Analysis
-
max time kernel
112s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 05:24
Behavioral task
behavioral1
Sample
c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe
Resource
win10v2004-20241007-en
General
-
Target
c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe
-
Size
3.5MB
-
MD5
419261a8cdf19560d4a39ab434ee5270
-
SHA1
dabae0f912f2d85f74f4461fb4dd813e6fe1b3d5
-
SHA256
c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176da
-
SHA512
6ec51e4ea5d66b3fe39528f8074414e46f4212033308b57921a7b56570d45c8b60e18d19ac090c171239a423f5e65fa9ea035a26671286aea262616569437878
-
SSDEEP
49152:insHyjtk2MYC5GDrzKT4qsEEXJeHuvokx7vDKo80wkSu2l/qtSupzeB/:insmtk2a+K1rOvoqa/Vr/uteB/
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exeSynaptics.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
Processes:
._cache_c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exeSynaptics.exe._cache_Synaptics.exepid Process 3572 ._cache_c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe 4296 Synaptics.exe 1560 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exeSynaptics.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
Processes:
c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exeSynaptics.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 3384 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
._cache_c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe._cache_Synaptics.exedescription pid Process Token: SeDebugPrivilege 3572 ._cache_c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe Token: SeDebugPrivilege 1560 ._cache_Synaptics.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
._cache_c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe._cache_Synaptics.exepid Process 3572 ._cache_c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe 1560 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
EXCEL.EXEpid Process 3384 EXCEL.EXE 3384 EXCEL.EXE 3384 EXCEL.EXE 3384 EXCEL.EXE 3384 EXCEL.EXE 3384 EXCEL.EXE 3384 EXCEL.EXE 3384 EXCEL.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exeSynaptics.exe._cache_Synaptics.exe._cache_c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exedescription pid Process procid_target PID 1340 wrote to memory of 3572 1340 c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe 86 PID 1340 wrote to memory of 3572 1340 c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe 86 PID 1340 wrote to memory of 4296 1340 c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe 88 PID 1340 wrote to memory of 4296 1340 c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe 88 PID 1340 wrote to memory of 4296 1340 c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe 88 PID 4296 wrote to memory of 1560 4296 Synaptics.exe 89 PID 4296 wrote to memory of 1560 4296 Synaptics.exe 89 PID 1560 wrote to memory of 1740 1560 ._cache_Synaptics.exe 92 PID 1560 wrote to memory of 1740 1560 ._cache_Synaptics.exe 92 PID 1560 wrote to memory of 884 1560 ._cache_Synaptics.exe 93 PID 1560 wrote to memory of 884 1560 ._cache_Synaptics.exe 93 PID 3572 wrote to memory of 3516 3572 ._cache_c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe 97 PID 3572 wrote to memory of 3516 3572 ._cache_c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe 97 PID 3572 wrote to memory of 3016 3572 ._cache_c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe 98 PID 3572 wrote to memory of 3016 3572 ._cache_c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe 98 PID 3572 wrote to memory of 2748 3572 ._cache_c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe 99 PID 3572 wrote to memory of 2748 3572 ._cache_c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe 99 PID 1560 wrote to memory of 4436 1560 ._cache_Synaptics.exe 94 PID 1560 wrote to memory of 4436 1560 ._cache_Synaptics.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe"C:\Users\Admin\AppData\Local\Temp\c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\._cache_c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe"C:\Users\Admin\AppData\Local\Temp\._cache_c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Program Files\Java\jdk-1.8\bin\java.exe"C:\Program Files\Java\jdk-1.8\bin\java.exe" -version3⤵PID:3516
