Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2025, 13:38
Behavioral task
behavioral1
Sample
2025-04-10_c3850965bda4543fd24fd72c300ebdc3_black-basta_darkgate_elex_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-10_c3850965bda4543fd24fd72c300ebdc3_black-basta_darkgate_elex_luca-stealer.exe
-
Size
25.0MB
-
MD5
c3850965bda4543fd24fd72c300ebdc3
-
SHA1
bf3a203af246a2c5b57cd8488b50dfa13eeff90f
-
SHA256
cd1a5cea78af180543c1965636ae1d1dd20eeac3d16edcae68dfffd3e786b0fc
-
SHA512
a20c566565ad4a70bdd5254163c9c4ed5926f9ae810e8ea544dab488a3f50e94f5b09c21a324bd4dd627b9254ae3db73174b204feebbc0b575a7893cb1b76d91
-
SSDEEP
786432:Krp+Ty2SfUfnbu+zMFy/7zYgWXRLTArzttOaaFx:+p+Ty2SfWnPzMFO7zYgWBLbFx
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation 2025-04-10_c3850965bda4543fd24fd72c300ebdc3_black-basta_darkgate_elex_luca-stealer.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 8 IoCs
pid Process 4584 ._cache_2025-04-10_c3850965bda4543fd24fd72c300ebdc3_black-basta_darkgate_elex_luca-stealer.exe 4808 ._cache_2025-04-10_c3850965bda4543fd24fd72c300ebdc3_black-basta_darkgate_elex_luca-stealer.exe 2740 Synaptics.exe 2560 Synaptics.exe 5712 ._cache_Synaptics.exe 2224 ._cache_Synaptics.exe 1776 ._cache_Synaptics.exe 1164 ._cache_Synaptics.exe -
Loads dropped DLL 3 IoCs
pid Process 4808 ._cache_2025-04-10_c3850965bda4543fd24fd72c300ebdc3_black-basta_darkgate_elex_luca-stealer.exe 2224 ._cache_Synaptics.exe 1164 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 2025-04-10_c3850965bda4543fd24fd72c300ebdc3_black-basta_darkgate_elex_luca-stealer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\._cache_Synaptics.exe Synaptics.exe File opened for modification C:\Windows\SysWOW64\._cache_Synaptics.exe Synaptics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_2025-04-10_c3850965bda4543fd24fd72c300ebdc3_black-basta_darkgate_elex_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_2025-04-10_c3850965bda4543fd24fd72c300ebdc3_black-basta_darkgate_elex_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-10_c3850965bda4543fd24fd72c300ebdc3_black-basta_darkgate_elex_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2025-04-10_c3850965bda4543fd24fd72c300ebdc3_black-basta_darkgate_elex_luca-stealer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2188 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2188 EXCEL.EXE 2188 EXCEL.EXE 2188 EXCEL.EXE 2188 EXCEL.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2008 wrote to memory of 4584 2008 2025-04-10_c3850965bda4543fd24fd72c300ebdc3_black-basta_darkgate_elex_luca-stealer.exe 89 PID 2008 wrote to memory of 4584 2008 2025-04-10_c3850965bda4543fd24fd72c300ebdc3_black-basta_darkgate_elex_luca-stealer.exe 89 PID 2008 wrote to memory of 4584 2008 2025-04-10_c3850965bda4543fd24fd72c300ebdc3_black-basta_darkgate_elex_luca-stealer.exe 89 PID 4584 wrote to memory of 4808 4584 ._cache_2025-04-10_c3850965bda4543fd24fd72c300ebdc3_black-basta_darkgate_elex_luca-stealer.exe 90 PID 4584 wrote to memory of 4808 4584 ._cache_2025-04-10_c3850965bda4543fd24fd72c300ebdc3_black-basta_darkgate_elex_luca-stealer.exe 90 PID 4584 wrote to memory of 4808 4584 ._cache_2025-04-10_c3850965bda4543fd24fd72c300ebdc3_black-basta_darkgate_elex_luca-stealer.exe 90 PID 2008 wrote to memory of 2740 2008 2025-04-10_c3850965bda4543fd24fd72c300ebdc3_black-basta_darkgate_elex_luca-stealer.exe 93 PID 2008 wrote to memory of 2740 2008 2025-04-10_c3850965bda4543fd24fd72c300ebdc3_black-basta_darkgate_elex_luca-stealer.exe 93 PID 2008 wrote to memory of 2740 2008 2025-04-10_c3850965bda4543fd24fd72c300ebdc3_black-basta_darkgate_elex_luca-stealer.exe 93 PID 4916 wrote to memory of 2560 4916 cmd.exe 94 PID 4916 wrote to memory of 2560 4916 cmd.exe 94 PID 4916 wrote to memory of 2560 4916 cmd.exe 94 PID 2740 wrote to memory of 5712 2740 Synaptics.exe 95 PID 2740 wrote to memory of 5712 2740 Synaptics.exe 95 PID 2740 wrote to memory of 5712 2740 Synaptics.exe 95 PID 5712 wrote to memory of 2224 5712 ._cache_Synaptics.exe 97 PID 5712 wrote to memory of 2224 5712 ._cache_Synaptics.exe 97 PID 5712 wrote to memory of 2224 5712 ._cache_Synaptics.exe 97 PID 2560 wrote to memory of 1776 2560 Synaptics.exe 96 PID 2560 wrote to memory of 1776 2560 Synaptics.exe 96 PID 2560 wrote to memory of 1776 2560 Synaptics.exe 96 PID 1776 wrote to memory of 1164 1776 ._cache_Synaptics.exe 99 PID 1776 wrote to memory of 1164 1776 ._cache_Synaptics.exe 99 PID 1776 wrote to memory of 1164 1776 ._cache_Synaptics.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-10_c3850965bda4543fd24fd72c300ebdc3_black-basta_darkgate_elex_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-10_c3850965bda4543fd24fd72c300ebdc3_black-basta_darkgate_elex_luca-stealer.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\._cache_2025-04-10_c3850965bda4543fd24fd72c300ebdc3_black-basta_darkgate_elex_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\._cache_2025-04-10_c3850965bda4543fd24fd72c300ebdc3_black-basta_darkgate_elex_luca-stealer.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\Temp\{BDC32FE6-A936-41DC-8B57-4E76FDEF9103}\.cr\._cache_2025-04-10_c3850965bda4543fd24fd72c300ebdc3_black-basta_darkgate_elex_luca-stealer.exe"C:\Windows\Temp\{BDC32FE6-A936-41DC-8B57-4E76FDEF9103}\.cr\._cache_2025-04-10_c3850965bda4543fd24fd72c300ebdc3_black-basta_darkgate_elex_luca-stealer.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\._cache_2025-04-10_c3850965bda4543fd24fd72c300ebdc3_black-basta_darkgate_elex_luca-stealer.exe" -burn.filehandle.attached=540 -burn.filehandle.self=5483⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4808
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5712 -
C:\Windows\Temp\{EB574AC2-01A6-4107-8B10-979017CF5603}\.cr\._cache_Synaptics.exe"C:\Windows\Temp\{EB574AC2-01A6-4107-8B10-979017CF5603}\.cr\._cache_Synaptics.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" -burn.filehandle.attached=540 -burn.filehandle.self=548 InjUpdate4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2224
