Analysis
-
max time kernel
118s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 23:33
Behavioral task
behavioral1
Sample
dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06N.exe
Resource
win10v2004-20241007-en
General
-
Target
dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06N.exe
-
Size
1.3MB
-
MD5
0a4fa68b65129d54274032ef78bcee90
-
SHA1
ae9f495dda5b693c5941510a5ce5dbec9aa7c605
-
SHA256
dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06
-
SHA512
716e78782f31d1bb99c5eae1af575a4f28c9bf34ab6b447c5e5291ef1cd04f309c504658b3fbdd7d3ed7fc90cb5c8446c75e312351978831fd95cf3e04130387
-
SSDEEP
24576:5nsJ39LyjbJkQFMhmC+6GD9v20DvYefzxB0YAEFgXC75ld1qSVpcqE:5nsHyjtk2MYC5GDB24fJd1qapcqE
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06N.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 6 IoCs
pid Process 4956 ._cache_dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06N.exe 4076 ._cache_dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06N.tmp 3836 Synaptics.exe 4572 ._cache_Synaptics.exe 1092 ._cache_Synaptics.tmp 856 ChecksumCalculator.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06N.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files (x86)\Checksum Calculator\is-OLNL0.tmp ._cache_Synaptics.tmp File created C:\Program Files (x86)\Checksum Calculator\is-7L9R4.tmp ._cache_dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06N.tmp File created C:\Program Files (x86)\Checksum Calculator\is-5V9KG.tmp ._cache_Synaptics.tmp File created C:\Program Files (x86)\Checksum Calculator\is-JVUDA.tmp ._cache_dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06N.tmp File opened for modification C:\Program Files (x86)\Checksum Calculator\unins000.dat ._cache_Synaptics.tmp File created C:\Program Files (x86)\Checksum Calculator\unins000.dat ._cache_Synaptics.tmp File created C:\Program Files (x86)\Checksum Calculator\unins001.dat ._cache_dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06N.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ChecksumCalculator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06N.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.tmp -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4224 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1092 ._cache_Synaptics.tmp 4076 ._cache_dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06N.tmp -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4224 EXCEL.EXE 4224 EXCEL.EXE 4224 EXCEL.EXE 4224 EXCEL.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4220 wrote to memory of 4956 4220 dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06N.exe 86 PID 4220 wrote to memory of 4956 4220 dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06N.exe 86 PID 4220 wrote to memory of 4956 4220 dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06N.exe 86 PID 4956 wrote to memory of 4076 4956 ._cache_dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06N.exe 87 PID 4956 wrote to memory of 4076 4956 ._cache_dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06N.exe 87 PID 4956 wrote to memory of 4076 4956 ._cache_dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06N.exe 87 PID 4220 wrote to memory of 3836 4220 dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06N.exe 88 PID 4220 wrote to memory of 3836 4220 dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06N.exe 88 PID 4220 wrote to memory of 3836 4220 dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06N.exe 88 PID 3836 wrote to memory of 4572 3836 Synaptics.exe 89 PID 3836 wrote to memory of 4572 3836 Synaptics.exe 89 PID 