Analysis
-
max time kernel
112s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
submitted
04/10/2024, 18:26
Static task
static1
Behavioral task
behavioral1
Sample
331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe
Resource
win10v2004-20240802-en
General
-
Target
331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe
-
Size
813KB
-
MD5
08ef92ceaed4f6829c2b947a799519e0
-
SHA1
c6cd6b3c61bca6fe3f5eec49161363e36619a301
-
SHA256
331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025
-
SHA512
3649e7a72446837e610c2dddff9574a7918e94a44f2b9d297df820801e9a51f72df9ed94a4cf921bb0d510e2a06833cb0c4f61e72caf510f9a6926a6a4797b85
-
SSDEEP
12288:5MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9yP3+4dSKj:5nsJ39LyjbJkQFMhmC+6GD9wS2
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Blocks application from running via registry modification 1 IoCs
Adds application to list of disallowed applications.
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "0" ._cache_331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" ._cache_331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe -
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" ._cache_331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation 331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 3140 ._cache_331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe 768 Synaptics.exe 4504 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2660 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3140 ._cache_331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe 3140 ._cache_331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2660 EXCEL.EXE 2660 EXCEL.EXE 2660 EXCEL.EXE 2660 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2560 wrote to memory of 3140 2560 331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe 82 PID 2560 wrote to memory of 3140 2560 331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe 82 PID 2560 wrote to memory of 3140 2560 331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe 82 PID 2560 wrote to memory of 768 2560 331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe 83 PID 2560 wrote to memory of 768 2560 331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe 83 PID 2560 wrote to memory of 768 2560 331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe 83 PID 768 wrote to memory of 4504 768 Synaptics.exe 84 PID 768 wrote to memory of 4504 768 Synaptics.exe 84 PID 768 wrote to memory of 4504 768 Synaptics.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe"C:\Users\Admin\AppData\Local\Temp\331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\._cache_331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe"2⤵
- Blocks application from running via registry modification
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3140
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4504
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
813KB
MD508ef92ceaed4f6829c2b947a799519e0
SHA1c6cd6b3c61bca6fe3f5eec49161363e36619a301
SHA256331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025
SHA5123649e7a72446837e610c2dddff9574a7918e94a44f2b9d297df820801e9a51f72df9ed94a4cf921bb0d510e2a06833cb0c4f61e72caf510f9a6926a6a4797b85
-
C:\Users\Admin\AppData\Local\Temp\._cache_331d2d6b49d10af8032ffb074df9d365c1a2344fa2df445180e9f6d128377025N.exe
Filesize59KB
MD527016937b5781c4f84b6b3432170f4d0
SHA1bc812a8c4d44a3503ffd6a46e4fdab925c622344
SHA256fc1a02b509b8f351ac45bd45efd4e7296b365545a48ffd6a14e8e07bc7189155
SHA51224a726276cc53c5a0d075d1bf930e24b3a1891e0754b17c28a5a35b5677fd792d9adb55e5e0a7fe18f056febb8af4a49a5a0fac33389205d1f4dcc0060422be7
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04