Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
09-11-2024 17:56
Static task
static1
Behavioral task
behavioral1
Sample
a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe
Resource
win7-20241010-en
General
-
Target
a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe
-
Size
4.9MB
-
MD5
6742e83960e0d52f80c5b3a568d46d00
-
SHA1
3bc31e5e4e877228ee51cf7a39a0c9172ff0bf41
-
SHA256
a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77
-
SHA512
8316fd3ef98d95b59118f6dbdb9d5cdc8d31fdd405a7f4ce377ee2e182174c69564d295582b086bfdb61f9282cfd149cf9cd61b89e2de62a6ca549bab10397f5
-
SSDEEP
98304:fP5ZVnOwOdoqUiChfM1cwvCYP5ZVnOwOdoqUiChfM1cwvCr:5ZVn0RUF72LZVn0RUF72S
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2820 powershell.exe 856 powershell.exe -
Executes dropped EXE 4 IoCs
pid Process 2792 ._cache_a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe 572 Synaptics.exe 1632 Synaptics.exe 2308 ._cache_Synaptics.exe -
Loads dropped DLL 4 IoCs
pid Process 2720 a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe 2720 a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe 1632 Synaptics.exe 1632 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\????? = "C:\\ProgramData\\Synaptics\\Synaptics.exe" a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe -
AutoIT Executable 10 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2792-50-0x00000000001A0000-0x0000000000364000-memory.dmp autoit_exe behavioral1/memory/2792-59-0x00000000001A0000-0x0000000000364000-memory.dmp autoit_exe behavioral1/memory/2792-60-0x00000000001A0000-0x0000000000364000-memory.dmp autoit_exe behavioral1/memory/2308-97-0x0000000000F30000-0x00000000010F4000-memory.dmp autoit_exe behavioral1/memory/2308-144-0x0000000000F30000-0x00000000010F4000-memory.dmp autoit_exe behavioral1/memory/2792-145-0x00000000001A0000-0x0000000000364000-memory.dmp autoit_exe behavioral1/memory/2792-149-0x00000000001A0000-0x0000000000364000-memory.dmp autoit_exe behavioral1/memory/2792-152-0x00000000001A0000-0x0000000000364000-memory.dmp autoit_exe behavioral1/memory/2792-183-0x00000000001A0000-0x0000000000364000-memory.dmp autoit_exe behavioral1/memory/2792-185-0x00000000001A0000-0x0000000000364000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2932 set thread context of 2720 2932 a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe 34 PID 572 set thread context of 1632 572 Synaptics.exe 42 -
resource yara_rule behavioral1/files/0x0007000000017021-35.dat upx behavioral1/memory/2792-50-0x00000000001A0000-0x0000000000364000-memory.dmp upx behavioral1/memory/2720-48-0x0000000004AC0000-0x0000000004C84000-memory.dmp upx behavioral1/memory/2792-59-0x00000000001A0000-0x0000000000364000-memory.dmp upx behavioral1/memory/2792-60-0x00000000001A0000-0x0000000000364000-memory.dmp upx behavioral1/memory/2308-97-0x0000000000F30000-0x00000000010F4000-memory.dmp upx behavioral1/memory/2308-144-0x0000000000F30000-0x00000000010F4000-memory.dmp upx behavioral1/memory/2792-145-0x00000000001A0000-0x0000000000364000-memory.dmp upx behavioral1/memory/2792-149-0x00000000001A0000-0x0000000000364000-memory.dmp upx behavioral1/memory/2792-152-0x00000000001A0000-0x0000000000364000-memory.dmp upx behavioral1/memory/2792-183-0x00000000001A0000-0x0000000000364000-memory.dmp upx behavioral1/memory/2792-185-0x00000000001A0000-0x0000000000364000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\root\SecurityCenter2 ._cache_a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2904 schtasks.exe 2176 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1424 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2820 powershell.exe 2792 ._cache_a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe 856 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2792 ._cache_a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2820 powershell.exe Token: SeDebugPrivilege 856 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1424 EXCEL.EXE -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2820 2932 a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe 30 PID 2932 wrote to memory of 2820 2932 a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe 30 PID 2932 wrote to memory of 2820 2932 a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe 30 PID 2932 wrote to memory of 2820 2932 a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe 30 PID 2932 wrote to memory of 2904 2932 a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe 32 PID 2932 wrote to memory of 2904 2932 a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe 32 PID 2932 wrote to memory of 2904 2932 a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe 32 PID 2932 wrote to memory of 2904 2932 a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe 32 PID 2932 wrote to memory of 2720 2932 a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe 34 PID 2932 wrote to memory of 2720 2932 a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe 34 PID 2932 wrote to memory of 2720 2932 a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe 34 PID 2932 wrote to memory of 2720 2932 a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe 34 PID 2932 wrote to memory of 2720 2932 a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe 34 PID 2932 wrote to memory of 2720 2932 a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe 34 PID 2932 wrote to memory