Analysis
-
max time kernel
29s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
08/04/2025, 13:50
Behavioral task
behavioral1
Sample
2025-04-08_588220978173dfe71dd56b24197184c1_black-basta_darkgate_luca-stealer_poet-rat.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-08_588220978173dfe71dd56b24197184c1_black-basta_darkgate_luca-stealer_poet-rat.exe
-
Size
29.9MB
-
MD5
588220978173dfe71dd56b24197184c1
-
SHA1
6db7ecf593345c1698fc2b82433827acf6c5b5a3
-
SHA256
5b9a3fbad4a4bbd9b8131108cfd7638eefc451e0dc843547501ff36a7927a7af
-
SHA512
fdc83acecbd5086fdda45a8392ceab615f47adf7b8f1935300bf2ecf0fa8c086904b1c025724b94b1ba3a27a40dc1120a2670f78f6e74b8c6e38fe300a4f00c8
-
SSDEEP
196608:SLuaENXwue4YzjuNwXHMIjKOkLYARpkajWyiL9647tH+7Pf2F6rKIiYUGAba:SixxaLCijOOlijW964R8PfLKRYU8
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation 2025-04-08_588220978173dfe71dd56b24197184c1_black-basta_darkgate_luca-stealer_poet-rat.exe Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 5 IoCs
pid Process 2384 ._cache_2025-04-08_588220978173dfe71dd56b24197184c1_black-basta_darkgate_luca-stealer_poet-rat.exe 660 Synaptics.exe 4856 Synaptics.exe 4380 ._cache_Synaptics.exe 3904 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 2025-04-08_588220978173dfe71dd56b24197184c1_black-basta_darkgate_luca-stealer_poet-rat.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\._cache_Synaptics.exe Synaptics.exe File opened for modification C:\Windows\SysWOW64\._cache_Synaptics.exe Synaptics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-08_588220978173dfe71dd56b24197184c1_black-basta_darkgate_luca-stealer_poet-rat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_2025-04-08_588220978173dfe71dd56b24197184c1_black-basta_darkgate_luca-stealer_poet-rat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2025-04-08_588220978173dfe71dd56b24197184c1_black-basta_darkgate_luca-stealer_poet-rat.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3868 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2384 ._cache_2025-04-08_588220978173dfe71dd56b24197184c1_black-basta_darkgate_luca-stealer_poet-rat.exe 2384 ._cache_2025-04-08_588220978173dfe71dd56b24197184c1_black-basta_darkgate_luca-stealer_poet-rat.exe 2384 ._cache_2025-04-08_588220978173dfe71dd56b24197184c1_black-basta_darkgate_luca-stealer_poet-rat.exe 2384 ._cache_2025-04-08_588220978173dfe71dd56b24197184c1_black-basta_darkgate_luca-stealer_poet-rat.exe 3904 ._cache_Synaptics.exe 3904 ._cache_Synaptics.exe 3904 ._cache_Synaptics.exe 3904 ._cache_Synaptics.exe 4380 ._cache_Synaptics.exe 4380 ._cache_Synaptics.exe 4380 ._cache_Synaptics.exe 4380 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3868 EXCEL.EXE 3868 EXCEL.EXE 3868 EXCEL.EXE 3868 EXCEL.EXE 3868 EXCEL.EXE 3868 EXCEL.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4316 wrote to memory of 2384 4316 2025-04-08_588220978173dfe71dd56b24197184c1_black-basta_darkgate_luca-stealer_poet-rat.exe 89 PID 4316 wrote to memory of 2384 4316 2025-04-08_588220978173dfe71dd56b24197184c1_black-basta_darkgate_luca-stealer_poet-rat.exe 89 PID 4316 wrote to memory of 2384 4316 2025-04-08_588220978173dfe71dd56b24197184c1_black-basta_darkgate_luca-stealer_poet-rat.exe 89 PID 4316 wrote to memory of 660 4316 2025-04-08_588220978173dfe71dd56b24197184c1_black-basta_darkgate_luca-stealer_poet-rat.exe 93 PID 4316 wrote to memory of 660 4316 2025-04-08_588220978173dfe71dd56b24197184c1_black-basta_darkgate_luca-stealer_poet-rat.exe 93 PID 4316 wrote to memory of 660 4316 2025-04-08_588220978173dfe71dd56b24197184c1_black-basta_darkgate_luca-stealer_poet-rat.exe 93 PID 3432 wrote to memory of 4856 3432 cmd.exe 94 PID 3432 wrote to memory of 4856 3432 cmd.exe 94 PID 3432 wrote to memory of 4856 3432 cmd.exe 94 PID 4856 wrote to memory of 4380 4856 Synaptics.exe 96 PID 4856 wrote to memory of 4380 4856 Synaptics.exe 96 PID 4856 wrote to memory of 4380 4856 Synaptics.exe 96 PID 660 wrote to memory of 3904 660 Synaptics.exe 95 PID 660 wrote to memory of 3904 660 Synaptics.exe 95 PID 660 wrote to memory of 3904 660 Synaptics.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-08_588220978173dfe71dd56b24197184c1_black-basta_darkgate_luca-stealer_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-08_588220978173dfe71dd56b24197184c1_black-basta_darkgate_luca-stealer_poet-rat.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\._cache_2025-04-08_588220978173dfe71dd56b24197184c1_black-basta_darkgate_luca-stealer_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\._cache_2025-04-08_588220978173dfe71dd56b24197184c1_black-basta_darkgate_luca-stealer_poet-rat.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2384
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3904
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\Synaptics\Synaptics.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\ProgramData\Synaptics\Synaptics.exeC:\ProgramData\Synaptics\Synaptics.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\._cache_Synaptics.exe"C:\Windows\system32\._cache_Synaptics.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4380
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3868
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29.9MB
MD5588220978173dfe71dd56b24197184c1
SHA16db7ecf593345c1698fc2b82433827acf6c5b5a3
SHA2565b9a3fbad4a4bbd9b8131108cfd7638eefc451e0dc843547501ff36a7927a7af
SHA512fdc83acecbd5086fdda45a8392ceab615f47adf7b8f1935300bf2ecf0fa8c086904b1c025724b94b1ba3a27a40dc1120a2670f78f6e74b8c6e38fe300a4f00c8
-
C:\Users\Admin\AppData\Local\Temp\._cache_2025-04-08_588220978173dfe71dd56b24197184c1_black-basta_darkgate_luca-stealer_poet-rat.exe
Filesize29.2MB
MD53a79ebc1f311e1bfd4da9a2f63775b38
SHA12308b5660567e2312e92129e07dcf75615553d37
SHA2565ad5eaf37eeefb5eed7f0d486abd182164ab008557db2f5cb7ae399311c060a7
SHA5129f338568c5ead4e3c9e72e93dafd1da3e37ae2e02310a145dae72b78adbda5f2342914601c18b2d70ed45d42f12556e13aa67972fbcec5d720153d9b3ba6b6e2
-
Filesize
24KB
MD5da34ee4af9a79d06b31c301554b12216
SHA1289db0024a818856cf71bf7cb1ac8c855b1c3db4
SHA25615bc7950c0a270f0fc979a67438442d6acb51700802cd562b67bacc67fc2394b
SHA5123263df5396beb20eff395089bef179e58bc43683f778288b38556431b81c69f7b9e00368c8a42349f4ac9f33a78e791e5e8c682fd8d22d2cd1c04366903e9688
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04