Analysis
-
max time kernel
19s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2025, 06:51
Behavioral task
behavioral1
Sample
2025-04-09_e16789ec40d54811b6ac50b67b8088ac_black-basta_darkgate_luca-stealer.exe
Resource
win10v2004-20250313-en
General
-
Target
2025-04-09_e16789ec40d54811b6ac50b67b8088ac_black-basta_darkgate_luca-stealer.exe
-
Size
7.8MB
-
MD5
e16789ec40d54811b6ac50b67b8088ac
-
SHA1
0e9a3b4237bc26302d6c9b67953dbb238b1c7930
-
SHA256
a35abc179dec33c675fce2d6b19085618cb947122f4c8d7f8692281e78855964
-
SHA512
50b025afd2ba6ab580914a061a999165a96be4936fd560aa23c2b7161fc7fe525d4d2091e8847ba58954ca46c459c408030d3db7e60e09e7404ab8af4ef5cfc7
-
SSDEEP
196608:9L5M1ZqlnZQ4JhJ04H6AgNbeLP55RZFUwVQxf:9Rll0669kLPTHFdEf
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation 2025-04-09_e16789ec40d54811b6ac50b67b8088ac_black-basta_darkgate_luca-stealer.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 5 IoCs
pid Process 4404 ._cache_2025-04-09_e16789ec40d54811b6ac50b67b8088ac_black-basta_darkgate_luca-stealer.exe 4668 Synaptics.exe 4824 Synaptics.exe 3508 ._cache_Synaptics.exe 3556 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 2025-04-09_e16789ec40d54811b6ac50b67b8088ac_black-basta_darkgate_luca-stealer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\._cache_Synaptics.exe Synaptics.exe File opened for modification C:\Windows\SysWOW64\._cache_Synaptics.exe Synaptics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_2025-04-09_e16789ec40d54811b6ac50b67b8088ac_black-basta_darkgate_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-09_e16789ec40d54811b6ac50b67b8088ac_black-basta_darkgate_luca-stealer.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2025-04-09_e16789ec40d54811b6ac50b67b8088ac_black-basta_darkgate_luca-stealer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2100 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 4404 ._cache_2025-04-09_e16789ec40d54811b6ac50b67b8088ac_black-basta_darkgate_luca-stealer.exe 4404 ._cache_2025-04-09_e16789ec40d54811b6ac50b67b8088ac_black-basta_darkgate_luca-stealer.exe 3508 ._cache_Synaptics.exe 3508 ._cache_Synaptics.exe 3556 ._cache_Synaptics.exe 3556 ._cache_Synaptics.exe 2100 EXCEL.EXE 2100 EXCEL.EXE 2100 EXCEL.EXE 2100 EXCEL.EXE 2100 EXCEL.EXE 2100 EXCEL.EXE 2100 EXCEL.EXE 2100 EXCEL.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 5836 wrote to memory of 4404 5836 2025-04-09_e16789ec40d54811b6ac50b67b8088ac_black-basta_darkgate_luca-stealer.exe 87 PID 5836 wrote to memory of 4404 5836 2025-04-09_e16789ec40d54811b6ac50b67b8088ac_black-basta_darkgate_luca-stealer.exe 87 PID 5836 wrote to memory of 4404 5836 2025-04-09_e16789ec40d54811b6ac50b67b8088ac_black-basta_darkgate_luca-stealer.exe 87 PID 5836 wrote to memory of 4668 5836 2025-04-09_e16789ec40d54811b6ac50b67b8088ac_black-basta_darkgate_luca-stealer.exe 91 PID 5836 wrote to memory of 4668 5836 2025-04-09_e16789ec40d54811b6ac50b67b8088ac_black-basta_darkgate_luca-stealer.exe 91 PID 5836 wrote to memory of 4668 5836 2025-04-09_e16789ec40d54811b6ac50b67b8088ac_black-basta_darkgate_luca-stealer.exe 91 PID 4740 wrote to memory of 4824 4740 cmd.exe 92 PID 4740 wrote to memory of 4824 4740 cmd.exe 92 PID 4740 wrote to memory of 4824 4740 cmd.exe 92 PID 4824 wrote to memory of 3508 4824 Synaptics.exe 93 PID 4824 wrote to memory of 3508 4824 Synaptics.exe 93 PID 4824 wrote to memory of 3508 4824 Synaptics.exe 93 PID 4668 wrote to memory of 3556 4668 Synaptics.exe 94 PID 4668 wrote to memory of 3556 4668 Synaptics.exe 94 PID 4668 wrote to memory of 3556 4668 Synaptics.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-09_e16789ec40d54811b6ac50b67b8088ac_black-basta_darkgate_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-09_e16789ec40d54811b6ac50b67b8088ac_black-basta_darkgate_luca-stealer.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5836 -
C:\Users\Admin\AppData\Local\Temp\._cache_2025-04-09_e16789ec40d54811b6ac50b67b8088ac_black-basta_darkgate_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\._cache_2025-04-09_e16789ec40d54811b6ac50b67b8088ac_black-basta_darkgate_luca-stealer.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4404
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3556
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\Synaptics\Synaptics.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\ProgramData\Synaptics\Synaptics.exeC:\ProgramData\Synaptics\Synaptics.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\._cache_Synaptics.exe"C:\Windows\system32\._cache_Synaptics.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3508
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2100
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.8MB
MD5e16789ec40d54811b6ac50b67b8088ac
SHA10e9a3b4237bc26302d6c9b67953dbb238b1c7930
SHA256a35abc179dec33c675fce2d6b19085618cb947122f4c8d7f8692281e78855964
SHA51250b025afd2ba6ab580914a061a999165a96be4936fd560aa23c2b7161fc7fe525d4d2091e8847ba58954ca46c459c408030d3db7e60e09e7404ab8af4ef5cfc7
-
C:\Users\Admin\AppData\Local\Temp\._cache_2025-04-09_e16789ec40d54811b6ac50b67b8088ac_black-basta_darkgate_luca-stealer.exe
Filesize7.1MB
MD55eaed6e32bfe0791986a7ca7d3751b7a
SHA10709c88c6638e50119e0032bc046271e521f1c94
SHA256fe3a8561429cdc2743ea45afebae9ee531d357aba914ec1077b59bd45fb34479
SHA512fe32d43792d7461c280020f0242966589f3030469873ab42529aa02fa75348f2a52e3f50cfcdde2d1efe152f515c7702d8d662fd15af60cc506d7f7b35359128
-
Filesize
28KB
MD5a523aa8cfaa1ce5bac95029cdaf2f498
SHA15dd1a1ea0007218b69923aa5a7f2ed7969485489
SHA256b05463b7ff020ff8b28d60ccb31f79bc5c1178ce16c12a007ea8554ead3d0def
SHA512370b53cca19af54f1df810563a250dcb21d24ad744b69d4a7733615b43722003a6f6e4660e4e904fb1fa7fce7cda0885871d794db26118e30d04c25cb8abe09a
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04