Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240903-en -
submitted
02/10/2024, 10:46
Static task
static1
Behavioral task
behavioral1
Sample
01c98bf4996afe3d974b785d667aa91f118a0351b6c5290db526183548775151.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
01c98bf4996afe3d974b785d667aa91f118a0351b6c5290db526183548775151.exe
Resource
win10v2004-20240802-en
General
-
Target
01c98bf4996afe3d974b785d667aa91f118a0351b6c5290db526183548775151.exe
-
Size
868KB
-
MD5
feb667833a9fc69fcbf42aa7e0046733
-
SHA1
29c1b88fa3d36ae9f5e4501572c51338770617ff
-
SHA256
01c98bf4996afe3d974b785d667aa91f118a0351b6c5290db526183548775151
-
SHA512
4788e08d6e392d21e7adcb87fe9e3c93055f579ef014042909a1d07f4b268c42c792426a829025709636858e3206fbc2bf590baec3688325c3634683ac425617
-
SSDEEP
12288:xMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9ytt2pIj:xnsJ39LyjbJkQFMhmC+6GD9s2po
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2740 ._cache_01c98bf4996afe3d974b785d667aa91f118a0351b6c5290db526183548775151.exe 2664 Synaptics.exe 2624 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 1120 01c98bf4996afe3d974b785d667aa91f118a0351b6c5290db526183548775151.exe 1120 01c98bf4996afe3d974b785d667aa91f118a0351b6c5290db526183548775151.exe 1120 01c98bf4996afe3d974b785d667aa91f118a0351b6c5290db526183548775151.exe 2664 Synaptics.exe 2664 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 01c98bf4996afe3d974b785d667aa91f118a0351b6c5290db526183548775151.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01c98bf4996afe3d974b785d667aa91f118a0351b6c5290db526183548775151.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_01c98bf4996afe3d974b785d667aa91f118a0351b6c5290db526183548775151.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2708 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2624 ._cache_Synaptics.exe 2740 ._cache_01c98bf4996afe3d974b785d667aa91f118a0351b6c5290db526183548775151.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2624 ._cache_Synaptics.exe 2740 ._cache_01c98bf4996afe3d974b785d667aa91f118a0351b6c5290db526183548775151.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2708 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1120 wrote to memory of 2740 1120 01c98bf4996afe3d974b785d667aa91f118a0351b6c5290db526183548775151.exe 29 PID 1120 wrote to memory of 2740 1120 01c98bf4996afe3d974b785d667aa91f118a0351b6c5290db526183548775151.exe 29 PID 1120 wrote to memory of 2740 1120 01c98bf4996afe3d974b785d667aa91f118a0351b6c5290db526183548775151.exe 29 PID 1120 wrote to memory of 2740 1120 01c98bf4996afe3d974b785d667aa91f118a0351b6c5290db526183548775151.exe 29 PID 1120 wrote to memory of 2664 1120 01c98bf4996afe3d974b785d667aa91f118a0351b6c5290db526183548775151.exe 30 PID 1120 wrote to memory of 2664 1120 01c98bf4996afe3d974b785d667aa91f118a0351b6c5290db526183548775151.exe 30 PID 1120 wrote to memory of 2664 1120 01c98bf4996afe3d974b785d667aa91f118a0351b6c5290db526183548775151.exe 30 PID 1120 wrote to memory of 2664 1120 01c98bf4996afe3d974b785d667aa91f118a0351b6c5290db526183548775151.exe 30 PID 2664 wrote to memory of 2624 2664 Synaptics.exe 31 PID 2664 wrote to memory of 2624 2664 Synaptics.exe 31 PID 2664 wrote to memory of 2624 2664 Synaptics.exe 31 PID 2664 wrote to memory of 2624 2664 Synaptics.