Analysis
-
max time kernel
66s -
max time network
69s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
07-11-2024 01:51
Behavioral task
behavioral1
Sample
ratt.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
ratt.exe
-
Size
753KB
-
MD5
b753207b14c635f29b2abf64f603570a
-
SHA1
8a40e828224f22361b09494a556a20db82fc97b9
-
SHA256
7f16106f3354a65fc749737905b77df7bbefa28bf8bbc966dc1f8c53fa4660f2
-
SHA512
0dd32803b95d53badd33c0c84df1002451090ff5f74736680e3a53a0bfc0e723eee7d795626bc10a1fb431de7e6e276c5a66349ef385a8b92b48425b0bdd036f
-
SSDEEP
12288:aMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9IFr:ansJ39LyjbJkQFMhmC+6GD92
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ratt.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4074627901-37362009-3519777259-1000\Control Panel\International\Geo\Nation ratt.exe -
Executes dropped EXE 1 IoCs
Processes:
Synaptics.exepid process 1708 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
ratt.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" ratt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Synaptics.exeratt.exeratt.exeratt.exeratt.exeratt.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ratt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ratt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ratt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ratt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ratt.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 1 IoCs
Processes:
ratt.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ratt.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 644 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
EXCEL.EXEpid process 644 EXCEL.EXE 644 EXCEL.EXE 644 EXCEL.EXE 644 EXCEL.EXE 644 EXCEL.EXE 644 EXCEL.EXE 644 EXCEL.EXE 644 EXCEL.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
ratt.exedescription pid process target process PID 2764 wrote to memory of 1708 2764 ratt.exe Synaptics.exe PID 2764 wrote to memory of 1708 2764 ratt.exe Synaptics.exe PID 2764 wrote to memory of 1708 2764 ratt.exe Synaptics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ratt.exe"C:\Users\Admin\AppData\Local\Temp\ratt.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1708
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:644
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:472
-
C:\Users\Admin\Desktop\ratt.exe"C:\Users\Admin\Desktop\ratt.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3252
-
C:\Users\Admin\Desktop\ratt.exe"C:\Users\Admin\Desktop\ratt.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4080
-
C:\Users\Admin\Desktop\ratt.exe"C:\Users\Admin\Desktop\ratt.exe"1⤵
- System Location Discovery: System Language Discovery
PID:1876
-
C:\Users\Admin\Desktop\ratt.exe"C:\Users\Admin\Desktop\ratt.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753KB
MD5b753207b14c635f29b2abf64f603570a
SHA18a40e828224f22361b09494a556a20db82fc97b9
SHA2567f16106f3354a65fc749737905b77df7bbefa28bf8bbc966dc1f8c53fa4660f2
SHA5120dd32803b95d53badd33c0c84df1002451090ff5f74736680e3a53a0bfc0e723eee7d795626bc10a1fb431de7e6e276c5a66349ef385a8b92b48425b0bdd036f
-
Filesize
23KB
MD5f1c52448f71609746d9385eda9e00a5a
SHA120accb488c29da104e29ccf8154e74699d0ba303
SHA2565e3a278827b682b31254f0bdc17de5ca93cd4931a19c9c8071274610702f3a55
SHA51239ffc9228707b7a7dac2feac1de9e4db1d0dfa925cc6246dc57ef6f5939b32519449fd6c9738c6d1e4037105a54fe553b008f7fc0082dd11ee2d715d0014fe9f
-
Filesize
470B
MD5e3f7ffbef1c036899982e2dffcdc1083
SHA1d7c33e4576e063cddb2a5b6adf28c34f708d0fd3
SHA256ea14c32928f6db451f3287b9c9938669e31de94c9127c751bb5c7879c827ade5
SHA5124aa22d4b9c85cc8a5e887ca33f15f2496cec86e287c90b2cd0279e904aa5ae4c5c9a3fd4b29d9ea7c4cab04bd3f664990af7c23cfc542db822a6ed7df567dd83
-
Filesize
6KB
MD5694ccbefad900cfcb2892276424ac0ad
SHA10f2878177a754b12928c9098edeb10e438fc0f6e
SHA256ac2c34d5f69b42de470209235da5f249ccf99b15a45ca805cc41e9d170bf529c
SHA512b45c0bbe6ca5ca445302757660aa3bf8e217a2716ba8d4a0241eae74794e080d30f86e263c68d90f2cf382640da52fc78b9d11c3bca0617ca5ab0e7351a7d7f3
-
Filesize
1KB
MD5249cf062a84cfb6b1f71d6c3a511efe6
SHA15f41ae3203b65831c354782bc3ac5f66e535c17a
SHA25627b628c0b215488ff161f83819171af36258f2a7643d4bb897c173f00cdf19d8
SHA512a9de21719bc3315fb5492fb76a3592f51d189cb48dfd05ada5fd6731338c07d41fb99afece2b5a109890e646659d7c69eb0df27102f3817c502636ea35b42734
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04