Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2025, 21:34
Behavioral task
behavioral1
Sample
2025-04-10_946803c996f7c32f754b4e864a1e4ac5_amadey_darkgate_elex_magniber_poet-rat_rhadamanthys_smoke-loader.exe
Resource
win10v2004-20250410-en
General
-
Target
2025-04-10_946803c996f7c32f754b4e864a1e4ac5_amadey_darkgate_elex_magniber_poet-rat_rhadamanthys_smoke-loader.exe
-
Size
28.7MB
-
MD5
946803c996f7c32f754b4e864a1e4ac5
-
SHA1
c982b2e7dd6844327f4a77e9a8365067345670ae
-
SHA256
f642d048f822c9b363135f29b649077f9d5371460644add8a38cd1211aa76e4b
-
SHA512
b57e51b90fb25701cdb1bda2717d6a836643bee8d8b1f7729b0c1d8a9b5cbcce1eba35b028f21cfef851de446c6ef4ed23feaf8849820ba8b385572b018fb251
-
SSDEEP
393216:Bn1a552kjgDWzYQqD/Jf59RqWEOax8eX+bLJItmNiL5yTG1M16PExfe9zMHl:J1aljQWz0xRqbGeO8m4ll8f1Hl
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000\Control Panel\International\Geo\Nation 2025-04-10_946803c996f7c32f754b4e864a1e4ac5_amadey_darkgate_elex_magniber_poet-rat_rhadamanthys_smoke-loader.exe -
Executes dropped EXE 7 IoCs
pid Process 232 ._cache_2025-04-10_946803c996f7c32f754b4e864a1e4ac5_amadey_darkgate_elex_magniber_poet-rat_rhadamanthys_smoke-loader.exe 5356 Synaptics.exe 5816 Synaptics.exe 2808 ._cache_Synaptics.exe 4728 ._cache_Synaptics.exe 2176 ._cache_Synaptics.exe 1956 ._cache_Synaptics.exe -
Loads dropped DLL 10 IoCs
pid Process 2808 ._cache_Synaptics.exe 2808 ._cache_Synaptics.exe 2808 ._cache_Synaptics.exe 2808 ._cache_Synaptics.exe 4728 ._cache_Synaptics.exe 4728 ._cache_Synaptics.exe 4728 ._cache_Synaptics.exe 4728 ._cache_Synaptics.exe 2176 ._cache_Synaptics.exe 1956 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 2025-04-10_946803c996f7c32f754b4e864a1e4ac5_amadey_darkgate_elex_magniber_poet-rat_rhadamanthys_smoke-loader.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\._cache_Synaptics.exe Synaptics.exe File opened for modification C:\Windows\SysWOW64\._cache_Synaptics.exe Synaptics.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2808 set thread context of 2176 2808 ._cache_Synaptics.exe 91 PID 4728 set thread context of 1956 4728 ._cache_Synaptics.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1712 232 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_946803c996f7c32f754b4e864a1e4ac5_amadey_darkgate_elex_magniber_poet-rat_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_2025-04-10_946803c996f7c32f754b4e864a1e4ac5_amadey_darkgate_elex_magniber_poet-rat_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language ._cache_Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2025-04-10_946803c996f7c32f754b4e864a1e4ac5_amadey_darkgate_elex_magniber_poet-rat_rhadamanthys_smoke-loader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 6052 EXCEL.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2808 ._cache_Synaptics.exe 4728 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 6052 EXCEL.EXE 6052 EXCEL.EXE 6052 EXCEL.EXE 6052 EXCEL.