Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
07-11-2024 19:49
Behavioral task
behavioral1
Sample
0e3d51015070410385e1a7929996963c7c11866b23882b552f40bc7ca82ae268.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
0e3d51015070410385e1a7929996963c7c11866b23882b552f40bc7ca82ae268.exe
Resource
win10v2004-20241007-en
General
-
Target
0e3d51015070410385e1a7929996963c7c11866b23882b552f40bc7ca82ae268.exe
-
Size
803KB
-
MD5
c98d6d203770a3eb9ad5589388458a98
-
SHA1
797eff9dc40b183aea7284fa67a64d7b6e35e4ec
-
SHA256
0e3d51015070410385e1a7929996963c7c11866b23882b552f40bc7ca82ae268
-
SHA512
ba1c77ce25743846de00df04f75ce26a767298b466eb90cf00cbade6e1f5138309655d369bbc0e0b7057d6017c75f7760902e206f4c49f3f130b51859c4a3c9a
-
SSDEEP
12288:WMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9kzstd:WnsJ39LyjbJkQFMhmC+6GD9bH
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 5 IoCs
pid Process 2416 ._cache_0e3d51015070410385e1a7929996963c7c11866b23882b552f40bc7ca82ae268.exe 2096 Un_A.exe 2996 Synaptics.exe 2836 ._cache_Synaptics.exe 2972 Un_B.exe -
Loads dropped DLL 7 IoCs
pid Process 2600 0e3d51015070410385e1a7929996963c7c11866b23882b552f40bc7ca82ae268.exe 2416 ._cache_0e3d51015070410385e1a7929996963c7c11866b23882b552f40bc7ca82ae268.exe 2600 0e3d51015070410385e1a7929996963c7c11866b23882b552f40bc7ca82ae268.exe 2600 0e3d51015070410385e1a7929996963c7c11866b23882b552f40bc7ca82ae268.exe 2996 Synaptics.exe 2996 Synaptics.exe 2836 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 0e3d51015070410385e1a7929996963c7c11866b23882b552f40bc7ca82ae268.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e3d51015070410385e1a7929996963c7c11866b23882b552f40bc7ca82ae268.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_0e3d51015070410385e1a7929996963c7c11866b23882b552f40bc7ca82ae268.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Un_A.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Un_B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral1/files/0x000d0000000122de-4.dat nsis_installer_1 behavioral1/files/0x000d0000000122de-4.dat nsis_installer_2 behavioral1/files/0x0008000000016c66-13.dat nsis_installer_2 -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2004 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2004 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2600 wrote to memory of 2416 2600 0e3d51015070410385e1a7929996963c7c11866b23882b552f40bc7ca82ae268.exe 30 PID 2600 wrote to memory of 2416 2600 0e3d51015070410385e1a7929996963c7c11866b23882b552f40bc7ca82ae268.exe 30 PID 2600 wrote to memory of 2416 2600 0e3d51015070410385e1a7929996963c7c11866b23882b552f40bc7ca82ae268.exe 30 PID 2600 wrote to memory of 2416 2600 0e3d51015070410385e1a7929996963c7c11866b23882b552f40bc7ca82ae268.exe 30 PID 2416 wrote to memory of 2096 2416 ._cache_0e3d51015070410385e1a7929996963c7c11866b23882b552f40bc7ca82ae268.exe 31 PID 2416 wrote to memory of 2096 2416 ._cache_0e3d51015070410385e1a7929996963c7c11866b23882b552f40bc7ca82ae268.exe 31 PID 2416 wrote to memory of 2096 2416 ._cache_0e3d51015070410385e1a7929996963c7c11866b23882b552f40bc7ca82ae268.exe 31 PID 2416 wrote to memory of 2096 2416 ._cache_0e3d51015070410385e1a7929996963c7c11866b23882b552f40bc7ca82ae268.exe 31 PID 2600 wrote to memory of 2996 2600 0e3d51015070410385e1a7929996963c7c11866b23882b552f40bc7ca82ae268.exe 32 PID 2600 wrote to memory of 2996 2600 0e3d51015070410385e1a7929996963c7c11866b23882b552f40bc7ca82ae268.exe 32 PID 2600 wrote to memory of 2996 2600 0e3d51015070410385e1a7929996963c7c11866b23882b552f40bc7ca82ae268.exe 32 PID 2600 wrote to memory of 2996 2600 0e3d51015070410385e1a7929996963c7c11866b23882b552f40bc7ca82ae268.exe 32 PID 2996 wrote to memory of 2836 2996 Synaptics.exe 33 PID 2996 wrote to memory of 2836 2996 Synaptics.exe 33 PID 2996 wrote to memory of 2836 2996 Synaptics.exe 33 PID 2996 wrote to memory of 2836 2996 Synaptics.exe 33 PID 2836 wrote to memory of 2972 2836 ._cache_Synaptics.exe 34 PID 2836 wrote to memory of 2972 2836 ._cache_Synaptics.exe 34 PID 2836 wrote to memory of 2972 2836 ._cache_Synaptics.exe 34 PID 2836 wrote to memory of 2972 2836 ._cache_Synaptics.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e3d51015070410385e1a7929996963c7c11866b23882b552f40bc7ca82ae268.exe"C:\Users\Admin\AppData\Local\Temp\0e3d51015070410385e1a7929996963c7c11866b23882b552f40bc7ca82ae268.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\._cache_0e3d51015070410385e1a7929996963c7c11866b23882b552f40bc7ca82ae268.exe"C:\Users\Admin\AppData\Local\Temp\._cache_0e3d51015070410385e1a7929996963c7c11866b23882b552f40bc7ca82ae268.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2096
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_B.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_B.exe" InjUpdate _?=C:\Users\Admin\AppData\Local\Temp\4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2972
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
803KB
MD5c98d6d203770a3eb9ad5589388458a98
SHA1797eff9dc40b183aea7284fa67a64d7b6e35e4ec
SHA2560e3d51015070410385e1a7929996963c7c11866b23882b552f40bc7ca82ae268
SHA512ba1c77ce25743846de00df04f75ce26a767298b466eb90cf00cbade6e1f5138309655d369bbc0e0b7057d6017c75f7760902e206f4c49f3f130b51859c4a3c9a
-
Filesize
24KB
MD5c0c115f806d8af4b65fa6d3dcfeb4cf9
SHA10bef5c0dbab68a3ce5ca5e062444d514562f853e
SHA2563d4574fc26d75fb4c91e2633b4643cc20a0c9ed7507b3a83b3368191a14d4fce
SHA512489c5b6bc2c7616ce418b8528dec9dd32e136d130b826959d52cd8c9667c861ebafea0cd002cddc6121c42fa37715bf69adb3cea33f54cdba3cf6832b7fb3d1f
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
\Users\Admin\AppData\Local\Temp\._cache_0e3d51015070410385e1a7929996963c7c11866b23882b552f40bc7ca82ae268.exe
Filesize50KB
MD50fe26ed6b407606571d9649cd49906d9
SHA1407147133b6f71ac6d600cce01b80b0287ea044a
SHA256c1180bc0ef2471892a977b6aa173cf7d68c2c44146c42c02b5ff52fdd20dcc6d
SHA5127bc60c51de631572a5d2ee45349d30df0a727ee25a8ab51106d73eb7d71b38865e3d99fa92e0d068e0239435fe2fe33d9148c25f1da5665c273965e03317a39c