Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/11/2024, 22:34
Behavioral task
behavioral1
Sample
8ab3172ce475cd939f04a5f2a8c447509f84399200fc069477737b8756c39905N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8ab3172ce475cd939f04a5f2a8c447509f84399200fc069477737b8756c39905N.exe
Resource
win10v2004-20241007-en
General
-
Target
8ab3172ce475cd939f04a5f2a8c447509f84399200fc069477737b8756c39905N.exe
-
Size
5.9MB
-
MD5
962b89d7834c31522426eda22ec753b0
-
SHA1
c0ccb1656a5712d43344c150bcd3b16f10421de5
-
SHA256
8ab3172ce475cd939f04a5f2a8c447509f84399200fc069477737b8756c39905
-
SHA512
2e6cc4971316d6ee69ee283b13536e8f30a9476f7bbf81b2639702092f254b79651d11ce0560d022c55bf629136182d27bc84831bb61153e1802731cf33abe00
-
SSDEEP
98304:fnsmtk2adA2gnlWeT4trH1iZn19o1DddSzsITsbpXDbKREOrskWsach:vLR2gnlWeT4tHkpULysbpvKvrHWsR
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2580 ._cache_8ab3172ce475cd939f04a5f2a8c447509f84399200fc069477737b8756c39905N.exe 2152 Synaptics.exe 2920 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 2532 8ab3172ce475cd939f04a5f2a8c447509f84399200fc069477737b8756c39905N.exe 2532 8ab3172ce475cd939f04a5f2a8c447509f84399200fc069477737b8756c39905N.exe 2532 8ab3172ce475cd939f04a5f2a8c447509f84399200fc069477737b8756c39905N.exe 2532 8ab3172ce475cd939f04a5f2a8c447509f84399200fc069477737b8756c39905N.exe 2152 Synaptics.exe 2152 Synaptics.exe 2152 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 8ab3172ce475cd939f04a5f2a8c447509f84399200fc069477737b8756c39905N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ab3172ce475cd939f04a5f2a8c447509f84399200fc069477737b8756c39905N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_8ab3172ce475cd939f04a5f2a8c447509f84399200fc069477737b8756c39905N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2884 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2884 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2580 2532 8ab3172ce475cd939f04a5f2a8c447509f84399200fc069477737b8756c39905N.exe 31 PID 2532 wrote to memory of 2580 2532 8ab3172ce475cd939f04a5f2a8c447509f84399200fc069477737b8756c39905N.exe 31 PID 2532 wrote to memory of 2580 2532 8ab3172ce475cd939f04a5f2a8c447509f84399200fc069477737b8756c39905N.exe 31 PID 2532 wrote to memory of 2580 2532 8ab3172ce475cd939f04a5f2a8c447509f84399200fc069477737b8756c39905N.exe 31 PID 2532 wrote to memory of 2152 2532 8ab3172ce475cd939f04a5f2a8c447509f84399200fc069477737b8756c39905N.exe 32 PID 2532 wrote to memory of 2152 2532 8ab3172ce475cd939f04a5f2a8c447509f84399200fc069477737b8756c39905N.exe 32 PID 2532 wrote to memory of 2152 2532 8ab3172ce475cd939f04a5f2a8c447509f84399200fc069477737b8756c39905N.exe 32 PID 2532 wrote to memory of 2152 2532 8ab3172ce475cd939f04a5f2a8c447509f84399200fc069477737b8756c39905N.exe 32 PID 2152 wrote to memory of 2920 2152 Synaptics.exe 33 PID 2152 wrote to memory of 2920 2152 Synaptics.exe 33 PID 2152 wrote to memory of 2920 2152 Synaptics.exe 33 PID 2152 wrote to memory of 2920 2152 Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ab3172ce475cd939f04a5f2a8c447509f84399200fc069477737b8756c39905N.exe"C:\Users\Admin\AppData\Local\Temp\8ab3172ce475cd939f04a5f2a8c447509f84399200fc069477737b8756c39905N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\._cache_8ab3172ce475cd939f04a5f2a8c447509f84399200fc069477737b8756c39905N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_8ab3172ce475cd939f04a5f2a8c447509f84399200fc069477737b8756c39905N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2580
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2920
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.9MB
MD5962b89d7834c31522426eda22ec753b0
SHA1c0ccb1656a5712d43344c150bcd3b16f10421de5
SHA2568ab3172ce475cd939f04a5f2a8c447509f84399200fc069477737b8756c39905
SHA5122e6cc4971316d6ee69ee283b13536e8f30a9476f7bbf81b2639702092f254b79651d11ce0560d022c55bf629136182d27bc84831bb61153e1802731cf33abe00
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
\Users\Admin\AppData\Local\Temp\._cache_8ab3172ce475cd939f04a5f2a8c447509f84399200fc069477737b8756c39905N.exe
Filesize5.2MB
MD549d70c8b15988e5bb15853d0466f2a7e
SHA1ff3f371e57fe07f84c6390953f0d7e9779194cf2
SHA256918fa5141a4a98f826b1f1f5ea69bf6e20208162d67748baceceaff96e49ae30
SHA512056c33ff5ec4d45eb5314e074c51665b7b8c58d77b894558a7ca28378af2f3676cec635a7e1ec1af81459d51f1548cd31d6b9a20a330ff8ce505683b31756ca3