Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
submitted
26-09-2024 15:13
Static task
static1
Behavioral task
behavioral1
Sample
bc538c3b64913abfacbd75ce5f26029a38f9be95ad31311ee3740a48cf702812N.exe
Resource
win7-20240708-en
General
-
Target
bc538c3b64913abfacbd75ce5f26029a38f9be95ad31311ee3740a48cf702812N.exe
-
Size
2.0MB
-
MD5
c01fd295e1eb843cd35f639a9bbb9b90
-
SHA1
171baf8a214403dce4234701b7ba31b5980710ff
-
SHA256
bc538c3b64913abfacbd75ce5f26029a38f9be95ad31311ee3740a48cf702812
-
SHA512
a8adb083200caa6c8cf3504510000dacf3eedac109f6b8311dd8e4d9f38392aab33465dc24593dc2d19baf87ee69006c6787f42047426e9b97020972eda558be
-
SSDEEP
24576:KnsJ39LyjbJkQFMhmC+6GD9oOyHutimZ9VSly2hVvHW6qMnSbTBBhBMNBn:KnsHyjtk2MYC5GDXHPkVOBTKt
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
resource yara_rule behavioral2/memory/1020-68-0x0000000010000000-0x000000001019F000-memory.dmp purplefox_rootkit behavioral2/memory/5116-88-0x0000000010000000-0x000000001019F000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/memory/1020-68-0x0000000010000000-0x000000001019F000-memory.dmp family_gh0strat behavioral2/memory/5116-88-0x0000000010000000-0x000000001019F000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
Xred family
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys Wxypq.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" Wxypq.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation bc538c3b64913abfacbd75ce5f26029a38f9be95ad31311ee3740a48cf702812N.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 7 IoCs
pid Process 1020 ._cache_bc538c3b64913abfacbd75ce5f26029a38f9be95ad31311ee3740a48cf702812N.exe 1696 Synaptics.exe 5116 Wxypq.exe 1980 Wxypq.exe 2516 ._cache_Synaptics.exe 4920 Wxypq.exe 800 Wxypq.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" bc538c3b64913abfacbd75ce5f26029a38f9be95ad31311ee3740a48cf702812N.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Wxypq.exe ._cache_bc538c3b64913abfacbd75ce5f26029a38f9be95ad31311ee3740a48cf702812N.exe File opened for modification C:\Windows\SysWOW64\Wxypq.exe ._cache_bc538c3b64913abfacbd75ce5f26029a38f9be95ad31311ee3740a48cf702812N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc538c3b64913abfacbd75ce5f26029a38f9be95ad31311ee3740a48cf702812N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_bc538c3b64913abfacbd75ce5f26029a38f9be95ad31311ee3740a48cf702812N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wxypq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wxypq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wxypq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wxypq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2468 cmd.exe 4860 cmd.exe 2472 PING.EXE 4988 PING.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Wxypq.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Wxypq.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Wxypq.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ bc538c3b64913abfacbd75ce5f26029a38f9be95ad31311ee3740a48cf702812N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2472 PING.EXE 4988 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3596 EXCEL.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1980 Wxypq.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1020 ._cache_bc538c3b64913abfacbd75ce5f26029a38f9be95ad31311ee3740a48cf702812N.exe Token: SeLoadDriverPrivilege 1980 Wxypq.exe Token: SeIncBasePriorityPrivilege 2516 ._cache_Synaptics.exe Token: 33 1980 Wxypq.exe Token: SeIncBasePriorityPrivilege 1980 Wxypq.