Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
submitted
04/10/2024, 18:26
Static task
static1
Behavioral task
behavioral1
Sample
331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe
Resource
win10v2004-20240802-en
General
-
Target
331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe
-
Size
813KB
-
MD5
08ef92ceaed4f6829c2b947a799519e0
-
SHA1
c6cd6b3c61bca6fe3f5eec49161363e36619a301
-
SHA256
331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025
-
SHA512
3649e7a72446837e610c2dddff9574a7918e94a44f2b9d297df820801e9a51f72df9ed94a4cf921bb0d510e2a06833cb0c4f61e72caf510f9a6926a6a4797b85
-
SSDEEP
12288:5MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9yP3+4dSKj:5nsJ39LyjbJkQFMhmC+6GD9wS2
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Blocks application from running via registry modification 1 IoCs
Adds application to list of disallowed applications.
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "0" ._cache_331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" ._cache_331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe -
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" ._cache_331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe -
Executes dropped EXE 3 IoCs
pid Process 1224 ._cache_331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe 2180 Synaptics.exe 1064 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 2912 331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe 2912 331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe 2912 331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe 2180 Synaptics.exe 2180 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2760 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1224 ._cache_331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2760 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2912 wrote to memory of 1224 2912 331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe 28 PID 2912 wrote to memory of 1224 2912 331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe 28 PID 2912 wrote to memory of 1224 2912 331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe 28 PID 2912 wrote to memory of 1224 2912 331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe 28 PID 2912 wrote to memory of 2180 2912 331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe 29 PID 2912 wrote to memory of 2180 2912 331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe 29 PID 2912 wrote to memory of 2180 2912 331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe 29 PID 2912 wrote to memory of 2180 2912 331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe 29 PID 2180 wrote to memory of 1064 2180 Synaptics.exe 30 PID 2180 wrote to memory of 1064 2180 Synaptics.exe 30 PID 2180 wrote to memory of 1064 2180 Synaptics.exe 30 PID 2180 wrote to memory of 1064 2180 Synaptics.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe"C:\Users\Admin\AppData\Local\Temp\331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\._cache_331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe"2⤵
- Blocks application from running via registry modification
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1224
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1064
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
813KB
MD508ef92ceaed4f6829c2b947a799519e0
SHA1c6cd6b3c61bca6fe3f5eec49161363e36619a301
SHA256331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025
SHA5123649e7a72446837e610c2dddff9574a7918e94a44f2b9d297df820801e9a51f72df9ed94a4cf921bb0d510e2a06833cb0c4f61e72caf510f9a6926a6a4797b85
-
Filesize
24KB
MD5ea92b3cdb8c10df84c948c71d002679e
SHA12147cff3a76b0138d1810d7475ea98bc8654f9f8
SHA256abcf618fdc0456dd7cf2999291a8df2354354f2089e4cdfb1d3167e5980a7a20
SHA512c1dd2c90d013e35f5a62ded6137755d4b579ea70c1550f129cd01584abb730673766cfa52779d92890d49b99d275af93d3345c82e0ca170ef9ba2bd1ba3f486c
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
29KB
MD5910ec4eabcb4d1434b6e321ec9f7b9a1
SHA12b2cf845dfe3cef87cd6d6554897b0f87f059cf1
SHA2562329d0b65cf511851f37a17875d46111e3706a03ef7e7af7ec227687233f417f
SHA512005aea62cc6f5b4028284edd87b215c54f7545e77ea41d2ce2028a11620bca79060cdac08e0bcbc7bd43a67e25b0bcf0c8951d5d8f1594e08e1bea3392fb3682
-
Filesize
28KB
MD53362272af1332b4ca131bd6e118be1cc
SHA1f3eddbc7d6901fdd8ca3079faeaf1ec0a94965b7
SHA256b9e959358b1a94ff47652b517529abda5cb2fe3e44953e0c9d86187844d0bff7
SHA512e21567f4c23e5d363c2cb8f1e072b74792af88bc2fbcb5ca8a079c882eaceee98213faebabdaa0a0dbb400279c36ec3d49ba07d20ca297ebea7eb4d06961a6b6
-
\Users\Admin\AppData\Local\Temp\._cache_331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe
Filesize59KB
MD527016937b5781c4f84b6b3432170f4d0
SHA1bc812a8c4d44a3503ffd6a46e4fdab925c622344
SHA256fc1a02b509b8f351ac45bd45efd4e7296b365545a48ffd6a14e8e07bc7189155
SHA51224a726276cc53c5a0d075d1bf930e24b3a1891e0754b17c28a5a35b5677fd792d9adb55e5e0a7fe18f056febb8af4a49a5a0fac33389205d1f4dcc0060422be7