-
-
C:\Program Files\Java\jdk-1.8\jre\bin\java.exe"C:\Program Files\Java\jdk-1.8\jre\bin\java.exe" -version3⤵PID:3016
-
-
C:\Program Files\Java\jre-1.8\bin\java.exe"C:\Program Files\Java\jre-1.8\bin\java.exe" -version3⤵PID:2748
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Program Files\Java\jdk-1.8\bin\java.exe"C:\Program Files\Java\jdk-1.8\bin\java.exe" -version4⤵PID:1740
-
-
C:\Program Files\Java\jdk-1.8\jre\bin\java.exe"C:\Program Files\Java\jdk-1.8\jre\bin\java.exe" -version4⤵PID:884
-
-
C:\Program Files\Java\jre-1.8\bin\java.exe"C:\Program Files\Java\jre-1.8\bin\java.exe" -version4⤵PID:4436
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5b789bb8b172bdee520e6ddb93ce8beee
SHA12f2272042f2ce047dabf416bbf1d1ca6dfc6434a
SHA2564c957d7b46399ade4c83b63222020c50b88516b8275a2c8ffd13fdf64fc9ba20
SHA512aa92e70eab1b042743e3cd8deea32562060a0f4922b9a97d4f40e52982af45ab8342bff13de80df04f6a9c950b9e7f005aad708f642a2dac6dd8821b9344f7e5
-
Filesize
50B
MD5a831c9d175374bea8d4588cc85c38f68
SHA19a73ca201cad3bac0d2754ed6b70fcffe6c72e7a
SHA256a44511ed989496c76ff165aa36de90b56c3fd37d964b8d85559c7632b99304e5
SHA5125a2395541ad095773c9df459905221789ba7c31bce332ef90eff6c7692ec31824a14e10a63d44defa59dac3d36e108316c8c1506ec4c1045a6c7bc328bb35632
-
Filesize
50B
MD50e1d2056d64541d3074bff230f849990
SHA14e4d179b6b75c08b8b787b1846f30ef99ba5488c
SHA256f5261516693331a5c54bf21419c429f747775b8fe259a10d2c589661f7fdcce5
SHA512265163029cadc1ac9f6073648fe84adac4a7199e601164473421ecaaa95a1a45d33e0ece95fef2c750b6cd2fbc298a78fcd39d55d7b43a46c60160b7562f7220
-
Filesize
3.5MB
MD5419261a8cdf19560d4a39ab434ee5270
SHA1dabae0f912f2d85f74f4461fb4dd813e6fe1b3d5
SHA256c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176da
SHA5126ec51e4ea5d66b3fe39528f8074414e46f4212033308b57921a7b56570d45c8b60e18d19ac090c171239a423f5e65fa9ea035a26671286aea262616569437878
-
C:\Users\Admin\AppData\Local\Temp\._cache_c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe
Filesize2.8MB
MD5e9580249182c0d7e81ee1c30154731b4
SHA17a9ca8f420d59b3cd45c188ce0f87bcae91e8d20
SHA25603342485feb128ab14e35d84d9f48d428c9d8774b145dcd8d520baacd4aef92b
SHA512c29d7947b07bbc03b66709257e9509761abba992a30bb1a60e09c31eca764314b95dca11a28e0ffc1b93c62548c06660fa05821ab6a74137cbed8185581a19a2
-
Filesize
31B
MD567bfcfc208d787e99ca8ea4801117538
SHA1f7b82fe95f72e953e2d2b7fe4aa879a7e4eba2b7
SHA2569a64e96548ed95ab1e5d69f36cc0313ab399e517ce2ef6dbad8e56ba47090d46
SHA5128311a07b8f17de515e4917b109cce69569bc136ae1456acd7d6f9a069823e3bd0466282db53a4dfc0b88507772bfb6521fe5179fbd759d2bf8d3c692d370440b
-
Filesize
21KB
MD5231d76d3fd1be833f1248f78f7b525e5
SHA14e96c444637f6bae07d00125a23678824b89490a
SHA2564251323465be552c9b9fc20db64c6452668385e2f2d186c41630a94367d9ce49
SHA5121a4ecbce1ccb06d0dfe1442a326e79c5679d52311923213e47d9ee801cfe28d6c04dd2a681be15b4a69ed45077b162f8ad71a33b83534c2556ec4b860fe4c497
-
Filesize
29B
MD5a068737344ad1e4bcde127bc215d3f4c
SHA17e0df815a4bffea2bfe76e1099053b335dd66e66
SHA2569832e053464d410f8d185eec8bf0d07edba9c04745913c56145db541855d2c99
SHA51225c7cf162cc15d32c0be8ced9de163da93c7a3251d35747e4547bef5c46d60d87f0a91db92aeee1f650feab9410e81d9aba4503ec5ec120599964bd8edb79512
-
Filesize
64B
MD54360c9f933de34fd6797628b25617595
SHA1ab19b2d0d60ba2609dfd4651692776d66dc843b5
SHA256172ecdf122b4d744cd73607cf0c043bac9d47978cd8671ab86eb25d43e23bb3f
SHA512efa1bb2f9aa6748e2a2b88664c87553572b9614f19809fa74196cbc00420ca1cf562e2192b4e887cec29719fa95ec5cb8a3d134e6273ce9cf9089c27c3f70d56
-
Filesize
88B
MD536d7b4a54a5545e673c2a155032f1bae
SHA173a1a440bbdaed38fae625fcf35fabfa5344903d
SHA256d1b8b1e3a1be908136b18d5b3aff5f62cb8feea0db5131c9f66362195cd7c6f6
SHA512f1837f9e7055beec745022cbd05019456f9e14e0d9be80f0ee3fd8b19713d2172a1eca0efba14dc005f7ff0fe5ebb95dc5ef3aa7969a46d6ce08debd26c22937
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04