Куда я попал?
SECURITM это SGRC система, ? автоматизирующая процессы в службах информационной безопасности. SECURITM помогает построить и управлять ИСПДн, КИИ, ГИС, СМИБ/СУИБ, банковскими системами защиты.
А еще SECURITM это место для обмена опытом и наработками для служб безопасности.

DarkGate

DarkGate first emerged in 2018 and has evolved into an initial access and data gathering tool associated with various criminal cyber operations. Written in Delphi and named "DarkGate" by its author, DarkGate is associated with credential theft, cryptomining, cryptotheft, and pre-ransomware actions.(Citation: Ensilo Darkgate 2018) DarkGate use increased significantly starting in 2022 and is under active development by its author, who provides it as a Malware-as-a-Service offering.(Citation: Trellix Darkgate 2023)
ID: S1111
Type: MALWARE
Platforms: Windows
Created: 09 Feb 2024
Last Modified: 29 Sep 2024

Techniques Used

Domain ID Name Use
Enterprise T1548 .002 Abuse Elevation Control Mechanism: Bypass User Account Control

DarkGate uses two distinct User Account Control (UAC) bypass techniques to escalate privileges.(Citation: Ensilo Darkgate 2018)

Enterprise T1134 .004 Access Token Manipulation: Parent PID Spoofing

DarkGate relies on parent PID spoofing as part of its "rootkit-like" functionality to evade detection via Task Manager or Process Explorer.(Citation: Trellix Darkgate 2023)

Enterprise T1098 .007 Account Manipulation: Additional Local or Domain Groups

DarkGate elevates accounts created through the malware to the local administration group during execution.(Citation: Ensilo Darkgate 2018)

Enterprise T1583 .001 Acquire Infrastructure: Domains

DarkGate command and control includes hard-coded domains in the malware chosen to masquerade as legitimate services such as Akamai CDN or Amazon Web Services.(Citation: Trellix Darkgate 2023)

Enterprise T1071 .004 Application Layer Protocol: DNS

DarkGate can cloak command and control traffic in DNS records from legitimate services to avoid reputation-based detection techniques. (Citation: Ensilo Darkgate 2018)

Enterprise T1547 .001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder

DarkGate installation includes AutoIt script execution creating a shortcut to itself as an LNK object, such as bill.lnk, in the victim startup folder.(Citation: Ensilo Darkgate 2018) DarkGate installation finishes with the creation of a registry Run key.(Citation: Ensilo Darkgate 2018)

Enterprise T1059 .003 Command and Scripting Interpreter: Windows Command Shell

DarkGate uses a malicious Windows Batch script to run the Windows code utility to retrieve follow-on script payloads.(Citation: Trellix Darkgate 2023)

.005 Command and Scripting Interpreter: Visual Basic

DarkGate initial infection mechanisms include masquerading as pirated media that launches malicious VBScript on the victim.(Citation: Ensilo Darkgate 2018)

.010 Command and Scripting Interpreter: AutoHotKey & AutoIT

DarkGate uses AutoIt scripts dropped to a hidden directory during initial installation phases, such as `test.au3`.(Citation: Ensilo Darkgate 2018)

Enterprise T1136 .001 Create Account: Local Account

DarkGate creates a local user account, SafeMode, via net user commands.(Citation: Ensilo Darkgate 2018)

Enterprise T1564 .001 Hide Artifacts: Hidden Files and Directories

DarkGate initial installation involves dropping several files to a hidden directory named after the victim machine name.(Citation: Ensilo Darkgate 2018)

Enterprise T1574 .002 Hijack Execution Flow: DLL Side-Loading

DarkGate includes one infection vector that leverages a malicious "KeyScramblerE.DLL" library that will load during the execution of the legitimate KeyScrambler application.(Citation: Trellix Darkgate 2023)

.007 Hijack Execution Flow: Path Interception by PATH Environment Variable

DarkGate overrides the %windir% environment variable by setting a Registry key, HKEY_CURRENT_User\Environment\windir, to an alternate command to execute a malicious AutoIt script. This allows DarkGate to run every time the scheduled task DiskCleanup is executed as this uses the path value %windir%\system32\cleanmgr.exe for execution.(Citation: Ensilo Darkgate 2018)

Enterprise T1562 .001 Impair Defenses: Disable or Modify Tools

DarkGate will terminate processes associated with several security software products if identified during execution.(Citation: Ensilo Darkgate 2018)

Enterprise T1056 .001 Input Capture: Keylogging

DarkGate will spawn a thread on execution to capture all keyboard events and write them to a predefined log file.(Citation: Ensilo Darkgate 2018)

Enterprise T1036 .003 Masquerading: Rename System Utilities

DarkGate executes a Windows Batch script during installation that creases a randomly-named directory in the C:\\ root directory that copies and renames the legitimate Windows curl command to this new location.(Citation: Trellix Darkgate 2023)

.007 Masquerading: Double File Extension

DarkGate masquerades malicious LNK files as PDF objects using the double extension .pdf.lnk.(Citation: Trellix Darkgate 2023)

Enterprise T1027 .013 Obfuscated Files or Information: Encrypted/Encoded File

DarkGate drops an encrypted PE file, pe.bin, and decrypts it during installation.(Citation: Ensilo Darkgate 2018) DarkGate also uses custom base64 encoding schemas in later variations to obfuscate payloads.(Citation: Trellix Darkgate 2023)

Enterprise T1566 .001 Phishing: Spearphishing Attachment

DarkGate can be distributed through emails with malicious attachments from a spoofed email address.(Citation: Ensilo Darkgate 2018)

.002 Phishing: Spearphishing Link

DarkGate is distributed in phishing emails containing links to distribute malicious VBS or MSI files.(Citation: Trellix Darkgate 2023) DarkGate uses applications such as Microsoft Teams for distributing links to payloads.(Citation: Trellix Darkgate 2023)

Enterprise T1055 .012 Process Injection: Process Hollowing

DarkGate leverages process hollowing techniques to evade detection, such as decrypting the content of an encrypted PE file and injecting it into the process vbc.exe.(Citation: Ensilo Darkgate 2018)

Enterprise T1496 .001 Resource Hijacking: Compute Hijacking

DarkGate can deploy follow-on cryptocurrency mining payloads.(Citation: Ensilo Darkgate 2018)

Enterprise T1518 .001 Software Discovery: Security Software Discovery

DarkGate looks for various security products by process name using hard-coded values in the malware. DarkGate will not execute its keylogging thread if a process name associated with Trend Micro anti-virus is identified, or if runtime checks identify the presence of Kaspersky anti-virus. DarkGate will initiate a new thread if certain security products are identified on the victim, and recreate any malicious files associated with it if it determines they were removed by security software in a new system location.(Citation: Ensilo Darkgate 2018)

Enterprise T1569 .002 System Services: Service Execution

DarkGate tries to elevate privileges to SYSTEM using PsExec to locally execute as a service, such as cmd /c c:\temp\PsExec.exe -accepteula -j -d -s [Target Binary].(Citation: Trellix Darkgate 2023)

Enterprise T1204 .002 User Execution: Malicious File

DarkGate initial infection payloads can masquerade as pirated media content requiring user interaction for code execution.(Citation: Ensilo Darkgate 2018) DarkGate is distributed through phishing links to VBS or MSI objects requiring user interaction for execution.(Citation: Trellix Darkgate 2023)

Enterprise T1497 .001 Virtualization/Sandbox Evasion: System Checks

DarkGate queries system resources on an infected machine to identify if it is executing in a sandbox or virtualized environment.(Citation: Ensilo Darkgate 2018)

Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.