Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-11-2024 20:21
Behavioral task
behavioral1
Sample
a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe
Resource
win7-20240903-en
General
-
Target
a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe
-
Size
5.2MB
-
MD5
cf4a7182c8b3dcdd1f2e8db2e011c700
-
SHA1
b518086df01053f00e73159ad4b4d6159e608a14
-
SHA256
a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47
-
SHA512
1cbc47bfe21a07246880893b8024813ad368b5f573a351c637d97759dc6dcfe2a495f3b595db6e9d31846ccc5d6b2b71a73be39730e54980fd507c9cbb63a8b7
-
SSDEEP
98304:bnsmtk2aW3KI5OVU8/GsW+exVVxHjkxuiCllBHr8wBo:DLQQ+Urt+eHVxHjqui+r8Ao
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Extracted
njrat
v4.0
HacKed
ecutuning.ddns.net:11560
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
Njrat family
-
Xred family
-
Drops startup file 5 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk paylod.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk paylod.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe svchost.exe -
Executes dropped EXE 8 IoCs
pid Process 1608 ._cache_a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe 3024 Synaptics.exe 1548 ._cache_Synaptics.exe 1648 paylod.exe 1772 paylod.exe 380 Keygen (2).exe 1628 Keygen (2).exe 2844 svchost.exe -
Loads dropped DLL 15 IoCs
pid Process 2204 a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe 2204 a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe 2204 a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe 2204 a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe 3024 Synaptics.exe 3024 Synaptics.exe 3024 Synaptics.exe 1548 ._cache_Synaptics.exe 1548 ._cache_Synaptics.exe 1608 ._cache_a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe 1608 ._cache_a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe 1548 ._cache_Synaptics.exe 1548 ._cache_Synaptics.exe 1608 ._cache_a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe 1608 ._cache_a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Windows\\svchost.exe" paylod.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1608 ._cache_a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe 1548 ._cache_Synaptics.exe 1608 ._cache_a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe 1548 ._cache_Synaptics.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svchost.exe paylod.exe File opened for modification C:\Windows\svchost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keygen (2).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keygen (2).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language paylod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language paylod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2908 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1608 ._cache_a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe 1548 ._cache_Synaptics.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 2844 svchost.exe Token: 33 2844 svchost.exe Token: SeIncBasePriorityPrivilege 2844 svchost.exe Token: 33 2844 svchost.exe Token: SeIncBasePriorityPrivilege 2844 svchost.exe Token: 33 2844 svchost.exe Token: SeIncBasePriorityPrivilege 2844 svchost.exe Token: 33 2844 svchost.exe Token: SeIncBasePriorityPrivilege 2844 svchost.exe Token: 33 2844 svchost.exe Token: SeIncBasePriorityPrivilege 2844 svchost.exe Token: 33 2844 svchost.exe Token: SeIncBasePriorityPrivilege 2844 svchost.exe Token: 33 2844 svchost.exe Token: SeIncBasePriorityPrivilege 2844 svchost.exe Token: 33 2844 svchost.exe Token: SeIncBasePriorityPrivilege 2844 svchost.exe Token: 33 2844 svchost.exe Token: SeIncBasePriorityPrivilege 2844 svchost.exe Token: 33 2844 svchost.exe Token: SeIncBasePriorityPrivilege 2844 svchost.exe Token: 33 2844 svchost.exe Token: SeIncBasePriorityPrivilege 2844 svchost.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1608 ._cache_a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe 1548 ._cache_Synaptics.exe 2908 EXCEL.EXE 380 Keygen (2).exe 1628 Keygen (2).exe 380 Keygen (2).exe 1628 Keygen (2).exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2204 wrote to memory of 1608 2204 a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe 28 PID 2204 wrote to memory of 1608 2204 a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe 28 PID 2204 wrote to memory of 1608 2204 a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe 28 PID 2204 wrote to memory of 1608 2204 a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe 28 PID 2204 wrote to memory of 3024 2204 a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe 29 PID 2204 wrote to memory of 3024 2204 a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe 29 PID 2204 wrote to memory of 3024 2204 a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe 29 PID 2204 wrote to memory of 3024 2204 a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe 29 PID 3024 wrote to memory of 1548 3024 Synaptics.exe 30 PID 3024 wrote to memory of 1548 3024 Synaptics.exe 30 PID 3024 wrote to memory of 1548 3024 Synaptics.exe 30 PID 3024 wrote to memory of 1548 3024 Synaptics.exe 