Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240708-en -
submitted
18-08-2024 19:05
Behavioral task
behavioral1
Sample
e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe
Resource
win7-20240708-en
General
-
Target
e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe
-
Size
821KB
-
MD5
0b69301f9ab8060c4608e75f33ba34fc
-
SHA1
9f4ca0e8025025c21fe8b0cf438c00b1981f11b3
-
SHA256
e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9
-
SHA512
8bfdada6e8b82f6566ac5776520fc10b006c02a24ae59d9550b360db8744495f8ff1f96c94395ccdeb95a1734b52c9d9ce616b45148d9f3cf0196c12de598a99
-
SSDEEP
12288:dMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9JhBBxdsP2g:dnsJ39LyjbJkQFMhmC+6GD9X5dsu
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:4449
lol.exe
-
delay
1
-
install
true
-
install_file
lol.exe
-
install_folder
%AppData%
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Asyncrat family
-
resource yara_rule behavioral1/files/0x000a00000001202b-4.dat VenomRAT behavioral1/files/0x0008000000015690-13.dat VenomRAT behavioral1/memory/2852-25-0x0000000000400000-0x00000000004D3000-memory.dmp VenomRAT behavioral1/memory/2844-26-0x0000000000E40000-0x0000000000E58000-memory.dmp VenomRAT behavioral1/memory/380-37-0x0000000001170000-0x0000000001188000-memory.dmp VenomRAT behavioral1/memory/2040-59-0x0000000000400000-0x00000000004D3000-memory.dmp VenomRAT behavioral1/memory/2040-60-0x0000000000400000-0x00000000004D3000-memory.dmp VenomRAT behavioral1/memory/2040-66-0x0000000000400000-0x00000000004D3000-memory.dmp VenomRAT behavioral1/memory/2040-95-0x0000000000400000-0x00000000004D3000-memory.dmp VenomRAT -
Venomrat family
-
Xred family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000a00000001202b-4.dat family_asyncrat -
Executes dropped EXE 3 IoCs
pid Process 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe 2040 Synaptics.exe 380 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 2852 e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe 2852 e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe 2852 e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe 2040 Synaptics.exe 2040 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\????? = "C:\\ProgramData\\Synaptics\\Synaptics.exe" e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1032 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeDebugPrivilege 380 ._cache_Synaptics.exe Token: SeIncreaseQuotaPrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeSecurityPrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeTakeOwnershipPrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeLoadDriverPrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeSystemProfilePrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeSystemtimePrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeProfSingleProcessPrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeIncBasePriorityPrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeCreatePagefilePrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeBackupPrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeRestorePrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeShutdownPrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeDebugPrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeSystemEnvironmentPrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeRemoteShutdownPrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeUndockPrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeManageVolumePrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: 33 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: 34 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: 35 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeIncreaseQuotaPrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeSecurityPrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeTakeOwnershipPrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeLoadDriverPrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeSystemProfilePrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeSystemtimePrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeProfSingleProcessPrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeIncBasePriorityPrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeCreatePagefilePrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeBackupPrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeRestorePrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeShutdownPrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeDebugPrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeSystemEnvironmentPrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeRemoteShutdownPrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeUndockPrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeManageVolumePrivilege 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: 33 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: 34 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: 35 2844 ._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe Token: SeIncreaseQuotaPrivilege 380 ._cache_Synaptics.exe Token: SeSecurityPrivilege 380 ._cache_Synaptics.exe Token: SeTakeOwnershipPrivilege 380 ._cache_Synaptics.exe Token: SeLoadDriverPrivilege 380 ._cache_Synaptics.exe Token: SeSystemProfilePrivilege 380 ._cache_Synaptics.exe Token: SeSystemtimePrivilege 380 ._cache_Synaptics.exe Token: SeProfSingleProcessPrivilege 380 ._cache_Synaptics.exe Token: SeIncBasePriorityPrivilege 380 ._cache_Synaptics.exe Token: SeCreatePagefilePrivilege 380 ._cache_Synaptics.exe Token: SeBackupPrivilege 380 ._cache_Synaptics.exe Token: SeRestorePrivilege 380 ._cache_Synaptics.exe Token: SeShutdownPrivilege 380 ._cache_Synaptics.exe Token: SeDebugPrivilege 380 ._cache_Synaptics.exe Token: SeSystemEnvironmentPrivilege 380 ._cache_Synaptics.exe Token: SeRemoteShutdownPrivilege 380 ._cache_Synaptics.exe Token: SeUndockPrivilege 380 ._cache_Synaptics.exe Token: SeManageVolumePrivilege 380 ._cache_Synaptics.exe Token: 33 380 ._cache_Synaptics.exe Token: 34 380 ._cache_Synaptics.exe Token: 35 380 ._cache_Synaptics.exe Token: SeIncreaseQuotaPrivilege 380 ._cache_Synaptics.exe Token: SeSecurityPrivilege 380 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1032 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2844 2852 e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe 30 PID 2852 wrote to memory of 2844 2852 e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe 30 PID 2852 wrote to memory of 2844 2852 e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe 30 PID 2852 wrote to memory of 2844 2852 e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe 30 PID 2852 wrote to memory of 2040 2852 e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe 31 PID 2852 wrote to memory of 2040 2852 e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe 31 PID 2852 wrote to memory of 2040 2852 e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe 31 PID 2852 wrote to memory of 2040 2852 e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe 31 PID 2040 wrote to memory of 380 2040 Synaptics.exe 32 PID 2040 wrote to memory of 380 2040 Synaptics.exe 32 PID 2040 wrote to memory of 380 2040 Synaptics.exe 32 PID 2040 wrote to memory of 380 2040 Synaptics.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe"C:\Users\Admin\AppData\Local\Temp\e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe"C:\Users\Admin\AppData\Local\Temp\._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:380
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
821KB
MD50b69301f9ab8060c4608e75f33ba34fc
SHA19f4ca0e8025025c21fe8b0cf438c00b1981f11b3
SHA256e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9
SHA5128bfdada6e8b82f6566ac5776520fc10b006c02a24ae59d9550b360db8744495f8ff1f96c94395ccdeb95a1734b52c9d9ce616b45148d9f3cf0196c12de598a99
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b
-
\Users\Admin\AppData\Local\Temp\._cache_e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe
Filesize74KB
MD532b65e6e0e6112b5dae6b43f214c28f6
SHA18c268ab559f6cce631c9da6949cc7c2d4abced08
SHA256296674e268379a496e66b4e571881c32e75e46e661aa7247405201a126a782c6
SHA512c670f08f60bf3934817f842539a2dc3534c2503234892f4ec3d4809e4ab88624810dbca7c31002d5c2c900145d7fe5db7727746268bdcefd36a893cf11606a07