Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2025, 13:39
Behavioral task
behavioral1
Sample
2025-04-10_8a9021f1bd1200640095efa630e09461_black-basta_darkgate_elex_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-10_8a9021f1bd1200640095efa630e09461_black-basta_darkgate_elex_luca-stealer.exe
-
Size
13.9MB
-
MD5
8a9021f1bd1200640095efa630e09461
-
SHA1
f6516a39d14fe5100b031a1c2a5a56106ab46a5e
-
SHA256
dd7b904ba6b48edb78f664be1ff660faf373ecbc6e00bedae0c707ba12b399d5
-
SHA512
01fb9af6a96ba486344b9b3d990f70f63011ac1a710e9771f7aead5a5cf12b6b796c28e575b7b7ce79e8d47b133b010703f49e37d4e2e2d713a3578f1a423dc5
-
SSDEEP
393216:v9DRSlptVYmfr7yBG/4bEXtOiHCFQbPlU:lEpttD7yBG/USt/So+
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation 2025-04-10_8a9021f1bd1200640095efa630e09461_black-basta_darkgate_elex_luca-stealer.exe Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 8 IoCs
pid Process 5012 ._cache_2025-04-10_8a9021f1bd1200640095efa630e09461_black-basta_darkgate_elex_luca-stealer.exe 3600 ._cache_2025-04-10_8a9021f1bd1200640095efa630e09461_black-basta_darkgate_elex_luca-stealer.exe 5996 Synaptics.exe 2308 Synaptics.exe 1204 ._cache_Synaptics.exe 3076 ._cache_Synaptics.exe 4880 ._cache_Synaptics.exe 652 ._cache_Synaptics.exe -
Loads dropped DLL 3 IoCs
pid Process 3600 ._cache_2025-04-10_8a9021f1bd1200640095efa630e09461_black-basta_darkgate_elex_luca-stealer.exe 4880 ._cache_Synaptics.exe 652 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 2025-04-10_8a9021f1bd1200640095efa630e09461_black-basta_darkgate_elex_luca-stealer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\._cache_Synaptics.exe Synaptics.exe File opened for modification C:\Windows\SysWOW64\._cache_Synaptics.exe Synaptics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_8a9021f1bd1200640095efa630e09461_black-basta_darkgate_elex_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_2025-04-10_8a9021f1bd1200640095efa630e09461_black-basta_darkgate_elex_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_2025-04-10_8a9021f1bd1200640095efa630e09461_black-basta_darkgate_elex_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2025-04-10_8a9021f1bd1200640095efa630e09461_black-basta_darkgate_elex_luca-stealer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 6104 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 6104 EXCEL.EXE 6104 EXCEL.EXE 6104 EXCEL.EXE 6104 EXCEL.EXE 6104 EXCEL.EXE 6104 EXCEL.EXE 6104 EXCEL.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2212 wrote to memory of 5012 2212 2025-04-10_8a9021f1bd1200640095efa630e09461_black-basta_darkgate_elex_luca-stealer.exe 89 PID 2212 wrote to memory of 5012 2212 2025-04-10_8a9021f1bd1200640095efa630e09461_black-basta_darkgate_elex_luca-stealer.exe 89 PID 2212 wrote to memory of 5012 2212 2025-04-10_8a9021f1bd1200640095efa630e09461_black-basta_darkgate_elex_luca-stealer.exe 89 PID 5012 wrote to memory of 3600 5012 ._cache_2025-04-10_8a9021f1bd1200640095efa630e09461_black-basta_darkgate_elex_luca-stealer.exe 90 PID 5012 wrote to memory of 3600 5012 ._cache_2025-04-10_8a9021f1bd1200640095efa630e09461_black-basta_darkgate_elex_luca-stealer.exe 90 PID 5012 wrote to memory of 3600 5012 ._cache_2025-04-10_8a9021f1bd1200640095efa630e09461_black-basta_darkgate_elex_luca-stealer.exe 90 PID 