30 PID 1548 wrote to memory of 1648 1548 ._cache_Synaptics.exe 33 PID 1548 wrote to memory of 1648 1548 ._cache_Synaptics.exe 33 PID 1548 wrote to memory of 1648 1548 ._cache_Synaptics.exe 33 PID 1548 wrote to memory of 1648 1548 ._cache_Synaptics.exe 33 PID 1608 wrote to memory of 1772 1608 ._cache_a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe 34 PID 1608 wrote to memory of 1772 1608 ._cache_a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe 34 PID 1608 wrote to memory of 1772 1608 ._cache_a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe 34 PID 1608 wrote to memory of 1772 1608 ._cache_a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe 34 PID 1548 wrote to memory of 1628 1548 ._cache_Synaptics.exe 35 PID 1548 wrote to memory of 1628 1548 ._cache_Synaptics.exe 35 PID 1548 wrote to memory of 1628 1548 ._cache_Synaptics.exe 35 PID 1548 wrote to memory of 1628 1548 ._cache_Synaptics.exe 35 PID 1608 wrote to memory of 380 1608 ._cache_a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe 36 PID 1608 wrote to memory of 380 1608 ._cache_a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe 36 PID 1608 wrote to memory of 380 1608 ._cache_a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe 36 PID 1608 wrote to memory of 380 1608 ._cache_a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe 36 PID 1648 wrote to memory of 2844 1648 paylod.exe 40 PID 1648 wrote to memory of 2844 1648 paylod.exe 40 PID 1648 wrote to memory of 2844 1648 paylod.exe 40 PID 1648 wrote to memory of 2844 1648 paylod.exe 40 PID 1648 wrote to memory of 2088 1648 paylod.exe 41 PID 1648 wrote to memory of 2088 1648 paylod.exe 41 PID 1648 wrote to memory of 2088 1648 paylod.exe 41 PID 1648 wrote to memory of 2088 1648 paylod.exe 41 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2088 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe"C:\Users\Admin\AppData\Local\Temp\a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\._cache_a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\paylod.exe"C:\Users\Admin\AppData\Local\Temp\paylod.exe"3⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1772
-
-
C:\Users\Admin\AppData\Local\Temp\Keygen (2).exe"C:\Users\Admin\AppData\Local\Temp\Keygen (2).exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:380
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\paylod.exe"C:\Users\Admin\AppData\Local\Temp\paylod.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"5⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Windows\svchost.exe"5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2088
-
-
-
C:\Users\Admin\AppData\Local\Temp\Keygen (2).exe"C:\Users\Admin\AppData\Local\Temp\Keygen (2).exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1628
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2908
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD5cf4a7182c8b3dcdd1f2e8db2e011c700
SHA1b518086df01053f00e73159ad4b4d6159e608a14
SHA256a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47
SHA5121cbc47bfe21a07246880893b8024813ad368b5f573a351c637d97759dc6dcfe2a495f3b595db6e9d31846ccc5d6b2b71a73be39730e54980fd507c9cbb63a8b7
-
C:\Users\Admin\AppData\Local\Temp\._cache_a8037ce48676e2bc83b9e00ae1db9871996282d873211dbcb021dd9f44b90c47N.exe
Filesize4.5MB
MD5a26afc4b230cde67dec5e341aef0e90f
SHA1f5a7a08bbd039184c3e89f4ea4ef5eeb392b5fa1
SHA256567c4101aa7ad812b7bd42d87a5ba7d9c4f82dd7096daa7b079cfa70649dec2e
SHA51206e71d53d1e0e0436be193f05c05c8896e9184bfc7db1842195452d34a8c9a59f26b38129a4216eb301c96e367babb8db7b1e50b2a258acc5f0d6c981db4621a
-
Filesize
17KB
MD5af4d37aad8b34471da588360a43e768a
SHA183ed64667d4e68ea531b8bcf58aab3ed4a5ca998
SHA256e7550c3453156531308fda255a198c3710aa4bc7412819c180b103c11e85cef1
SHA51274f5000038c47b7c909c4ee5740e0e87cac12c9c96fff8b1c7ec749541ee3d4b7efd80f9ac02cd39809dca3f2707d0063fa852a3a541342d93a9d03de08823da
-
Filesize
1.7MB
MD591b154d347d471b16c0662f071828792
SHA122ed21e428006595cf0b144492edab06203a7b67
SHA25683f395011aadf443178dc7fdfb4857a61872ab46f7d2eac68905632965706042
SHA51273d20d1b0fbb33136570b80c5a8a850bc278682129e8f59d27f4c166796aa8b82c84df7b7b74c8fb22c9fb2e362d766e88cba0b7e4b452eb269ae60e17d3a921
-
Filesize
26KB
MD5e6149ed0cdf7e22aaa3c79dfc7150900
SHA1d9e1b9e3feff75897030366ba28d2c460374afa2
SHA256b107529ccc4a4ad32ab1bd60ef6ae6b1cebc5e5252c0a6cd53a0cf6028e346d2
SHA512f086c90a52981143e79066482b73c5e673c0e72332f204fa8f33b2ff180dbe52f1ee93bb44a1852d513569c3091ce81ba1185e511e00abdbbe1f2182a853f67e
-
Filesize
1KB
MD5483f86727c45f8708ef5c52cf2ffb202
SHA14a8f1f974de6dc5a4b0d061d31f99e066e274a6e
SHA25638d64461d94b76bfc989857b1e7d90ec6b739aacd5ee97b5510a7851c4623fdd
SHA5127cfe13eb4ba6ebf5a5bd871b9f0ae66c43a8fc31ca175442c76199b28cbf6f3e3ef726dbc01c358ce8a9512c3f0888b0574174b4883decfd5a054523b1519f21
-
Filesize
1022B
MD545a6f40ede1d1b1750641d01aebbbc36
SHA17b032f59ca7967d5bc7017c09cb7fe5199ea1f77
SHA25686c6167b81bcb992c2e403308e53a7d801a3b7b2cbc1245d47704074c5004238
SHA512686969179d56b400a781c5a0a29e60b9802503755df7613a350f19a128b5a6705c44448a8c18ec13bdaf1229b82217a9d11ecd541b48f301a609435f045270c1