Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-11-2024 02:51
Behavioral task
behavioral1
Sample
68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe
Resource
win10v2004-20241007-en
General
-
Target
68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe
-
Size
823KB
-
MD5
c2cdae15750e17383ec3b4225bf32a9f
-
SHA1
e743955ba3d7c6edaf4dae0400b990b271839eb7
-
SHA256
68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2
-
SHA512
8ef7aa545deb4e7a106b4e92744319522021aa8992a801e3330d5a0bbdefafb11571a3594dd38670916eda44387dfdbb208f9977a587e12ef3b5f38b4ebbdd51
-
SSDEEP
12288:ZMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9xEBpij:ZnsJ39LyjbJkQFMhmC+6GD92e
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Processes:
resource behavioral1/files/0x0009000000016d46-83.dat -
Executes dropped EXE 3 IoCs
Processes:
._cache_68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exeSynaptics.exe._cache_Synaptics.exepid Process 2920 ._cache_68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe 2692 Synaptics.exe 3000 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
Processes:
68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exeSynaptics.exepid Process 2664 68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe 2664 68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe 2664 68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe 2692 Synaptics.exe 2692 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exeSynaptics.exeEXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 2332 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
EXCEL.EXEpid Process 2332 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exeSynaptics.exedescription pid Process procid_target PID 2664 wrote to memory of 2920 2664 68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe 31 PID 2664 wrote to memory of 2920 2664 68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe 31 PID 2664 wrote to memory of 2920 2664 68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe 31 PID 2664 wrote to memory of 2920 2664 68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe 31 PID 2664 wrote to memory of 2692 2664 68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe 32 PID 2664 wrote to memory of 2692 2664 68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe 32 PID 2664 wrote to memory of 2692 2664 68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe 32 PID 2664 wrote to memory of 2692 2664 68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe 32 PID 2692 wrote to memory of 3000 2692 Synaptics.exe 33 PID 2692 wrote to memory of 3000 2692 Synaptics.exe 33 PID 2692 wrote to memory of 3000 2692 Synaptics.exe 33 PID 2692 wrote to memory of 3000 2692 Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe"C:\Users\Admin\AppData\Local\Temp\68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\._cache_68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe"C:\Users\Admin\AppData\Local\Temp\._cache_68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe"2⤵
- Executes dropped EXE
PID:2920
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:3000
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
823KB
MD5c2cdae15750e17383ec3b4225bf32a9f
SHA1e743955ba3d7c6edaf4dae0400b990b271839eb7
SHA25668d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2
SHA5128ef7aa545deb4e7a106b4e92744319522021aa8992a801e3330d5a0bbdefafb11571a3594dd38670916eda44387dfdbb208f9977a587e12ef3b5f38b4ebbdd51
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
26KB
MD57bd9b05a6983e4c02ad9f1be3b155e14
SHA1e6a7a79924c0382e042cdcbe9156f1aa5c85d9ca
SHA2563544d55df904698c203ae2c49daf82c1d240675e181b6429ec0b58e9659155ae
SHA5122154ba3cd86d110d527f0da008cc32097822acff09970d70d57c84f7de8bd83ac86e96120ffab3c109f25606a846fcf94bc74e40eb54bcfa0b4efc84d90d742a
-
Filesize
29KB
MD5993891b02c3cf1046a96032e83f565b6
SHA12b920bd478aab11099cd301b2571715d059b64ad
SHA2567dcc81f68047de3e1877d07183970f5ab547c3bb8c6f2df782c2b3b4e736651a
SHA51252af4fe493e63c651fdb07a1545a27f6c41199ec93402468a7401a874cf3d9750bde173e1b1ac1b138b4d390c09150e7335a299c366cf70637bfca8bf8d73088
-
\Users\Admin\AppData\Local\Temp\._cache_68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe
Filesize69KB
MD5f2b28d713c51ab91e3452f7f98416123
SHA1039b9b9562971d19e2ebdcd27d209ff26575b94c
SHA25629b58fcac5050f4c966a71c1ce147f33e221ff34ba3b1bfa6433e208ac708c14
SHA51248d389f477a77eb16389dc011e0e89ba93d28f3fb81fec3d00c3b606ab4d0cc27b45d945265e170172445da46028a7e69451dbf19b34a2e4c6d6b5987eb3eda8