Resubmissions
07-11-2024 01:27
241107-bt6m9ssfrk 10Analysis
-
max time kernel
22s -
max time network
23s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 01:27
Behavioral task
behavioral1
Sample
temp.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
temp.rar
Resource
win10v2004-20241007-en
General
-
Target
temp.rar
-
Size
1.3MB
-
MD5
f301da37cb351e373f8c3743f7db9d9e
-
SHA1
68b99061cf476e4c55c6585e2b13b6af61c5f868
-
SHA256
41209e810ad9088d037c75bd7a62784d456fb7e92cb500aa46eb0e6992e2eed1
-
SHA512
23d84ccb08a0547f8042dd4d443a421db815a25573f6e3024505e90a1040dccc5d260b2af588403746bfb1744757eaa63b2919537b4c0099ee71e86a837a9809
-
SSDEEP
24576:Y1KK6ImbokiLRq3dieSQiua9oc52Eo7+ylHZMFjYJ6aJxyuOIoo9e5F6RsJW:YcCoo5L4Nn/s+lEM+ylGsJ6a+1to9AFk
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Plasma Temp.exeSynaptics.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Plasma Temp.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 4 IoCs
Processes:
Plasma Temp.exe._cache_Plasma Temp.exeSynaptics.exe._cache_Synaptics.exepid process 4700 Plasma Temp.exe 832 ._cache_Plasma Temp.exe 4012 Synaptics.exe 1572 ._cache_Synaptics.exe -
Loads dropped DLL 10 IoCs
Processes:
._cache_Plasma Temp.exeSynaptics.exe._cache_Synaptics.exepid process 832 ._cache_Plasma Temp.exe 832 ._cache_Plasma Temp.exe 4012 Synaptics.exe 4012 Synaptics.exe 1572 ._cache_Synaptics.exe 1572 ._cache_Synaptics.exe 832 ._cache_Plasma Temp.exe 832 ._cache_Plasma Temp.exe 1572 ._cache_Synaptics.exe 1572 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Plasma Temp.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" Plasma Temp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Plasma Temp.exe._cache_Plasma Temp.exeSynaptics.exe._cache_Synaptics.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Plasma Temp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Plasma Temp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 9 IoCs
Processes:
EXCEL.EXE._cache_Plasma Temp.exe._cache_Synaptics.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS ._cache_Plasma Temp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer ._cache_Plasma Temp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion ._cache_Plasma Temp.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Processes:
._cache_Plasma Temp.exe._cache_Synaptics.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\TypedURLs ._cache_Plasma Temp.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\TypedURLs ._cache_Synaptics.exe -
Modifies registry class 2 IoCs
Processes:
Plasma Temp.exeSynaptics.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Plasma Temp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 2232 EXCEL.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
7zFM.exepid process 4876 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
7zFM.exe._cache_Plasma Temp.exe._cache_Synaptics.exedescription pid process Token: SeRestorePrivilege 4876 7zFM.exe Token: 35 4876 7zFM.exe Token: SeSecurityPrivilege 4876 7zFM.exe Token: SeDebugPrivilege 832 ._cache_Plasma Temp.exe Token: SeDebugPrivilege 1572 ._cache_Synaptics.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
7zFM.exepid process 4876 7zFM.exe 4876 7zFM.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
EXCEL.EXEpid process 2232 EXCEL.EXE 2232 EXCEL.EXE 2232 EXCEL.EXE 2232 EXCEL.EXE 2232 EXCEL.EXE 2232 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
Plasma Temp.exeSynaptics.exedescription pid process target process PID 4700 wrote to memory of 832 4700 Plasma Temp.exe ._cache_Plasma Temp.exe PID 4700 wrote to memory of 832 4700 Plasma Temp.exe ._cache_Plasma Temp.exe PID 4700 wrote to memory of 832 4700 Plasma Temp.exe ._cache_Plasma Temp.exe PID 4700 wrote to memory of 4012 4700 Plasma Temp.exe Synaptics.exe PID 4700 wrote to memory of 4012 4700 Plasma Temp.exe Synaptics.exe PID 4700 wrote to memory of 4012 4700 Plasma Temp.exe Synaptics.exe PID 4012 wrote to memory of 1572 4012 Synaptics.exe ._cache_Synaptics.exe PID 4012 wrote to memory of 1572 4012 Synaptics.exe ._cache_Synaptics.exe PID 4012 wrote to memory of 1572 4012 Synaptics.exe ._cache_Synaptics.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\temp.rar"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4876
-
C:\Users\Admin\Desktop\Plasma Temp.exe"C:\Users\Admin\Desktop\Plasma Temp.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\Desktop\._cache_Plasma Temp.exe"C:\Users\Admin\Desktop\._cache_Plasma Temp.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
PID:832
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\Desktop\._cache_Synaptics.exe"C:\Users\Admin\Desktop\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD58040b521b08811cba0160f217d33e75e
SHA101a4bf3a09c3432d983a923c05d63e49bbf440cc
SHA256bf1c5ae8a7e76cad212166628ac7c1f0e6a586a537ebf28e3fb83fb3d0d44bd5
SHA512c24508cd6b21c654dda9be5e8d569770e070172867dc49e29cba66ce11b845e7b026bfb46e15ea11de53aadaf836958d59d9d741fdde1abb262739d67afe8597
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
124KB
MD5a73e87a0ad626312ace6eb56fd8f4133
SHA1e2e803af903fd1f0863952be481106d5a6993646
SHA2561017b3d548aadc0fe735460d50424f2f4d7ac70b506ed8c55d6857a62d83dd9c
SHA5128b5093f20443a730cc51a4d247a5594bd91305ba81ebd9d3f860b49c770c03adb1665e9123e939f1cce4ba8f4d639009c356d6ff98def3ec501459136fc950ad
-
Filesize
2.1MB
MD5c19e9e6a4bc1b668d19505a0437e7f7e
SHA173be712aef4baa6e9dabfc237b5c039f62a847fa
SHA2569ac8b65e5c13292a8e564187c1e7446adc4230228b669383bd7b07035ab99a82
SHA512b6cd0af436459f35a97db2d928120c53d3691533b01e4f0e8b382f2bd81d9a9a2c57e5e2aa6ade9d6a1746d5c4b2ef6c88d3a0cf519424b34445d0d30aab61de
-
Filesize
695KB
MD5195ffb7167db3219b217c4fd439eedd6
SHA11e76e6099570ede620b76ed47cf8d03a936d49f8
SHA256e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d
SHA51256eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac
-
Filesize
877KB
MD544b1e07558fac9c7d26e5d3347afaee7
SHA1220280fee94e17188d027a46b3047b0f8a73a722
SHA256a7db46b0ee6fa42808f35ebc28d8bbeaff7f3f665bec867e8bc9e6916af6e0c6
SHA512df4aa702858deb3fadfecedf0185049bfdd8f66d13ff7e86bd00b111660cf3976b157208e61a71f07dd6cf8dd357ac32364993c86dea6ab9c9f157771a6660c5