2212 wrote to memory of 5996 2212 2025-04-10_8a9021f1bd1200640095efa630e09461_black-basta_darkgate_elex_luca-stealer.exe 93 PID 2212 wrote to memory of 5996 2212 2025-04-10_8a9021f1bd1200640095efa630e09461_black-basta_darkgate_elex_luca-stealer.exe 93 PID 2212 wrote to memory of 5996 2212 2025-04-10_8a9021f1bd1200640095efa630e09461_black-basta_darkgate_elex_luca-stealer.exe 93 PID 1540 wrote to memory of 2308 1540 cmd.exe 94 PID 1540 wrote to memory of 2308 1540 cmd.exe 94 PID 1540 wrote to memory of 2308 1540 cmd.exe 94 PID 5996 wrote to memory of 1204 5996 Synaptics.exe 95 PID 5996 wrote to memory of 1204 5996 Synaptics.exe 95 PID 5996 wrote to memory of 1204 5996 Synaptics.exe 95 PID 2308 wrote to memory of 3076 2308 Synaptics.exe 96 PID 2308 wrote to memory of 3076 2308 Synaptics.exe 96 PID 2308 wrote to memory of 3076 2308 Synaptics.exe 96 PID 3076 wrote to memory of 4880 3076 ._cache_Synaptics.exe 98 PID 3076 wrote to memory of 4880 3076 ._cache_Synaptics.exe 98 PID 3076 wrote to memory of 4880 3076 ._cache_Synaptics.exe 98 PID 1204 wrote to memory of 652 1204 ._cache_Synaptics.exe 99 PID 1204 wrote to memory of 652 1204 ._cache_Synaptics.exe 99 PID 1204 wrote to memory of 652 1204 ._cache_Synaptics.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_8a9021f1bd1200640095efa630e09461_black-basta_darkgate_elex_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-10_8a9021f1bd1200640095efa630e09461_black-basta_darkgate_elex_luca-stealer.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\._cache_2025-04-10_8a9021f1bd1200640095efa630e09461_black-basta_darkgate_elex_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\._cache_2025-04-10_8a9021f1bd1200640095efa630e09461_black-basta_darkgate_elex_luca-stealer.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\Temp\{FBDFA030-ACCB-40E9-95CC-F585E6A09F05}\.cr\._cache_2025-04-10_8a9021f1bd1200640095efa630e09461_black-basta_darkgate_elex_luca-stealer.exe"C:\Windows\Temp\{FBDFA030-ACCB-40E9-95CC-F585E6A09F05}\.cr\._cache_2025-04-10_8a9021f1bd1200640095efa630e09461_black-basta_darkgate_elex_luca-stealer.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\._cache_2025-04-10_8a9021f1bd1200640095efa630e09461_black-basta_darkgate_elex_luca-stealer.exe" -burn.filehandle.attached=540 -burn.filehandle.self=6523⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3600
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5996 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\Temp\{70F330DC-DE30-466F-858C-A8E275602E1A}\.cr\._cache_Synaptics.exe"C:\Windows\Temp\{70F330DC-DE30-466F-858C-A8E275602E1A}\.cr\._cache_Synaptics.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" -burn.filehandle.attached=540 -burn.filehandle.self=548 InjUpdate4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:652
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\Synaptics\Synaptics.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\ProgramData\Synaptics\Synaptics.exeC:\ProgramData\Synaptics\Synaptics.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\._cache_Synaptics.exe"C:\Windows\system32\._cache_Synaptics.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\Temp\{9FD0F688-E0E9-470F-BB48-4316CC2D877F}\.cr\._cache_Synaptics.exe"C:\Windows\Temp\{9FD0F688-E0E9-470F-BB48-4316CC2D877F}\.cr\._cache_Synaptics.exe" -burn.clean.room="C:\Windows\SysWOW64\._cache_Synaptics.exe" -burn.filehandle.attached=540 -burn.filehandle.self=5484⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4880
