Analysis
-
max time kernel
112s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 13:49
Behavioral task
behavioral1
Sample
dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe
Resource
win10v2004-20241007-en
General
-
Target
dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe
-
Size
4.0MB
-
MD5
76b1f7cd85f32223befc3df58fe3c680
-
SHA1
764196098c9ec3991d8a8d923efb903a6c6b4b88
-
SHA256
dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45
-
SHA512
1dc282eda022383df2a700f4bb69ec7ce2c5dfd566b609c1c0341546a31ffc2eaf877a2fa8da81b83e655732901eb42d34969f8d6731b220b83ab4928c89974d
-
SSDEEP
98304:Cnsmtk2amtLutqgwh4NYxtJpkxhGb3331b:MLWxOxtJahCb
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 736 ._cache_dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe 4032 Synaptics.exe 5000 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 216 wrote to memory of 736 216 dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe 87 PID 216 wrote to memory of 736 216 dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe 87 PID 216 wrote to memory of 736 216 dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe 87 PID 216 wrote to memory of 4032 216 dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe 88 PID 216 wrote to memory of 4032 216 dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe 88 PID 216 wrote to memory of 4032 216 dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe 88 PID 4032 wrote to memory of 5000 4032 Synaptics.exe 90 PID 4032 wrote to memory of 5000 4032 Synaptics.exe 90 PID 4032 wrote to memory of 5000 4032 Synaptics.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe"C:\Users\Admin\AppData\Local\Temp\dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\._cache_dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:736
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5000
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD576b1f7cd85f32223befc3df58fe3c680
SHA1764196098c9ec3991d8a8d923efb903a6c6b4b88
SHA256dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45
SHA5121dc282eda022383df2a700f4bb69ec7ce2c5dfd566b609c1c0341546a31ffc2eaf877a2fa8da81b83e655732901eb42d34969f8d6731b220b83ab4928c89974d
-
C:\Users\Admin\AppData\Local\Temp\._cache_dc6099f18e478f2fc415c06019c64a2d4d1f81abb8dd8f18b1a0a3a29e7d2a45N.exe
Filesize3.3MB
MD5184ee15ecf2a52a5a2adb41bfd3e593d
SHA14565b8e2cbe0225b88724694d5ec06e5a57eac50
SHA25698d753771f822e72422e6b13d860659ddbb3ac7faba203e4a06b753af16ca918
SHA512d42ce7582d5e31c03d3cdfdd5132d40e469ae5f5d1b6bba2043561b1878a85126c185999295524692eb494ce628ab63ae476c32f8bb1ede444f16e9768670460