Analysis
-
max time kernel
51s -
max time network
44s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
submitted
05/09/2024, 00:55
Static task
static1
Behavioral task
behavioral1
Sample
KoalageddonInstaller.exe
Resource
win11-20240802-en
General
-
Target
KoalageddonInstaller.exe
-
Size
3.6MB
-
MD5
8409990c16c5003e804b40bb4f8d8fa7
-
SHA1
2d6d5458bc2caade8019a09f9cdc8cb9bbc59620
-
SHA256
e820e5072dddccf820e043634f226ee0223fb5d0473c575f39eb88fce647d477
-
SHA512
b5da43ad3d24d8c23603af8ef7c78b108f2cdd253464347c844a552a4f213895cf0955a67147c384538ac1b069254e2af535064130b44219962fa12debfcd8f9
-
SSDEEP
98304:cnsmtk2aLSilkJ/FKZvpG+H++f+DidXvh6d204OOR5q2S:yLtuZvvH+XgJ6M8YYV
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 5 IoCs
pid Process 2016 ._cache_KoalageddonInstaller.exe 1844 Synaptics.exe 3684 ._cache_KoalageddonInstaller.tmp 1824 ._cache_Synaptics.exe 1196 ._cache_Synaptics.tmp -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" KoalageddonInstaller.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KoalageddonInstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_KoalageddonInstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_KoalageddonInstaller.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.tmp -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ KoalageddonInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2224 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1196 ._cache_Synaptics.tmp 1196 ._cache_Synaptics.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1196 ._cache_Synaptics.tmp -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2224 EXCEL.EXE 2224 EXCEL.EXE 2224 EXCEL.EXE 2224 EXCEL.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4760 wrote to memory of 2016 4760 KoalageddonInstaller.exe 78 PID 4760 wrote to memory of 2016 4760 KoalageddonInstaller.exe 78 PID 4760 wrote to memory of 2016 4760 KoalageddonInstaller.exe 78 PID 4760 wrote to memory of 1844 4760 KoalageddonInstaller.exe 79 PID 4760 wrote to memory of 1844 4760 KoalageddonInstaller.exe 79 PID 4760 wrote to memory of 1844 4760 KoalageddonInstaller.exe 79 PID 2016 wrote to memory of 3684 2016 ._cache_KoalageddonInstaller.exe 80 PID 2016 wrote to memory of 3684 2016 ._cache_KoalageddonInstaller.exe 80 PID 2016 wrote to memory of 3684 2016 ._cache_KoalageddonInstaller.exe 80 PID 1844 wrote to memory of 1824 1844 Synaptics.exe 81 PID 1844 wrote to memory of 1824 1844 Synaptics.exe 81 PID 1844 wrote to memory of 1824 1844 Synaptics.exe 81 PID 1824 wrote to memory of 1196 1824 ._cache_Synaptics.exe 83 PID 1824 wrote to memory of 1196 1824 ._cache_Synaptics.exe 83 PID 1824 wrote to memory of 1196 1824 ._cache_Synaptics.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\KoalageddonInstaller.exe"C:\Users\Admin\AppData\Local\Temp\KoalageddonInstaller.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\._cache_KoalageddonInstaller.exe"C:\Users\Admin\AppData\Local\Temp\._cache_KoalageddonInstaller.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\is-3F1D1.tmp\._cache_KoalageddonInstaller.tmp"C:\Users\Admin\AppData\Local\Temp\is-3F1D1.tmp\._cache_KoalageddonInstaller.tmp" /SL5="$50286,2244670,780800,C:\Users\Admin\AppData\Local\Temp\._cache_KoalageddonInstaller.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3684
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\is-IS39P.tmp\._cache_Synaptics.tmp"C:\Users\Admin\AppData\Local\Temp\is-IS39P.tmp\._cache_Synaptics.tmp" /SL5="$70282,2244670,780800,C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1196
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD58409990c16c5003e804b40bb4f8d8fa7
SHA12d6d5458bc2caade8019a09f9cdc8cb9bbc59620
SHA256e820e5072dddccf820e043634f226ee0223fb5d0473c575f39eb88fce647d477
SHA512b5da43ad3d24d8c23603af8ef7c78b108f2cdd253464347c844a552a4f213895cf0955a67147c384538ac1b069254e2af535064130b44219962fa12debfcd8f9
-
Filesize
614KB
MD58d188050b9e4c0a5f0f24fcea65b1133
SHA13b1d04ee1adec2cd53d8721aee45fc112b5700da
SHA2566c2e59b3ecc0e453a141e7229e25cafeb286ebe27c0c68096c18bfb3ce97b50a
SHA512e220c535bd4bcc6897eb892e5731ad6e78ffb6d642dffb2ae104e8b5d642cdb53bd2a8e3e90ca62c7b199f85559467f2af0ebee62c1e75b3ca5e2e90c1b53ba8
-
Filesize
2.9MB
MD5238691250a5960beb04574bbb4ba069c
SHA1f4f3b5fa7e0edd6aa99587aedfe9dd89a3b582f0
SHA2566e027b8d745ea9ef349493f65d12347d090b2a6ae7b0162b4f8c9c801a82b7f9
SHA512941ed390d9fd374c15c26e3027609567f217d0069b8a248c1ae649d5516fd2bf2e6be2ba7547526bd215c727e31ec0c83068d138b585b2b408c157930a3bfb3e
-
Filesize
2.9MB
MD5094deb38ab94632c639192a61a62e820
SHA1aeb88d8bf73632dd17dec410054cc7e3bd9ac6f3
SHA25647feec7d162557b5b989280d6f57bbd44c976d24063d5fe01a68bb4c230cc610
SHA5128795268aef7c405ed05c522b63cd80519098207fca5ba02281d9a79082ae4b34b5ee8b8648ac1a9782e7f63c53fbdf561f434ec8c97b3f6bb0cd33cc4b96b8ea
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04