DarkGate
Techniques Used |
||||
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1548 | .002 | Abuse Elevation Control Mechanism: Bypass User Account Control |
DarkGate uses two distinct User Account Control (UAC) bypass techniques to escalate privileges.(Citation: Ensilo Darkgate 2018) |
Enterprise | T1134 | .004 | Access Token Manipulation: Parent PID Spoofing |
DarkGate relies on parent PID spoofing as part of its "rootkit-like" functionality to evade detection via Task Manager or Process Explorer.(Citation: Trellix Darkgate 2023) |
Enterprise | T1098 | .007 | Account Manipulation: Additional Local or Domain Groups |
DarkGate elevates accounts created through the malware to the local administration group during execution.(Citation: Ensilo Darkgate 2018) |
Enterprise | T1583 | .001 | Acquire Infrastructure: Domains |
DarkGate command and control includes hard-coded domains in the malware chosen to masquerade as legitimate services such as Akamai CDN or Amazon Web Services.(Citation: Trellix Darkgate 2023) |
Enterprise | T1071 | .004 | Application Layer Protocol: DNS |
DarkGate can cloak command and control traffic in DNS records from legitimate services to avoid reputation-based detection techniques. (Citation: Ensilo Darkgate 2018) |
Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
DarkGate installation includes AutoIt script execution creating a shortcut to itself as an LNK object, such as bill.lnk, in the victim startup folder.(Citation: Ensilo Darkgate 2018) DarkGate installation finishes with the creation of a registry Run key.(Citation: Ensilo Darkgate 2018) |
Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell |
DarkGate uses a malicious Windows Batch script to run the Windows |
.005 | Command and Scripting Interpreter: Visual Basic |
DarkGate initial infection mechanisms include masquerading as pirated media that launches malicious VBScript on the victim.(Citation: Ensilo Darkgate 2018) |
||
.010 | Command and Scripting Interpreter: AutoHotKey & AutoIT |
DarkGate uses AutoIt scripts dropped to a hidden directory during initial installation phases, such as `test.au3`.(Citation: Ensilo Darkgate 2018) |
||
Enterprise | T1136 | .001 | Create Account: Local Account |
DarkGate creates a local user account, |
Enterprise | T1564 | .001 | Hide Artifacts: Hidden Files and Directories |
DarkGate initial installation involves dropping several files to a hidden directory named after the victim machine name.(Citation: Ensilo Darkgate 2018) |
Enterprise | T1574 | .002 | Hijack Execution Flow: DLL Side-Loading |
DarkGate includes one infection vector that leverages a malicious "KeyScramblerE.DLL" library that will load during the execution of the legitimate KeyScrambler application.(Citation: Trellix Darkgate 2023) |
.007 | Hijack Execution Flow: Path Interception by PATH Environment Variable |
DarkGate overrides the |
||
Enterprise | T1562 | .001 | Impair Defenses: Disable or Modify Tools |
DarkGate will terminate processes associated with several security software products if identified during execution.(Citation: Ensilo Darkgate 2018) |
Enterprise | T1056 | .001 | Input Capture: Keylogging |
DarkGate will spawn a thread on execution to capture all keyboard events and write them to a predefined log file.(Citation: Ensilo Darkgate 2018) |
Enterprise | T1036 | .003 | Masquerading: Rename System Utilities |
DarkGate executes a Windows Batch script during installation that creases a randomly-named directory in the |
.007 | Masquerading: Double File Extension |
DarkGate masquerades malicious LNK files as PDF objects using the double extension |
||
Enterprise | T1027 | .013 | Obfuscated Files or Information: Encrypted/Encoded File |
DarkGate drops an encrypted PE file, pe.bin, and decrypts it during installation.(Citation: Ensilo Darkgate 2018) DarkGate also uses custom base64 encoding schemas in later variations to obfuscate payloads.(Citation: Trellix Darkgate 2023) |
Enterprise | T1566 | .001 | Phishing: Spearphishing Attachment |
DarkGate can be distributed through emails with malicious attachments from a spoofed email address.(Citation: Ensilo Darkgate 2018) |
.002 | Phishing: Spearphishing Link |
DarkGate is distributed in phishing emails containing links to distribute malicious VBS or MSI files.(Citation: Trellix Darkgate 2023) DarkGate uses applications such as Microsoft Teams for distributing links to payloads.(Citation: Trellix Darkgate 2023) |
||
Enterprise | T1055 | .012 | Process Injection: Process Hollowing |
DarkGate leverages process hollowing techniques to evade detection, such as decrypting the content of an encrypted PE file and injecting it into the process vbc.exe.(Citation: Ensilo Darkgate 2018) |
Enterprise | T1496 | .001 | Resource Hijacking: Compute Hijacking |
DarkGate can deploy follow-on cryptocurrency mining payloads.(Citation: Ensilo Darkgate 2018) |
Enterprise | T1518 | .001 | Software Discovery: Security Software Discovery |
DarkGate looks for various security products by process name using hard-coded values in the malware. DarkGate will not execute its keylogging thread if a process name associated with Trend Micro anti-virus is identified, or if runtime checks identify the presence of Kaspersky anti-virus. DarkGate will initiate a new thread if certain security products are identified on the victim, and recreate any malicious files associated with it if it determines they were removed by security software in a new system location.(Citation: Ensilo Darkgate 2018) |
Enterprise | T1569 | .002 | System Services: Service Execution |
DarkGate tries to elevate privileges to |
Enterprise | T1204 | .002 | User Execution: Malicious File |
DarkGate initial infection payloads can masquerade as pirated media content requiring user interaction for code execution.(Citation: Ensilo Darkgate 2018) DarkGate is distributed through phishing links to VBS or MSI objects requiring user interaction for execution.(Citation: Trellix Darkgate 2023) |
Enterprise | T1497 | .001 | Virtualization/Sandbox Evasion: System Checks |
DarkGate queries system resources on an infected machine to identify if it is executing in a sandbox or virtualized environment.(Citation: Ensilo Darkgate 2018) |
References
- Adi Zeligson & Rotem Kerner. (2018, November 13). Enter The DarkGate - New Cryptocurrency Mining and Ransomware Campaign. Retrieved February 9, 2024.
- Ernesto Fernández Provecho, Pham Duy Phuc, Ciana Driscoll & Vinoo Thomas. (2023, November 21). The Continued Evolution of the DarkGate Malware-as-a-Service. Retrieved February 9, 2024.
- Shinji Robert Arasawa, Joshua Aquino, Charles Steven Derion, Juhn Emmanuel Atanque, Francisrey Joshua Castillo, John Carlo Marquez, Henry Salcedo, John Rainier Navato, Arianne Dela Cruz, Raymart Yambot & Ian Kenefick. (2024, January 9). Black Basta-Affiliated Water Curupira’s Pikabot Spam Campaign. Retrieved July 17, 2024.
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.