62a39730ed637f
SHA512415ca0ac8f648f07378feda6a1611922b29ee294de671cfc26240c8fd59d29a7973fdb196a89c878764174070e9a0d973228c7d1e027a463443fd3d5d398c8e5