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 764 wrote to memory of 232 764 2025-04-10_946803c996f7c32f754b4e864a1e4ac5_amadey_darkgate_elex_magniber_poet-rat_rhadamanthys_smoke-loader.exe 81 PID 764 wrote to memory of 232 764 2025-04-10_946803c996f7c32f754b4e864a1e4ac5_amadey_darkgate_elex_magniber_poet-rat_rhadamanthys_smoke-loader.exe 81 PID 764 wrote to memory of 232 764 2025-04-10_946803c996f7c32f754b4e864a1e4ac5_amadey_darkgate_elex_magniber_poet-rat_rhadamanthys_smoke-loader.exe 81 PID 764 wrote to memory of 5356 764 2025-04-10_946803c996f7c32f754b4e864a1e4ac5_amadey_darkgate_elex_magniber_poet-rat_rhadamanthys_smoke-loader.exe 87 PID 764 wrote to memory of 5356 764 2025-04-10_946803c996f7c32f754b4e864a1e4ac5_amadey_darkgate_elex_magniber_poet-rat_rhadamanthys_smoke-loader.exe 87 PID 764 wrote to memory of 5356 764 2025-04-10_946803c996f7c32f754b4e864a1e4ac5_amadey_darkgate_elex_magniber_poet-rat_rhadamanthys_smoke-loader.exe 87 PID 2436 wrote to memory of 5816 2436 cmd.exe 88 PID 2436 wrote to memory of 5816 2436 cmd.exe 88 PID 2436 wrote to memory of 5816 2436 cmd.exe 88 PID 5356 wrote to memory of 2808 5356 Synaptics.exe 90 PID 5356 wrote to memory of 2808 5356 Synaptics.exe 90 PID 5356 wrote to memory of 2808 5356 Synaptics.exe 90 PID 5816 wrote to memory of 4728 5816 Synaptics.exe 89 PID 5816 wrote to memory of 4728 5816 Synaptics.exe 89 PID 5816 wrote to memory of 4728 5816 Synaptics.exe 89 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 4728 wrote to memory of 1956 4728 ._cache_Synaptics.exe 92 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 4728 wrote to memory of 1956 4728 ._cache_Synaptics.exe 92 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 4728 wrote to memory of 1956 4728 ._cache_Synaptics.exe 92 PID 4728 wrote to memory of 1956 4728 ._cache_Synaptics.exe 92 PID 4728 wrote to memory of 1956 4728 ._cache_Synaptics.exe 92 PID 4728 wrote to memory of 1956 4728 ._cache_Synaptics.exe 92 PID 4728 wrote to memory of 1956 4728 ._cache_Synaptics.exe 92 PID 4728 wrote to memory of 1956 4728 ._cache_Synaptics.exe 92 PID 4728 wrote to memory of 1956 4728 ._cache_Synaptics.exe 92 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91 PID 2808 wrote to memory of 2176 2808 ._cache_Synaptics.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_946803c996f7c32f754b4e864a1e4ac5_amadey_darkgate_elex_magniber_poet-rat_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-10_946803c996f7c32f754b4e864a1e4ac5_amadey_darkgate_elex_magniber_poet-rat_rhadamanthys_smoke-loader.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\._cache_2025-04-10_946803c996f7c32f754b4e864a1e4ac5_amadey_darkgate_elex_magniber_poet-rat_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\._cache_2025-04-10_946803c996f7c32f754b4e864a1e4ac5_amadey_darkgate_elex_magniber_poet-rat_rhadamanthys_smoke-loader.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:232 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 232 -s 2883⤵
- Program crash
PID:1712
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5356 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"D:\WoW!Keygen.exe" InjUpdate4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2176
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\Synaptics\Synaptics.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\ProgramData\Synaptics\Synaptics.exeC:\ProgramData\Synaptics\Synaptics.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5816 -