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\01c98bf4996afe3d974b785d667aa91f118a0351b6c5290db526183548775151.exe"C:\Users\Admin\AppData\Local\Temp\01c98bf4996afe3d974b785d667aa91f118a0351b6c5290db526183548775151.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\._cache_01c98bf4996afe3d974b785d667aa91f118a0351b6c5290db526183548775151.exe"C:\Users\Admin\AppData\Local\Temp\._cache_01c98bf4996afe3d974b785d667aa91f118a0351b6c5290db526183548775151.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2740
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2624
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
868KB
MD5feb667833a9fc69fcbf42aa7e0046733
SHA129c1b88fa3d36ae9f5e4501572c51338770617ff
SHA25601c98bf4996afe3d974b785d667aa91f118a0351b6c5290db526183548775151
SHA5124788e08d6e392d21e7adcb87fe9e3c93055f579ef014042909a1d07f4b268c42c792426a829025709636858e3206fbc2bf590baec3688325c3634683ac425617
-
Filesize
495B
MD5e7cce3f2bf975b5fbe2b8a080b7a365a
SHA13838b7dd008b6b689c2bc9e8f0a111cd84d92316
SHA2565a4341dd53b472e26b21ee0fdea738da284aa4c6cefc49cf6eb6280814675699
SHA512e0ca70f20a1dc4dbc6c1e4bb219061e8c2e697221a18892e7d2ae092652ba7396ed966dc369c80efb49059ebf61625cf042630e55ab177dc23b1102771a3fc2d
-
Filesize
22KB
MD5c79e19d316a9cb6f116b330cfe9772a3
SHA1949363a6fdc81d3725855669deb17a0e382c91e3
SHA2567ed79febc683985d63a37b00d409fc93ff0ff9dc1ddacd32112f06de295db211
SHA51247b8590c30e448d38fe91717464e7fe6b0ec0358be225699df09b456071ebc403cc1caac9d01aa186211c4dac697f2306689894062de1fcf91cfd1606ed85e40
-
Filesize
27KB
MD5a0282824bd04554ad187de8fb1c0d026
SHA1ac89438d8875693f5f8222fc1214b9f9348394de
SHA256584e497f563d2822bfd5dd9f892c18111cd17455daddfadcb6990ce199c1ec7f
SHA5129267d4dd0f62d61ba06704610f65442533cac086cdf24c9ff50cbf81592cc04ac741e323dc3f44fcefc36443292b5475c66833c49dc08c74d0dd421cea40f429
-
Filesize
26KB
MD554f8fa4e8ad7089775688d821c03c5b1
SHA1d1e5eafac1a597fb292a6605c836742e517bcff8
SHA256e55a3066a03f0d138abf8ef45d7e6d8042b484daee7d7da0a60f59084cba601c
SHA512c5d51f4c70b042da2d11900273205942de9b7986249976b2d7d0c9c8288d91fe13d4cb1ca4b78c61a25a9af55713cce3aac033495f0ad4a1829e74a360c9ae46
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
23KB
MD5a963d94008c60880897787508435e373
SHA140ec214fd5be4ec53a8e86485fd173471aeb3acd
SHA256bb897cc8e96a48183b2e4325c82c935b240df945fc01d09f89d79c969499c801
SHA5126a40b4b1aab8a5a781e3159ea172d78ab04463f93bb9228b47d121ce1647488093689263d85035ebceab1516809c2b00063b11eacaf43314c6005970054cd06f
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
\Users\Admin\AppData\Local\Temp\._cache_01c98bf4996afe3d974b785d667aa91f118a0351b6c5290db526183548775151.exe
Filesize114KB
MD54209bf98881632ce68ed637d2fd4046d
SHA190882ae0e976df75c7a802c1d251d3c3a66a8982
SHA2563251630556d4979d5126d4525318c94da12fefec7013d9f118e68aa7e707d504
SHA51266510474dc8f0894f74f7d717854acc95cc948a558eee1a8d508d51e3012d7c19355b70579216e34a5c423bf7f37c959d6657fcf4a9dcffe63edff91619c29b1