Analysis
-
max time kernel
111s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 13:49
Behavioral task
behavioral1
Sample
dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe
Resource
win10v2004-20241007-en
General
-
Target
dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe
-
Size
4.0MB
-
MD5
76b1f7cd85f32223befc3df58fe3c680
-
SHA1
764196098c9ec3991d8a8d923efb903a6c6b4b88
-
SHA256
dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45
-
SHA512
1dc282eda022383df2a700f4bb69ec7ce2c5dfd566b609c1c0341546a31ffc2eaf877a2fa8da81b83e655732901eb42d34969f8d6731b220b83ab4928c89974d
-
SSDEEP
98304:Cnsmtk2amtLutqgwh4NYxtJpkxhGb3331b:MLWxOxtJahCb
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
resource behavioral1/files/0x000600000001961c-85.dat -
Executes dropped EXE 3 IoCs
pid Process 1964 ._cache_dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe 2844 Synaptics.exe 2752 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 2776 dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe 2776 dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe 2776 dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe 2844 Synaptics.exe 2844 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2708 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2708 EXCEL.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2776 wrote to memory of 1964 2776 dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe 30 PID 2776 wrote to memory of 1964 2776 dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe 30 PID 2776 wrote to memory of 1964 2776 dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe 30 PID 2776 wrote to memory of 1964 2776 dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe 30 PID 2776 wrote to memory of 1964 2776 dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe 30 PID 2776 wrote to memory of 1964 2776 dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe 30 PID 2776 wrote to memory of 1964 2776 dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe 30 PID 2776 wrote to memory of 2844 2776 dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe 31 PID 2776 wrote to memory of 2844 2776 dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe 31 PID 2776 wrote to memory of 2844 2776 dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe 31 PID 2776 wrote to memory of 2844 2776 dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe 31 PID 2844 wrote to memory of 2752 2844 Synaptics.exe 32 PID 2844 wrote to memory of 2752 2844 Synaptics.exe 32 PID 2844 wrote to memory of 2752 2844 Synaptics.exe 32 PID 2844 wrote to memory of 2752 2844 Synaptics.exe 32 PID 2844 wrote to memory of 2752 2844 Synaptics.exe 32 PID 2844 wrote to memory of 2752 2844 Synaptics.exe 32 PID 2844 wrote to memory of 2752 2844 Synaptics.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe"C:\Users\Admin\AppData\Local\Temp\dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\._cache_dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1964
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2752
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD576b1f7cd85f32223befc3df58fe3c680
SHA1764196098c9ec3991d8a8d923efb903a6c6b4b88
SHA256dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45
SHA5121dc282eda022383df2a700f4bb69ec7ce2c5dfd566b609c1c0341546a31ffc2eaf877a2fa8da81b83e655732901eb42d34969f8d6731b220b83ab4928c89974d
-
Filesize
35KB
MD5a312d1f92d8ba5c51d9e28166a6f6fbd
SHA12fd68ce252bf3374202f7e651895b510a3518c77
SHA2564d68208453faf268f9033f1fd508163c98239681c0255adcfd8e8f49bba82708
SHA512018631685cc49047417c11cc3413b68aead691e3dda832d174ea15f344101897926c005c9c9d524729ee7b9b2a7c2d91381743b76c92d9805556e08300e58690
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
27KB
MD5abf50e854e4126103287da2589d76cca
SHA1c0d43e5aa733c083944bbdf4f9fce8511ca5e6bb
SHA256037d7c5260c5b5b2cb8356471e3f185233c98376b2cd86445130fd6cd7f7571e
SHA51288bffb3a28c1d76050e5930ca387d2ced5332fe632932f22998a41437555cb8ce33c9ea73a00b58c01576b6066d961a47219165acfbc8f7750728cd3e76d312d
-
\Users\Admin\AppData\Local\Temp\._cache_dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe
Filesize3.3MB
MD5184ee15ecf2a52a5a2adb41bfd3e593d
SHA14565b8e2cbe0225b88724694d5ec06e5a57eac50
SHA25698d753771f822e72422e6b13d860659ddbb3ac7faba203e4a06b753af16ca918
SHA512d42ce7582d5e31c03d3cdfdd5132d40e469ae5f5d1b6bba2043561b1878a85126c185999295524692eb494ce628ab63ae476c32f8bb1ede444f16e9768670460