C:\Windows\SysWOW64\._cache_Synaptics.exe"C:\Windows\system32\._cache_Synaptics.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\._cache_Synaptics.exe"D:\WoW!Keygen.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1956
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 232 -ip 2321⤵PID:5716
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:6052
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28.7MB
MD5946803c996f7c32f754b4e864a1e4ac5
SHA1c982b2e7dd6844327f4a77e9a8365067345670ae
SHA256f642d048f822c9b363135f29b649077f9d5371460644add8a38cd1211aa76e4b
SHA512b57e51b90fb25701cdb1bda2717d6a836643bee8d8b1f7729b0c1d8a9b5cbcce1eba35b028f21cfef851de446c6ef4ed23feaf8849820ba8b385572b018fb251
-
C:\Users\Admin\AppData\Local\Temp\._cache_2025-04-10_946803c996f7c32f754b4e864a1e4ac5_amadey_darkgate_elex_magniber_poet-rat_rhadamanthys_smoke-loader.exe
Filesize28.0MB
MD53a94cd236f942e64bafef16d5a7cdd95
SHA192b9cf9c10f9082b21cdb26c3efa588059c2116a
SHA2566c5e292be08b81a735649eb4b0d3a27a7d06fb88dac80281861a6e91dbcd253d
SHA5122951d9893ed701f6525dca0a6aff1dcc12fc9474decf4a8da71a8615c978a09342d11e2603afd1f31dfdac39552278d03f5550df3cef6c18392a0789fb2c4e44
-
Filesize
17KB
MD5af4d37aad8b34471da588360a43e768a
SHA183ed64667d4e68ea531b8bcf58aab3ed4a5ca998
SHA256e7550c3453156531308fda255a198c3710aa4bc7412819c180b103c11e85cef1
SHA51274f5000038c47b7c909c4ee5740e0e87cac12c9c96fff8b1c7ec749541ee3d4b7efd80f9ac02cd39809dca3f2707d0063fa852a3a541342d93a9d03de08823da
-
Filesize
4KB
MD5d5782e913c22abd37d2cfaf8bf303b11
SHA10ecefa6d1aa1a7322a357df6590e8ce87632dce2
SHA2566e54baa8f84076a2be5ff09739ace276ccc4dc4fdd4644faa3586aad7545b420
SHA51232e12566660cb397fefb5ff48b434cf2291c2931eba40611215c9a90b55b142f539b0cce2f66685395caf2d54c2a0d3ed70c573dbb464712b1c0e50f6ac326fd
-
Filesize
60B
MD50edc2c11db7ec414379c432916fc803a
SHA1a64b3fe1069fbfae80c4945eb50d0c3dd10077c8
SHA256ac1b40a3817c9103991559ec6551c36ca64ac74cf2ae4fa418e2ff9ade33fce2
SHA512123a39516f7bb8520af3c74d973244203b7ef97a99ddb6ee7026755b4570c4ff5680ebaf9dbe287738cb96d73c4bc7232fdf0c31139d64c11325a3f8cb339dab
-
Filesize
4KB
MD5589bf368fc9b9218fd4ba747def24713
SHA1f3085c828f8498f6880583efe63e432e3b5cc352
SHA256f777c8bfa0b9fa3d5abbfca82cae8093943332f48d55887c7021dbd6fc4bc956
SHA512526ecec38e87318418f2c4ccd0ccf4790ffccd63bd2060a7c80d2d46cb6c376ee52fad829b28303bfbeedb2f01dd61700529a376c2fd463a3119c689a893009b
-
Filesize
1KB
MD525c689fdb02074ecfa5d2a35897cfa57
SHA1e29805eae83fbf6d279c5de8cad8b388f199cd23
SHA256a718db4d5c37a2d4c752b7ad989484bbc9d9a282db31f30fa39b923b9b65e6da
SHA512b4d13f89330ed6e3bea377c477670df57e62d42996974251f8aa28ddd13d3720f033c0e93d0f909fd225fd85f446bcf2de0bfd52a4e24db911895a3f27911730
-
C:\Users\Admin\AppData\Roaming\Thinstall\WoW!Keygen\SKEL\53e20fd995c151aff7e7fdd8fce6acce1d8ca25d.SharedTA
Filesize5.9MB
MD5308277f44bc23c338fada09d1efcaf1c
SHA153e20fd995c151aff7e7fdd8fce6acce1d8ca25d
SHA25675f863c499b3a1ca16af80705c2a42558082b544ec809a87fd06746f7e0d10e9
SHA5121149ce07864c473cce56981e8ffd77c7bfe6e3a6e005846345b362d6efc6fb6c217b72255938b79d3714c531b9fc9eec0141de75ab3bda750db8b714574db77e