3836 wrote to memory of 4572 3836 Synaptics.exe 89 PID 4572 wrote to memory of 1092 4572 ._cache_Synaptics.exe 90 PID 4572 wrote to memory of 1092 4572 ._cache_Synaptics.exe 90 PID 4572 wrote to memory of 1092 4572 ._cache_Synaptics.exe 90 PID 1092 wrote to memory of 856 1092 ._cache_Synaptics.tmp 104 PID 1092 wrote to memory of 856 1092 ._cache_Synaptics.tmp 104 PID 1092 wrote to memory of 856 1092 ._cache_Synaptics.tmp 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06N.exe"C:\Users\Admin\AppData\Local\Temp\dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\._cache_dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\is-VIMII.tmp\._cache_dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06N.tmp"C:\Users\Admin\AppData\Local\Temp\is-VIMII.tmp\._cache_dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06N.tmp" /SL5="$4017E,337902,54272,C:\Users\Admin\AppData\Local\Temp\._cache_dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06N.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:4076
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\is-ARSDI.tmp\._cache_Synaptics.tmp"C:\Users\Admin\AppData\Local\Temp\is-ARSDI.tmp\._cache_Synaptics.tmp" /SL5="$80090,337902,54272,C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Program Files (x86)\Checksum Calculator\ChecksumCalculator.exe"C:\Program Files (x86)\Checksum Calculator\ChecksumCalculator.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:856
-
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
894KB
MD557dea2fb7ccdeb6acf05d55c5ac051d3
SHA172b643e0463e79ee9795a4ba450bc6dadb6a6e17
SHA25657fb00a72c2791f3b9711d032710f851b4b7b33349939d958b1e03e5a727d821
SHA5128260a8abe4b5dfba230bd7c14ff4181c9e26f1dd1d39636ab424ea652b2089b732b0ab099478354bfe40457f9cdc3974c24ea50492c667c903baf162e0c34cb2
-
Filesize
705KB
MD5f67c139adf91e12fd1af5fc775b31e42
SHA1d6dd484ea381972c275f9a119743af563cc526c3
SHA256c86e42c056af7aa54245260e83b9ea6a3a28c87a95edce681f001769bf10ccde
SHA512a2cb1253d9e034b0f78d2068c843df3cb47da7a7f9f6371f93846c842b338e22c8e1454cbc3246f5ad874ef166b06ca25d4c6839af1b918d3a5815fb36a869a1
-
Filesize
1.3MB
MD50a4fa68b65129d54274032ef78bcee90
SHA1ae9f495dda5b693c5941510a5ce5dbec9aa7c605
SHA256dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06
SHA512716e78782f31d1bb99c5eae1af575a4f28c9bf34ab6b447c5e5291ef1cd04f309c504658b3fbdd7d3ed7fc90cb5c8446c75e312351978831fd95cf3e04130387
-
C:\Users\Admin\AppData\Local\Temp\._cache_dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06N.exe
Filesize568KB
MD5bdee7c2788baebdf4c5a217d5c388732
SHA1753b24b1557e53cfe3ccf4b4c8adb72c30ac1aca
SHA2566b3b44ee73983bf60a66c82d0f274002708a99abd9cdb23a9d237c03b5e711d1
SHA512342af8a8273a629d51255d98a3cbd39cb5aa8bd590d77f44c491b084b1ebd7d2cf011e0184f8eefa6b6bdcfcf25e6c99effca42e687ccf3c028b875aa0fd7c52
-
Filesize
17KB
MD5af4d37aad8b34471da588360a43e768a
SHA183ed64667d4e68ea531b8bcf58aab3ed4a5ca998
SHA256e7550c3453156531308fda255a198c3710aa4bc7412819c180b103c11e85cef1
SHA51274f5000038c47b7c909c4ee5740e0e87cac12c9c96fff8b1c7ec749541ee3d4b7efd80f9ac02cd39809dca3f2707d0063fa852a3a541342d93a9d03de08823da
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
C:\Users\Admin\AppData\Local\Temp\is-VIMII.tmp\._cache_dd09ce363101ef13dc72fe7ae9d5731eed2777f248eec37d87bd1efbd3c91a06N.tmp
Filesize695KB
MD5620f32e56b46e90e8aee43febc59f6e3
SHA1d5edd63dd1390a1420b85f746e12a66625ae9354
SHA256bcc9d63213012bf25a37f48015e5f755d359f3b08d05d35319b03b4a72710730
SHA5128a9d2a2eb3891265cec379978399ad6c9b4bf3e12e0f381946b4390621b943b97fa04fbb87ad628652bd765b706eb2ff56001f24de24e9bcc487a59ca2f07d9c