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:6104
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.9MB
MD58a9021f1bd1200640095efa630e09461
SHA1f6516a39d14fe5100b031a1c2a5a56106ab46a5e
SHA256dd7b904ba6b48edb78f664be1ff660faf373ecbc6e00bedae0c707ba12b399d5
SHA51201fb9af6a96ba486344b9b3d990f70f63011ac1a710e9771f7aead5a5cf12b6b796c28e575b7b7ce79e8d47b133b010703f49e37d4e2e2d713a3578f1a423dc5
-
C:\Users\Admin\AppData\Local\Temp\._cache_2025-04-10_8a9021f1bd1200640095efa630e09461_black-basta_darkgate_elex_luca-stealer.exe
Filesize13.2MB
MD50d762264d9765e21c15a58edc43f4706
SHA164ce52d26d6930f5a110112487239e491ab1b1ee
SHA256c61cef97487536e766130fa8714dd1b4143f6738bfb71806018eee1b5fe6f057
SHA512a07dcabb588886c73865c8bde027d16ce9c8c14c480286f5697620c6d47f20727c208704047512e4ba55e9dc64ac7940b31910a7df0d1b7dc5569f37270f0441
-
Filesize
23KB
MD53816cd1b86c4db90fc1f87c43df2cc44
SHA194a355ac80756792760d7ba7a570a10f3bac4e00
SHA2569862cb9966197785e87067f0134f696e561875a731c801aaa7f486d2dbd19ecc
SHA51218206f44ac3e57fb90589fc85fef9c0689e04755cde14bd62e181e3960e35e0adbf9a3d13e26a5b20fb78a03ae6d2497acbdc1e87148ac88c0da29e4fa427c68
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
191KB
MD5eab9caf4277829abdf6223ec1efa0edd
SHA174862ecf349a9bedd32699f2a7a4e00b4727543d
SHA256a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041
SHA51245b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2
-
Filesize
12KB
MD5a8fe0b5c48b92ed6be2313c170a53251
SHA1ec6a3a9584a2765431f0f7cfe106028e00de6f0d
SHA256648a91521f20660a182590e218c212d7a618e96bb7fcac30e22ba77b5ffb829e
SHA512f0854f08c97eb95474b51b7b6be56a4396a8067c4d82260083440be91d202cf296a38764e7460d547cdabc688c0d923d1430568b81ee3faa823f8457d06db535
-
Filesize
9KB
MD504b33f0a9081c10e85d0e495a1294f83
SHA11efe2fb2d014a731b752672745f9ffecdd716412
SHA2568099dc3cf9502c335da829e5c755948a12e3e6de490eb492a99deb673d883d8b
SHA512d1dbed00df921169dd61501e2a3e95e6d7807348b188be9dd8fc63423501e4d848ece19ac466c3cacfccc6084e0eb2f457dc957990f6f511df10fd426e432685
-
Filesize
2KB
MD5fbfcbc4dacc566a3c426f43ce10907b6
SHA163c45f9a771161740e100faf710f30eed017d723
SHA25670400f181d00e1769774ff36bcd8b1ab5fbc431418067d31b876d18cc04ef4ce
SHA512063fb6685ee8d2fa57863a74d66a83c819fe848ba3072b6e7d1b4fe397a9b24a1037183bb2fda776033c0936be83888a6456aae947e240521e2ab75d984ee35e
-
Filesize
8KB
MD5f62729c6d2540015e072514226c121c7
SHA1c1e189d693f41ac2eafcc363f7890fc0fea6979c
SHA256f13bae0ec08c91b4a315bb2d86ee48fade597e7a5440dce6f751f98a3a4d6916
SHA512cbbfbfa7e013a2b85b78d71d32fdf65323534816978e7544ca6cea5286a0f6e8e7e5ffc4c538200211f11b94373d5658732d5d8aa1d01f9ccfdbf20f154f1471
-
C:\Windows\Temp\{FBDFA030-ACCB-40E9-95CC-F585E6A09F05}\.cr\._cache_2025-04-10_8a9021f1bd1200640095efa630e09461_black-basta_darkgate_elex_luca-stealer.exe
Filesize634KB
MD5f4a0575355c8110fecdf2acbe161c964
SHA1b9482cd6ec6dc673a0163a8d3e833bab24efdcd8
SHA2563ee99421e4582ebc46a23a947fc76149bee1b21538f3fd74d29967a6f517e7f6
SHA51272c1d740736b60a07027384c0aca8fe74c1aea85ffa4bd0cefe0e048f21ad9744b5e75a2f68c44f38517cfbd0e6f87a508722ad113626e74aedc046c81c163c6