Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2025 11:48
Behavioral task
behavioral1
Sample
2025-02-01_4b87b7448d0aaf1611dd75168e05f3fb_darkgate_luca-stealer_magniber.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-02-01_4b87b7448d0aaf1611dd75168e05f3fb_darkgate_luca-stealer_magniber.exe
Resource
win10v2004-20250129-en
General
-
Target
2025-02-01_4b87b7448d0aaf1611dd75168e05f3fb_darkgate_luca-stealer_magniber.exe
-
Size
20.6MB
-
MD5
4b87b7448d0aaf1611dd75168e05f3fb
-
SHA1
48366ee5d9504ea32cca7280ca355031b2d892e1
-
SHA256
3c3d7e16843be0a6e741a93f8b6e05ac39f5cb716c2f6a3efe6131c207bd19fe
-
SHA512
e6e61a69fb4abf79c05a8fb6693dee51439ecfcc26965417d5614ec275c8d9d68702eccb29e053a20f3e01bd39872bd628626dcf4b1c23bbe375cc69ab2f8f2b
-
SSDEEP
393216:EUVeyIB6YW/oLBLxss1p15V3qKBtO0iglAlbM1UsjDAvYmgNBOGQI9Bd/zsE9:/K6YTLzs05V3/EGA2GsjcAmsMG/9DAE9
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Detected Nirsoft tools 5 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/files/0x000c000000023b22-5.dat Nirsoft behavioral2/files/0x000200000001e7a0-65.dat Nirsoft behavioral2/memory/4056-127-0x0000000000400000-0x0000000001895000-memory.dmp Nirsoft behavioral2/memory/4248-240-0x0000000000400000-0x0000000001895000-memory.dmp Nirsoft behavioral2/memory/4248-266-0x0000000000400000-0x0000000001895000-memory.dmp Nirsoft -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation 2025-02-01_4b87b7448d0aaf1611dd75168e05f3fb_darkgate_luca-stealer_magniber.exe -
Executes dropped EXE 3 IoCs
pid Process 4108 ._cache_2025-02-01_4b87b7448d0aaf1611dd75168e05f3fb_darkgate_luca-stealer_magniber.exe 4248 Synaptics.exe 4480 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 2025-02-01_4b87b7448d0aaf1611dd75168e05f3fb_darkgate_luca-stealer_magniber.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_2025-02-01_4b87b7448d0aaf1611dd75168e05f3fb_darkgate_luca-stealer_magniber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-01_4b87b7448d0aaf1611dd75168e05f3fb_darkgate_luca-stealer_magniber.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2025-02-01_4b87b7448d0aaf1611dd75168e05f3fb_darkgate_luca-stealer_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1304 EXCEL.EXE -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4108 ._cache_2025-02-01_4b87b7448d0aaf1611dd75168e05f3fb_darkgate_luca-stealer_magniber.exe 4480 ._cache_Synaptics.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 856 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 856 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 4108 ._cache_2025-02-01_4b87b7448d0aaf1611dd75168e05f3fb_darkgate_luca-stealer_magniber.exe 4108 ._cache_2025-02-01_4b87b7448d0aaf1611dd75168e05f3fb_darkgate_luca-stealer_magniber.exe 4108 ._cache_2025-02-01_4b87b7448d0aaf1611dd75168e05f3fb_darkgate_luca-stealer_magniber.exe 4480 ._cache_Synaptics.exe 4480 ._cache_Synaptics.exe 4480 ._cache_Synaptics.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 4108 ._cache_2025-02-01_4b87b7448d0aaf1611dd75168e05f3fb_darkgate_luca-stealer_magniber.exe 4108 ._cache_2025-02-01_4b87b7448d0aaf1611dd75168e05f3fb_darkgate_luca-stealer_magniber.exe 4480 ._cache_Synaptics.exe 4480 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1304 EXCEL.EXE 1304 EXCEL.EXE 1304 EXCEL.EXE 1304 EXCEL.EXE 1304 EXCEL.EXE 1304 EXCEL.EXE 1304 EXCEL.EXE 1304 EXCEL.