Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-01-2025 13:29
Behavioral task
behavioral1
Sample
2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber.exe
-
Size
20.6MB
-
MD5
db88155e4bce794188a61369780ba162
-
SHA1
577efdb04544d7d6a32e212e5d0e3b1529c95577
-
SHA256
b26d57328c89c925b195cafa44279f2648a051ba7309b0ed098ed0d335e2b296
-
SHA512
734cfb73563308f214d3bc42f64f9dff78c35e183f47d11e4a210e438327c1b5cb563df831400aeb72dd329c0bc9bd45763a048a622482ab7b104274790f6393
-
SSDEEP
393216:EUVeyIB6YW/oLBLxss1p15V3qKBtO0iglAlbM1UsjDAvYmgNBOGQI9Bd/zsEv:/K6YTLzs05V3/EGA2GsjcAmsMG/9DAEv
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Detected Nirsoft tools 8 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/files/0x0007000000012118-4.dat Nirsoft behavioral1/files/0x0008000000016c73-13.dat Nirsoft behavioral1/memory/1032-24-0x0000000000400000-0x0000000001895000-memory.dmp Nirsoft behavioral1/memory/2996-115-0x0000000000400000-0x0000000001895000-memory.dmp Nirsoft behavioral1/memory/2996-116-0x0000000000400000-0x0000000001895000-memory.dmp Nirsoft behavioral1/memory/2996-117-0x0000000000400000-0x0000000001895000-memory.dmp Nirsoft behavioral1/memory/2996-122-0x0000000000400000-0x0000000001895000-memory.dmp Nirsoft behavioral1/memory/2996-149-0x0000000000400000-0x0000000001895000-memory.dmp Nirsoft -
resource behavioral1/files/0x0008000000017403-70.dat behavioral1/files/0x000700000001746a-83.dat behavioral1/files/0x000a000000017403-94.dat behavioral1/files/0x0007000000017488-107.dat -
Executes dropped EXE 3 IoCs
pid Process 1708 ._cache_2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber.exe 2996 Synaptics.exe 2688 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 1032 2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber.exe 1032 2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber.exe 1032 2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber.exe 2996 Synaptics.exe 2996 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2188 EXCEL.EXE -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1708 ._cache_2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber.exe 2688 ._cache_Synaptics.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 1708 ._cache_2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber.exe 1708 ._cache_2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber.exe 1708 ._cache_2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber.exe 2688 ._cache_Synaptics.exe 2688 ._cache_Synaptics.exe 2688 ._cache_Synaptics.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1708 ._cache_2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber.exe 1708 ._cache_2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber.exe 2688 ._cache_Synaptics.exe 2688 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2188 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1032 wrote to memory of 1708 1032 2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber.exe 28 PID 1032 wrote to memory of 1708 1032 2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber.exe 28 PID 1032 wrote to memory of 1708 1032 2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber.exe 28 PID 1032 wrote to memory of 1708 1032 2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber.exe 28 PID 1032 wrote to memory of 2996 1032 2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber.exe 29 PID 1032 wrote to memory of 2996 1032 2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber.exe 29 PID 1032 wrote to memory of 2996 1032 2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber.exe 29 PID 1032 wrote to memory of 2996 1032 