Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-11-2024 01:46
Behavioral task
behavioral1
Sample
68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe
Resource
win10v2004-20241007-en
General
-
Target
68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe
-
Size
823KB
-
MD5
c2cdae15750e17383ec3b4225bf32a9f
-
SHA1
e743955ba3d7c6edaf4dae0400b990b271839eb7
-
SHA256
68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2
-
SHA512
8ef7aa545deb4e7a106b4e92744319522021aa8992a801e3330d5a0bbdefafb11571a3594dd38670916eda44387dfdbb208f9977a587e12ef3b5f38b4ebbdd51
-
SSDEEP
12288:ZMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9xEBpij:ZnsJ39LyjbJkQFMhmC+6GD92e
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 1608 ._cache_68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe 2948 Synaptics.exe 2636 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 2204 68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe 2204 68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe 2204 68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe 2948 Synaptics.exe 2948 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2700 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2700 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2204 wrote to memory of 1608 2204 68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe 28 PID 2204 wrote to memory of 1608 2204 68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe 28 PID 2204 wrote to memory of 1608 2204 68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe 28 PID 2204 wrote to memory of 1608 2204 68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe 28 PID 2204 wrote to memory of 2948 2204 68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe 29 PID 2204 wrote to memory of 2948 2204 68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe 29 PID 2204 wrote to memory of 2948 2204 68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe 29 PID 2204 wrote to memory of 2948 2204 68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe 29 PID 2948 wrote to memory of 2636 2948 Synaptics.exe 30 PID 2948 wrote to memory of 2636 2948 Synaptics.exe 30 PID 2948 wrote to memory of 2636 2948 Synaptics.exe 30 PID 2948 wrote to memory of 2636 2948 Synaptics.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe"C:\Users\Admin\AppData\Local\Temp\68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\._cache_68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe"C:\Users\Admin\AppData\Local\Temp\._cache_68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe"2⤵
- Executes dropped EXE
PID:1608
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2636
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
823KB
MD5c2cdae15750e17383ec3b4225bf32a9f
SHA1e743955ba3d7c6edaf4dae0400b990b271839eb7
SHA25668d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2
SHA5128ef7aa545deb4e7a106b4e92744319522021aa8992a801e3330d5a0bbdefafb11571a3594dd38670916eda44387dfdbb208f9977a587e12ef3b5f38b4ebbdd51
-
C:\Users\Admin\AppData\Local\Temp\._cache_68d41d21c16bae85f9a857511a5a1b3ccc28adc3721b82b17262e0e64f5a53f2.exe
Filesize69KB
MD5f2b28d713c51ab91e3452f7f98416123
SHA1039b9b9562971d19e2ebdcd27d209ff26575b94c
SHA25629b58fcac5050f4c966a71c1ce147f33e221ff34ba3b1bfa6433e208ac708c14
SHA51248d389f477a77eb16389dc011e0e89ba93d28f3fb81fec3d00c3b606ab4d0cc27b45d945265e170172445da46028a7e69451dbf19b34a2e4c6d6b5987eb3eda8
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
24KB
MD5164294f1269ad8d7875a5210bd8ad167
SHA1c6e82160a1e790e88eac5954401d3d953af13f3d
SHA25631b1535180ac86115906559f57e8101213f3e1bc5d9404b6f423fb59bd71b106
SHA512dc4c0ba581e627670994b0cf34250fac069271f5bdf750f31479de32d446ec22ed9171bc2159d72a06a6388cf202176b516473715ae3a7c8dbb12e289637b7af