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3596 EXCEL.EXE 3596 EXCEL.EXE 3596 EXCEL.EXE 3596 EXCEL.EXE 3596 EXCEL.EXE 3596 EXCEL.EXE 3596 EXCEL.EXE -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2652 wrote to memory of 1020 2652 bc538c3b64913abfacbd75ce5f26029a38f9be95ad31311ee3740a48cf702812N.exe 82 PID 2652 wrote to memory of 1020 2652 bc538c3b64913abfacbd75ce5f26029a38f9be95ad31311ee3740a48cf702812N.exe 82 PID 2652 wrote to memory of 1020 2652 bc538c3b64913abfacbd75ce5f26029a38f9be95ad31311ee3740a48cf702812N.exe 82 PID 2652 wrote to memory of 1696 2652 bc538c3b64913abfacbd75ce5f26029a38f9be95ad31311ee3740a48cf702812N.exe 83 PID 2652 wrote to memory of 1696 2652 bc538c3b64913abfacbd75ce5f26029a38f9be95ad31311ee3740a48cf702812N.exe 83 PID 2652 wrote to memory of 1696 2652 bc538c3b64913abfacbd75ce5f26029a38f9be95ad31311ee3740a48cf702812N.exe 83 PID 5116 wrote to memory of 1980 5116 Wxypq.exe 85 PID 5116 wrote to memory of 1980 5116 Wxypq.exe 85 PID 5116 wrote to memory of 1980 5116 Wxypq.exe 85 PID 1020 wrote to memory of 2468 1020 ._cache_bc538c3b64913abfacbd75ce5f26029a38f9be95ad31311ee3740a48cf702812N.exe 86 PID 1020 wrote to memory of 2468 1020 ._cache_bc538c3b64913abfacbd75ce5f26029a38f9be95ad31311ee3740a48cf702812N.exe 86 PID 1020 wrote to memory of 2468 1020 ._cache_bc538c3b64913abfacbd75ce5f26029a38f9be95ad31311ee3740a48cf702812N.exe 86 PID 1696 wrote to memory of 2516 1696 Synaptics.exe 88 PID 1696 wrote to memory of 2516 1696 Synaptics.exe 88 PID 1696 wrote to memory of 2516 1696 Synaptics.exe 88 PID 2516 wrote to memory of 4860 2516 ._cache_Synaptics.exe 91 PID 2516 wrote to memory of 4860 2516 ._cache_Synaptics.exe 91 PID 2516 wrote to memory of 4860 2516 ._cache_Synaptics.exe 91 PID 4920 wrote to memory of 800 4920 Wxypq.exe 93 PID 4920 wrote to memory of 800 4920 Wxypq.exe 93 PID 4920 wrote to memory of 800 4920 Wxypq.exe 93 PID 2468 wrote to memory of 2472 2468 cmd.exe 95 PID 2468 wrote to memory of 2472 2468 cmd.exe 95 PID 2468 wrote to memory of 2472 2468 cmd.exe 95 PID 4860 wrote to memory of 4988 4860 cmd.exe 96 PID 4860 wrote to memory of 4988 4860 cmd.exe 96 PID 4860 wrote to memory of 4988 4860 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc538c3b64913abfacbd75ce5f26029a38f9be95ad31311ee3740a48cf702812N.exe"C:\Users\Admin\AppData\Local\Temp\bc538c3b64913abfacbd75ce5f26029a38f9be95ad31311ee3740a48cf702812N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\._cache_bc538c3b64913abfacbd75ce5f26029a38f9be95ad31311ee3740a48cf702812N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_bc538c3b64913abfacbd75ce5f26029a38f9be95ad31311ee3740a48cf702812N.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\_CACHE~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2472
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\_CACHE~2.EXE > nul4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.15⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4988
-
-
-
-
-
C:\Windows\SysWOW64\Wxypq.exeC:\Windows\SysWOW64\Wxypq.exe -auto1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\SysWOW64\Wxypq.exeC:\Windows\SysWOW64\Wxypq.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:1980
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3596
-
C:\Windows\SysWOW64\Wxypq.exeC:\Windows\SysWOW64\Wxypq.exe -auto1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\Wxypq.exeC:\Windows\SysWOW64\Wxypq.exe -acsi2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:800
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5c01fd295e1eb843cd35f639a9bbb9b90
SHA1171baf8a214403dce4234701b7ba31b5980710ff
SHA256bc538c3b64913abfacbd75ce5f26029a38f9be95ad31311ee3740a48cf702812
SHA512a8adb083200caa6c8cf3504510000dacf3eedac109f6b8311dd8e4d9f38392aab33465dc24593dc2d19baf87ee69006c6787f42047426e9b97020972eda558be
-
C:\Users\Admin\AppData\Local\Temp\._cache_bc538c3b64913abfacbd75ce5f26029a38f9be95ad31311ee3740a48cf702812N.exe
Filesize1.3MB
MD52e410bcb1fb4add94a77a2c8175872c5
SHA1d9d14b614834ffb838e1ca3741800046279a4743
SHA25641e6f7c1c86031ee633747354e89c251b230adf74767af51faa6605728876e6a
SHA5124ee67cb97ab668c70aa30040c0f1ad998c2f626a4adef091ae7dfce70e32a74aab512df62a9374a7e47f71eb20ee8548773c119b8508629bc270cf00901cf701
-
Filesize
27KB
MD50f1bd2ee4e6b47ee16754fd6d7309d9f
SHA1f29117377166bbe9e9f6330896e12cf0ca4d9a40
SHA256cfd07996f791d1d618f9364a5d134cd5f91e06571ac05c5c3a71bf8a7b88444a
SHA51213957e74a65a3b86a456383069c37f0e500280f960c9c3c3c7bdde0dd42d4bfaa6707c8ab2262b7041c2bb39e2658f7f9c8da57e657f60f02a0750dd22a05c66
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04