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\Synaptics\Synaptics.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\ProgramData\Synaptics\Synaptics.exeC:\ProgramData\Synaptics\Synaptics.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\._cache_Synaptics.exe"C:\Windows\system32\._cache_Synaptics.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\Temp\{7C1292DE-FB09-4EFE-9F16-6284F155B6CB}\.cr\._cache_Synaptics.exe"C:\Windows\Temp\{7C1292DE-FB09-4EFE-9F16-6284F155B6CB}\.cr\._cache_Synaptics.exe" -burn.clean.room="C:\Windows\SysWOW64\._cache_Synaptics.exe" -burn.filehandle.attached=540 -burn.filehandle.self=5484⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1164
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2188
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25.0MB
MD5c3850965bda4543fd24fd72c300ebdc3
SHA1bf3a203af246a2c5b57cd8488b50dfa13eeff90f
SHA256cd1a5cea78af180543c1965636ae1d1dd20eeac3d16edcae68dfffd3e786b0fc
SHA512a20c566565ad4a70bdd5254163c9c4ed5926f9ae810e8ea544dab488a3f50e94f5b09c21a324bd4dd627b9254ae3db73174b204feebbc0b575a7893cb1b76d91
-
C:\Users\Admin\AppData\Local\Temp\._cache_2025-04-10_c3850965bda4543fd24fd72c300ebdc3_black-basta_darkgate_elex_luca-stealer.exe
Filesize24.2MB
MD5101b0b9f74cdc6cdbd2570bfe92e302c
SHA12e6bae42c2842b4f558bd68099479b929bb7d910
SHA2564dfe83c91124cd542f4222fe2c396cabeac617bb6f59bdcbdf89fd6f0df0a32f
SHA512ccf4fd7da2c3440f1bc7fcac67c8a12599eab8d5c015affdc2e439fa30f5c7868ef5f52ede058361faae37ccc4af2c17c0adf30b8e1f852bb7106d0ec7162506
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
191KB
MD5eab9caf4277829abdf6223ec1efa0edd
SHA174862ecf349a9bedd32699f2a7a4e00b4727543d
SHA256a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041
SHA51245b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2
-
Filesize
14KB
MD53dc35814d02aa3cda14d33741beadfb3
SHA1c9dbe3823d81f40ab59a12f3878b7a22925c0f33
SHA256f7164dea282b868c1eca482034c79c13eb4649f917ca0b4976370b335ee52739
SHA512648da2404d24cdc66315eb2823c09639ad8e40318291d22c6d114a967f1480ee7085173855269d0c342294700745838273d45e78278f8524748a67c92850ad82
-
Filesize
2KB
MD5fbfcbc4dacc566a3c426f43ce10907b6
SHA163c45f9a771161740e100faf710f30eed017d723
SHA25670400f181d00e1769774ff36bcd8b1ab5fbc431418067d31b876d18cc04ef4ce
SHA512063fb6685ee8d2fa57863a74d66a83c819fe848ba3072b6e7d1b4fe397a9b24a1037183bb2fda776033c0936be83888a6456aae947e240521e2ab75d984ee35e
-
Filesize
8KB
MD5f62729c6d2540015e072514226c121c7
SHA1c1e189d693f41ac2eafcc363f7890fc0fea6979c
SHA256f13bae0ec08c91b4a315bb2d86ee48fade597e7a5440dce6f751f98a3a4d6916
SHA512cbbfbfa7e013a2b85b78d71d32fdf65323534816978e7544ca6cea5286a0f6e8e7e5ffc4c538200211f11b94373d5658732d5d8aa1d01f9ccfdbf20f154f1471
-
Filesize
9KB
MD504b33f0a9081c10e85d0e495a1294f83
SHA11efe2fb2d014a731b752672745f9ffecdd716412
SHA2568099dc3cf9502c335da829e5c755948a12e3e6de490eb492a99deb673d883d8b
SHA512d1dbed00df921169dd61501e2a3e95e6d7807348b188be9dd8fc63423501e4d848ece19ac466c3cacfccc6084e0eb2f457dc957990f6f511df10fd426e432685
-
C:\Windows\Temp\{BDC32FE6-A936-41DC-8B57-4E76FDEF9103}\.cr\._cache_2025-04-10_c3850965bda4543fd24fd72c300ebdc3_black-basta_darkgate_elex_luca-stealer.exe
Filesize635KB
MD553e9222bc438cbd8b7320f800bef2e78
SHA1c4f295d8855b4b16c7450a4a9150eb95046f6390
SHA2560e49026767420229afd23b1352cf9f97f24e0768c3d527000d449ffdb4ca6888
SHA5127533f9791e1807072a4dbb6ca03c696b12dfa5337678fab53aceea0e4b7e5ffefb90c9b450ac80878e1e9a4bce549f619da4cd2d06eb2554c9add5b4ec838b4a