of 2720 2932 a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe 34 PID 2932 wrote to memory of 2720 2932 a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe 34 PID 2932 wrote to memory of 2720 2932 a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe 34 PID 2932 wrote to memory of 2720 2932 a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe 34 PID 2932 wrote to memory of 2720 2932 a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe 34 PID 2932 wrote to memory of 2720 2932 a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe 34 PID 2720 wrote to memory of 2792 2720 a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe 35 PID 2720 wrote to memory of 2792 2720 a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe 35 PID 2720 wrote to memory of 2792 2720 a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe 35 PID 2720 wrote to memory of 2792 2720 a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe 35 PID 2720 wrote to memory of 572 2720 a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe 36 PID 2720 wrote to memory of 572 2720 a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe 36 PID 2720 wrote to memory of 572 2720 a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe 36 PID 2720 wrote to memory of 572 2720 a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe 36 PID 572 wrote to memory of 856 572 Synaptics.exe 38 PID 572 wrote to memory of 856 572 Synaptics.exe 38 PID 572 wrote to memory of 856 572 Synaptics.exe 38 PID 572 wrote to memory of 856 572 Synaptics.exe 38 PID 572 wrote to memory of 2176 572 Synaptics.exe 40 PID 572 wrote to memory of 2176 572 Synaptics.exe 40 PID 572 wrote to memory of 2176 572 Synaptics.exe 40 PID 572 wrote to memory of 2176 572 Synaptics.exe 40 PID 572 wrote to memory of 1632 572 Synaptics.exe 42 PID 572 wrote to memory of 1632 572 Synaptics.exe 42 PID 572 wrote to memory of 1632 572 Synaptics.exe 42 PID 572 wrote to memory of 1632 572 Synaptics.exe 42 PID 572 wrote to memory of 1632 572 Synaptics.exe 42 PID 572 wrote to memory of 1632 572 Synaptics.exe 42 PID 572 wrote to memory of 1632 572 Synaptics.exe 42 PID 572 wrote to memory of 1632 572 Synaptics.exe 42 PID 572 wrote to memory of 1632 572 Synaptics.exe 42 PID 572 wrote to memory of 1632 572 Synaptics.exe 42 PID 572 wrote to memory of 1632 572 Synaptics.exe 42 PID 572 wrote to memory of 1632 572 Synaptics.exe 42 PID 1632 wrote to memory of 2308 1632 Synaptics.exe 43 PID 1632 wrote to memory of 2308 1632 Synaptics.exe 43 PID 1632 wrote to memory of 2308 1632 Synaptics.exe 43 PID 1632 wrote to memory of 2308 1632 Synaptics.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe"C:\Users\Admin\AppData\Local\Temp\a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\YlHxWzZtqvwE.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YlHxWzZtqvwE" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB673.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2904
-
-
C:\Users\Admin\AppData\Local\Temp\a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe"C:\Users\Admin\AppData\Local\Temp\a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\._cache_a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2792
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\YlHxWzZtqvwE.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:856
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YlHxWzZtqvwE" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF1FD.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2176
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2308
-
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1424
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.9MB
MD56742e83960e0d52f80c5b3a568d46d00
SHA13bc31e5e4e877228ee51cf7a39a0c9172ff0bf41
SHA256a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77
SHA5128316fd3ef98d95b59118f6dbdb9d5cdc8d31fdd405a7f4ce377ee2e182174c69564d295582b086bfdb61f9282cfd149cf9cd61b89e2de62a6ca549bab10397f5
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
22KB
MD5b0fd460d8f2cee7fb6597b86c5ab7dfb
SHA1a1a47d52c5badb118c624dbfa351923a73270cd6
SHA256bced8ddb93c54144a378aa4285309e27746d418a506077fa77415ee743cc4c39
SHA5123243222e91abbda47c4af7059a94ed1dd3d23b6fbe3282a5fd5740130722bf84b4bbda91c76280009ffc277c2be2bba92a201d47e606d347c4203021b37444c0
-
Filesize
1KB
MD5ad5a2b7076593e3b452999c6e57aebf3
SHA1e32f7db14cc3a585153d6bfb72e051d3fb41284c
SHA2561b596ebfbcfac76248ab829ca27654e781e7d20f2ad9ae80ac46cd81685ceecb
SHA51219e63ee0ccb9dbe6eef834c416b1ff95d806e683602068a2a5837f7d0670f519d488375504c2b205275b9ca611cac9b5b31544ba85fc53070c35fc70cc05bdc4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5d342aadf00b3ee91f814a9ef49a0952f
SHA1ade55a1f51d3e571de5fed0ffb552994a527f38e
SHA2562f7874d03c70b9d11c3b2aa06b2ff0a3aae0b1975ec22416bec7dcd546584793
SHA512814df53b9884a3f543de93b19d9cfb27c314d1cba16fb99f63867d2a0836147d6cd848eda487fb82f1f90421dda97df8ddb8b1b0203123c92f2a7670b03d477f
-
\Users\Admin\AppData\Local\Temp\._cache_a0d2f7f30bde664be9d9d7143c5b22540bc0866c3e3b53d663361c6877650d77N.exe
Filesize808KB
MD5c034089f99b9eaf0da25e21400b6b8a5
SHA10b4b67813258f9ce7d194501607a5c5614edba2d
SHA256f99fd3de760f23f1c7aa83129e351b3666ee28d53876ed76f940d7b46dd695aa
SHA5121a3f904bde26153a9d50e3d93461d215ffcafa014bc74aade389981a15e48fe98c9841b932c2b920b07146d7d654b1ceb53b9ba9f0273977be484904c90f4fbb