2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber.exe 29 PID 2996 wrote to memory of 2688 2996 Synaptics.exe 30 PID 2996 wrote to memory of 2688 2996 Synaptics.exe 30 PID 2996 wrote to memory of 2688 2996 Synaptics.exe 30 PID 2996 wrote to memory of 2688 2996 Synaptics.exe 30 PID 1708 wrote to memory of 2064 1708 ._cache_2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber.exe 31 PID 1708 wrote to memory of 2064 1708 ._cache_2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber.exe 31 PID 1708 wrote to memory of 2064 1708 ._cache_2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber.exe 31 PID 1708 wrote to memory of 2064 1708 ._cache_2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber.exe 31 PID 2688 wrote to memory of 2772 2688 ._cache_Synaptics.exe 34 PID 2688 wrote to memory of 2772 2688 ._cache_Synaptics.exe 34 PID 2688 wrote to memory of 2772 2688 ._cache_Synaptics.exe 34 PID 2688 wrote to memory of 2772 2688 ._cache_Synaptics.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\._cache_2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber.exe"C:\Users\Admin\AppData\Local\Temp\._cache_2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\system32\cmd.exe"C:\Windows\Sysnative\cmd.exe" /c copy C:\Windows\system32\Tasks\KMSTools "C:\Users\Admin\AppData\Local\Temp\KMSTools.tmp" /Y3⤵PID:2064
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\system32\cmd.exe"C:\Windows\Sysnative\cmd.exe" /c copy C:\Windows\system32\Tasks\KMSTools "C:\Users\Admin\AppData\Local\Temp\KMSTools.tmp" /Y4⤵PID:2772
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20.6MB
MD5db88155e4bce794188a61369780ba162
SHA1577efdb04544d7d6a32e212e5d0e3b1529c95577
SHA256b26d57328c89c925b195cafa44279f2648a051ba7309b0ed098ed0d335e2b296
SHA512734cfb73563308f214d3bc42f64f9dff78c35e183f47d11e4a210e438327c1b5cb563df831400aeb72dd329c0bc9bd45763a048a622482ab7b104274790f6393
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
23KB
MD5daab5370af2853376b7a358e9ec0d705
SHA165440b62794e2d9e8a2a3d07c7f0a72352c56bde
SHA2564ddceba4c945136a1cc7c883ef7b000c84b4851a54cfa959970edbfa97a492aa
SHA512546cd60e123bd4d4816478729a2c7d0c2df6f4948b8d13158f12377ffad216fe86874c5c7b45c390a4212a88dfa47f1d4ad69cf7a8df955ba0e3e3588af3e637
-
Filesize
26KB
MD5c13857bfa12d371b73004d6e941d1d76
SHA1f6484038d4aa5acb2685142952f25362a0e14be8
SHA2560eb964843c39dfc00f9350e21393b877c5c48ed23fefb09278ddc3ff5e185b39
SHA5122a66707a46ca756c6446be3f04389ceab665de5290486bc77feb9c7faa73e772a8f36b8298e3db9e1866fd5c85d4c8d6817c4a53ff2a2faaaa4dd69137bea385
-
Filesize
22KB
MD5589c2e22e27cd44d71c7b59782463c7c
SHA13432f8988682999570ac4e19a47a13299e100946
SHA2569e0e5b94024e300ca242b1c7f6e2d611574be8602343d0f42364168ad2205795
SHA51234fecf3704a52cf59dc0a12934bfc95a650b904e2c02245a5e219e5e08c1046eb65d1b83b2772c623217c4b0502819ac4eb5d37e5db8b4c8e02452bc73770baa
-
Filesize
24KB
MD53280c41fb76e6ad32421cc62ea1a4d98
SHA1f929311d3cc963ed99d2650300d7b6f45fd2df7e
SHA256b5fb5a488de665f8ae19a1b14e4cd89833d16d06adfec15273219f11562c93d3
SHA512c8e932d6f4566c4c4b33d8a714abb5f018c1083a66af36b653ee130791d91bcb518a8cfe5e09c7372e5a2eb4c3008300badba869b1ba7e00edeb5aa4495f70ba
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
\Users\Admin\AppData\Local\Temp\._cache_2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber.exe
Filesize19.8MB
MD5c8c03628fd548c4725505d7f54958dd6
SHA19d5f52ba4e2a99baefb559cdc5f078fb678b2e19
SHA256cda31522b7cf502870861b98bf4ba1926a9aa1e0cf8650496a2ffb78eb1038e6
SHA512392fa18a6e6a100aaf8f91d7251f71bfc3ceeea45b59a0c87575045f8b46d99d31cc7436a1cb4d00ac25a64a8eafbafcc91411e74c0411aa8e8552fff74d0d70