Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
08/04/2025, 13:59
Behavioral task
behavioral1
Sample
2025-04-08_e1bab7c00ce1c775d9e5e5d1fef9a395_black-basta_darkgate_hijackloader_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-08_e1bab7c00ce1c775d9e5e5d1fef9a395_black-basta_darkgate_hijackloader_luca-stealer.exe
-
Size
1.5MB
-
MD5
e1bab7c00ce1c775d9e5e5d1fef9a395
-
SHA1
26d700d68f924d24a109330fb5cb1cb4ca048fac
-
SHA256
3b3265722e3469df3ed06135853c99887a5b9cf6451a441bac75ef3455fd3443
-
SHA512
fa09873e45a72bbe6d24920af3d7ea5e30b3e56e44e0f8ae152687062326852346400a51b8de67cf3a47a7efb114aa5c1282542d94ff47606a9ac99ad975f04a
-
SSDEEP
24576:NnsJ39LyjbJkQFMhmC+6GD90+uYOgKrgsohT4ETq1e65H1:NnsHyjtk2MYC5GDZQPAhT4Ehu
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation 2025-04-08_e1bab7c00ce1c775d9e5e5d1fef9a395_black-basta_darkgate_hijackloader_luca-stealer.exe -
Executes dropped EXE 8 IoCs
pid Process 2340 ._cache_2025-04-08_e1bab7c00ce1c775d9e5e5d1fef9a395_black-basta_darkgate_hijackloader_luca-stealer.exe 5796 ._cache_2025-04-08_e1bab7c00ce1c775d9e5e5d1fef9a395_black-basta_darkgate_hijackloader_luca-stealer.exe 4708 Synaptics.exe 2864 Synaptics.exe 5404 ._cache_Synaptics.exe 1832 ._cache_Synaptics.exe 5908 ._cache_Synaptics.exe 2632 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 2025-04-08_e1bab7c00ce1c775d9e5e5d1fef9a395_black-basta_darkgate_hijackloader_luca-stealer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\._cache_Synaptics.exe Synaptics.exe File opened for modification C:\Windows\SysWOW64\._cache_Synaptics.exe Synaptics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-08_e1bab7c00ce1c775d9e5e5d1fef9a395_black-basta_darkgate_hijackloader_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2025-04-08_e1bab7c00ce1c775d9e5e5d1fef9a395_black-basta_darkgate_hijackloader_luca-stealer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4224 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 4224 EXCEL.EXE 4224 EXCEL.EXE 4224 EXCEL.EXE 4224 EXCEL.EXE 4224 EXCEL.EXE 4224 EXCEL.EXE 4224 EXCEL.EXE 4224 EXCEL.EXE 4224 EXCEL.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 836 wrote to memory of 4708 836 2025-04-08_e1bab7c00ce1c775d9e5e5d1fef9a395_black-basta_darkgate_hijackloader_luca-stealer.exe 92 PID 836 wrote to memory of 4708 836 2025-04-08_e1bab7c00ce1c775d9e5e5d1fef9a395_black-basta_darkgate_hijackloader_luca-stealer.exe 92 PID 836 wrote to memory of 4708 836 2025-04-08_e1bab7c00ce1c775d9e5e5d1fef9a395_black-basta_darkgate_hijackloader_luca-stealer.exe 92 PID 3636 wrote to memory of 2864 3636 cmd.exe 93 PID 3636 wrote to memory of 2864 3636 cmd.exe 93 PID 3636 wrote to memory of 2864 3636 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-08_e1bab7c00ce1c775d9e5e5d1fef9a395_black-basta_darkgate_hijackloader_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-08_e1bab7c00ce1c775d9e5e5d1fef9a395_black-basta_darkgate_hijackloader_luca-stealer.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\._cache_2025-04-08_e1bab7c00ce1c775d9e5e5d1fef9a395_black-basta_darkgate_hijackloader_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\._cache_2025-04-08_e1bab7c00ce1c775d9e5e5d1fef9a395_black-basta_darkgate_hijackloader_luca-stealer.exe"2⤵
- Executes dropped EXE
PID:2340
-
-
C:\Users\Admin\AppData\Local\Temp\._cache_2025-04-08_e1bab7c00ce1c775d9e5e5d1fef9a395_black-basta_darkgate_hijackloader_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\._cache_2025-04-08_e1bab7c00ce1c775d9e5e5d1fef9a395_black-basta_darkgate_hijackloader_luca-stealer.exe"2⤵
- Executes dropped EXE
PID:5796
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:5404
-
-
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:1832
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\Synaptics\Synaptics.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\ProgramData\Synaptics\Synaptics.exeC:\ProgramData\Synaptics\Synaptics.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2864 -
C:\Windows\SysWOW64\._cache_Synaptics.exe"C:\Windows\system32\._cache_Synaptics.exe"3⤵
- Executes dropped EXE
PID:5908
-
-
C:\Windows\SysWOW64\._cache_Synaptics.exe"C:\Windows\system32\._cache_Synaptics.exe"3⤵
- Executes dropped EXE
PID:2632
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4224
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5e1bab7c00ce1c775d9e5e5d1fef9a395
SHA126d700d68f924d24a109330fb5cb1cb4ca048fac
SHA2563b3265722e3469df3ed06135853c99887a5b9cf6451a441bac75ef3455fd3443
SHA512fa09873e45a72bbe6d24920af3d7ea5e30b3e56e44e0f8ae152687062326852346400a51b8de67cf3a47a7efb114aa5c1282542d94ff47606a9ac99ad975f04a
-
C:\Users\Admin\AppData\Local\Temp\._cache_2025-04-08_e1bab7c00ce1c775d9e5e5d1fef9a395_black-basta_darkgate_hijackloader_luca-stealer.exe
Filesize832KB
MD5703d3bb94fb70dc9308797cbf6213ab5
SHA1677825f5688e01b8151545a5602af60d36d57b87
SHA256f343573d0b9abd90f1d12370e42ce4af8c3f4c427538b76ccec67db256ea7b4e
SHA512f9fe0a1cf76d03a2b55f35931cb0aaba8650acf5c5efe59985b44823fd5f41c77d995613884078e0c718edfce4cd592f8bb1d5a9c8840faad33b230f5fe1e8ee
-
Filesize
22KB
MD5198425fabd86ad22dc7c522f9c5903f1
SHA1848fec2bcbed05296017eed9f699f2f4aa6a3c2a
SHA25677ae171a5ccf3bf939fb22869ebd127353adf8f0d32244c7b4f7b15aa26b0910
SHA5123c31514003868245fbb55035e1b0c3d9fff05f5ffc4bb0256de13bf0f47e7c39d6d988c3c6b402e610caed2083127a0e86a23b6a988fd1eac68d61464b9de98d
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04