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4056 wrote to memory of 4108 4056 2025-02-01_4b87b7448d0aaf1611dd75168e05f3fb_darkgate_luca-stealer_magniber.exe 86 PID 4056 wrote to memory of 4108 4056 2025-02-01_4b87b7448d0aaf1611dd75168e05f3fb_darkgate_luca-stealer_magniber.exe 86 PID 4056 wrote to memory of 4108 4056 2025-02-01_4b87b7448d0aaf1611dd75168e05f3fb_darkgate_luca-stealer_magniber.exe 86 PID 4056 wrote to memory of 4248 4056 2025-02-01_4b87b7448d0aaf1611dd75168e05f3fb_darkgate_luca-stealer_magniber.exe 87 PID 4056 wrote to memory of 4248 4056 2025-02-01_4b87b7448d0aaf1611dd75168e05f3fb_darkgate_luca-stealer_magniber.exe 87 PID 4056 wrote to memory of 4248 4056 2025-02-01_4b87b7448d0aaf1611dd75168e05f3fb_darkgate_luca-stealer_magniber.exe 87 PID 4108 wrote to memory of 3960 4108 ._cache_2025-02-01_4b87b7448d0aaf1611dd75168e05f3fb_darkgate_luca-stealer_magniber.exe 88 PID 4108 wrote to memory of 3960 4108 ._cache_2025-02-01_4b87b7448d0aaf1611dd75168e05f3fb_darkgate_luca-stealer_magniber.exe 88 PID 4248 wrote to memory of 4480 4248 Synaptics.exe 91 PID 4248 wrote to memory of 4480 4248 Synaptics.exe 91 PID 4248 wrote to memory of 4480 4248 Synaptics.exe 91 PID 4480 wrote to memory of 4720 4480 ._cache_Synaptics.exe 94 PID 4480 wrote to memory of 4720 4480 ._cache_Synaptics.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-02-01_4b87b7448d0aaf1611dd75168e05f3fb_darkgate_luca-stealer_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-01_4b87b7448d0aaf1611dd75168e05f3fb_darkgate_luca-stealer_magniber.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\._cache_2025-02-01_4b87b7448d0aaf1611dd75168e05f3fb_darkgate_luca-stealer_magniber.exe"C:\Users\Admin\AppData\Local\Temp\._cache_2025-02-01_4b87b7448d0aaf1611dd75168e05f3fb_darkgate_luca-stealer_magniber.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\system32\cmd.exe"C:\Windows\Sysnative\cmd.exe" /c copy C:\Windows\system32\Tasks\KMSTools "C:\Users\Admin\AppData\Local\Temp\KMSTools.tmp" /Y3⤵PID:3960
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\system32\cmd.exe"C:\Windows\Sysnative\cmd.exe" /c copy C:\Windows\system32\Tasks\KMSTools "C:\Users\Admin\AppData\Local\Temp\KMSTools.tmp" /Y4⤵PID:4720
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x49c 0x2d81⤵
- Suspicious use of AdjustPrivilegeToken
PID:856
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20.6MB
MD54b87b7448d0aaf1611dd75168e05f3fb
SHA148366ee5d9504ea32cca7280ca355031b2d892e1
SHA2563c3d7e16843be0a6e741a93f8b6e05ac39f5cb716c2f6a3efe6131c207bd19fe
SHA512e6e61a69fb4abf79c05a8fb6693dee51439ecfcc26965417d5614ec275c8d9d68702eccb29e053a20f3e01bd39872bd628626dcf4b1c23bbe375cc69ab2f8f2b
-
C:\Users\Admin\AppData\Local\Temp\._cache_2025-02-01_4b87b7448d0aaf1611dd75168e05f3fb_darkgate_luca-stealer_magniber.exe
Filesize19.8MB
MD5c8c03628fd548c4725505d7f54958dd6
SHA19d5f52ba4e2a99baefb559cdc5f078fb678b2e19
SHA256cda31522b7cf502870861b98bf4ba1926a9aa1e0cf8650496a2ffb78eb1038e6
SHA512392fa18a6e6a100aaf8f91d7251f71bfc3ceeea45b59a0c87575045f8b46d99d31cc7436a1cb4d00ac25a64a8eafbafcc91411e74c0411aa8e8552fff74d0d70
-
Filesize
21KB
MD5107a84b555e2e035468b0548e0591bb0
SHA1f84f70f7ebcc738e78ca498edc383e7e75c78e07
SHA256d69e22e25d6c93d8136a45fee103850d1e1a9ed53072634c6a54d6ac79460db2
SHA5127461a9795fd88f8c5322696a3e058679e04490d1490c2520f81228d9219cb941ed0dec4467e0be75b9ed03271b6823259eaaedbfec3b93dd8b080e1ffedc0671
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04