Analysis Overview
SHA256
bc4a0d2ef647759adf3bf12fed9b8dd6c02873d631dadbff81b922e8cca9d9b8
Threat Level: Shows suspicious behavior
The file 2025-07-04_e4ccf7bedec6e268bbe6525eea031e1f_amadey_darkgate_elex_smoke-loader_stealc was found to be: Shows suspicious behavior.
Malicious Activity Summary
Reads user/profile data of web browsers
Unsigned PE
System Location Discovery: System Language Discovery
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V16
Analysis: static1
Detonation Overview
Reported
2025-07-04 12:10
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2025-07-04 12:10
Reported
2025-07-04 12:12
Platform
win10v2004-20250610-en
Max time kernel
104s
Max time network
137s
Command Line
Signatures
Reads user/profile data of web browsers
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\2025-07-04_e4ccf7bedec6e268bbe6525eea031e1f_amadey_darkgate_elex_smoke-loader_stealc.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 5512 wrote to memory of 4484 | N/A | C:\Users\Admin\AppData\Local\Temp\2025-07-04_e4ccf7bedec6e268bbe6525eea031e1f_amadey_darkgate_elex_smoke-loader_stealc.exe | C:\Windows\SysWOW64\cmd.exe |
| PID 5512 wrote to memory of 4484 | N/A | C:\Users\Admin\AppData\Local\Temp\2025-07-04_e4ccf7bedec6e268bbe6525eea031e1f_amadey_darkgate_elex_smoke-loader_stealc.exe | C:\Windows\SysWOW64\cmd.exe |
| PID 5512 wrote to memory of 4484 | N/A | C:\Users\Admin\AppData\Local\Temp\2025-07-04_e4ccf7bedec6e268bbe6525eea031e1f_amadey_darkgate_elex_smoke-loader_stealc.exe | C:\Windows\SysWOW64\cmd.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\2025-07-04_e4ccf7bedec6e268bbe6525eea031e1f_amadey_darkgate_elex_smoke-loader_stealc.exe
"C:\Users\Admin\AppData\Local\Temp\2025-07-04_e4ccf7bedec6e268bbe6525eea031e1f_amadey_darkgate_elex_smoke-loader_stealc.exe"
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\234.bat
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | stats-182385724-1591972470.us-east-1.elb.amazonaws.com | udp |
| US | 8.8.8.8:53 | stats-182385724-1591972470.us-east-1.elb.amazonaws.com | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | c.pki.goog | udp |
| GB | 142.250.180.3:80 | c.pki.goog | tcp |
Files
memory/5512-0-0x0000000010000000-0x000000001010F000-memory.dmp
memory/5512-4-0x0000000010000000-0x000000001010F000-memory.dmp
memory/5512-6-0x0000000010000000-0x000000001010F000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\234.bat
| MD5 | f64950de7a4c49b3390edee76afeee70 |
| SHA1 | c61383e7f6df431fccccefde8385cb110a04a5ef |
| SHA256 | b339836fd3d31618ebffc9ebab8948ee8f2dcc67ab5a532893eea073856db166 |
| SHA512 | dc19b8e871966b4e5c1db9de1cbea7104515c57d05bdec46dd36258edca410cc109352ce0beafe2cdded6c5dfe34cae26bef175bb992722d84d97c93c272462f |
C:\Users\Admin\AppData\Local\Temp\83510.exe
| MD5 | e4ccf7bedec6e268bbe6525eea031e1f |
| SHA1 | 452745549fb223792610dfeddeaed374a6e951e5 |
| SHA256 | bc4a0d2ef647759adf3bf12fed9b8dd6c02873d631dadbff81b922e8cca9d9b8 |
| SHA512 | 615a3f469fe86f532886471a5313e0ab7c19e6af68371b9f358f0e6cabaf85988ee7d762cd3fe29eb4c76476f0fd31472875b242918261c18f8e03b03aa7c9f3 |