Analysis

  • max time kernel
    150s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250502-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250502-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/05/2025, 08:26

General

  • Target

    2025-05-20_54cf9ec843c9722df240cb6a72557843_amadey_black-basta_darkgate_elex_luca-stealer.exe

  • Size

    2.8MB

  • MD5

    54cf9ec843c9722df240cb6a72557843

  • SHA1

    93ef940092574d4dbb4bf997a3ba67e875c79a20

  • SHA256

    5594a874d100e3e32d43273973cb09376a09ad4df20e0d74912af9ae8d2da96b

  • SHA512

    a28a001112ffda39d66d9f7f52165de118fa1baf9b8babc5e5ba63f4cdd769057cf8af9698b3259c57346bc6e00d9c4defa7d04e4ee9c5644463951a6fccdd03

  • SSDEEP

    49152:cYpXVmyjkeKRLbRHkqvlStQyfvE0Z3R0nxiIq2dsuH+Dj3IbmMl:ZpXVRjkeKRfrKtQRq2tEMl

Malware Config

Signatures

  • Detects Mofksys worm 5 IoCs
  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Mofksys

    Mofksys is a worm written in VisualBasic.

  • Mofksys family
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Drops file in Drivers directory 2 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-05-20_54cf9ec843c9722df240cb6a72557843_amadey_black-basta_darkgate_elex_luca-stealer.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-05-20_54cf9ec843c9722df240cb6a72557843_amadey_black-basta_darkgate_elex_luca-stealer.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5412
    • \??\c:\users\admin\appdata\local\temp\2025-05-20_54cf9ec843c9722df240cb6a72557843_amadey_black-basta_darkgate_elex_luca-stealer.exe 
      c:\users\admin\appdata\local\temp\2025-05-20_54cf9ec843c9722df240cb6a72557843_amadey_black-basta_darkgate_elex_luca-stealer.exe 
      2⤵
      • Drops file in Drivers directory
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      PID:3080
    • C:\Users\Admin\AppData\Local\icsys.icn.exe
      C:\Users\Admin\AppData\Local\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:264
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visiblity of hidden/system files in Explorer
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:5260
        • \??\c:\windows\system\spoolsv.exe
          c:\windows\system\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:5800
          • \??\c:\windows\system\svchost.exe
            c:\windows\system\svchost.exe
            5⤵
            • Modifies WinLogon for persistence
            • Modifies visiblity of hidden/system files in Explorer
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:5028
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:2276
            • C:\Windows\SysWOW64\at.exe
              at 08:29 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              6⤵
              • System Location Discovery: System Language Discovery
              PID:4836
            • C:\Windows\SysWOW64\at.exe
              at 08:30 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              6⤵
              • System Location Discovery: System Language Discovery
              PID:3176
            • C:\Windows\SysWOW64\at.exe
              at 08:31 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              6⤵
              • System Location Discovery: System Language Discovery
              PID:5128
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c c:\windows\system\explorer.exe RO
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3320
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe RO
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4720
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c c:\windows\system\svchost.exe RO
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3680
    • \??\c:\windows\system\svchost.exe
      c:\windows\system\svchost.exe RO
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4872

Network

        MITRE ATT&CK Enterprise v16

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\2025-05-20_54cf9ec843c9722df240cb6a72557843_amadey_black-basta_darkgate_elex_luca-stealer.exe 

          Filesize

          2.6MB

          MD5

          6b3b44639456a3230e3838d0d2202939

          SHA1

          6aa554f51497c21d684d80fdf363e23b8f1f28f2

          SHA256

          eedb91d5c57418231eaf086f3739353392fa83267075bc50de2cabd11db66c1f

          SHA512

          fab38b9b7d587aed6f2ab267cf9afa878213832b86cc00519e0cf5880072aa95516796131afe87d641fe113f2041eef52988845df15b716330de0080bf5ccfea

        • C:\Users\Admin\AppData\Local\icsys.icn.exe

          Filesize

          206KB

          MD5

          bdc833c683e49c6fa840b3ba6441ce72

          SHA1

          94e0f44c168f422baaef115f34b77e1bb6c85a34

          SHA256

          79a0ecb25f9100cd6486903402c6d23aab951c40272a9a73f718b9b2d1d1ace7

          SHA512

          994ad2f4906cb613c9bc06b60c865d0cddc3b3232b68687d2268fe5fca91d470de081f94bbae3a6684e23947b5e50c26282ab290c7207e899c32b595b4ec941c

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          206KB

          MD5

          c55142ca12bfff5353878e227ddab7d0

          SHA1

          35a00d6322ec17b1797d89bec54301d5403bc4b3

          SHA256

          7d06f51613ca85af339fe6e7b7b60bf151b56714bb26ff34b58a3bacc7bb689d

          SHA512

          2e7de9a6f51c4fe0dfbf440415e8ae04f5409e7054a3ba175fc5df5fbd8621251b109e3119997d907676269c6fa4d38d6597b55a475b8350813e4ca056522834

        • C:\Windows\System\explorer.exe

          Filesize

          206KB

          MD5

          2c90d252da433e45aa8ebf2e7cb2ab9c

          SHA1

          0d5cb04f0de19a307c22c03d59cce17f6809294b

          SHA256

          f651950d521d58d65788b92891fa9859d3807267cb6736046b215bfc4dfd6963

          SHA512

          ca1208ec933b1b7bb976604e7cf74cbffef3661c58c9616d3a553ab8dbf8e7a8c57aeae59abf54d42f6746430c93e78703f7c6fe29ddd280d0f4b1e891f44ba7

        • C:\Windows\System\spoolsv.exe

          Filesize

          206KB

          MD5

          b5db216a87da8960eadd0ea90513aa8e

          SHA1

          13e630ec9d9771683f93a9a92b3c50ef04c7715d

          SHA256

          991522bed9c11c418fbc04558da4a62c9c93902e07b2d06c58207fc1ccd467b2

          SHA512

          a703a0702be6eba476b4eb762739014471c921624d71e7694711a7a960897b39adc5ec31c3fa05078f38bdaa0b8c52c008192ecd8be133210da3b30548c0f3bf

        • C:\Windows\System\svchost.exe

          Filesize

          206KB

          MD5

          9e2f9a5f838c18cc520cfb86ae660048

          SHA1

          c24895dda76eceb87c56151426a3987058482d05

          SHA256

          9461d7fe275eb242bfbcf658148ae7d477af91d25ae8d1c987a116dcf0fd64ef

          SHA512

          334b32bf27a40af0e6839437f01f0344c97f9d685d9dfa4e7e0d587687e59745b961a5d2b9342e71966b3cd0276b2f86bab3e758d549bc50868119e269f7659b