Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:10
Behavioral task
behavioral1
Sample
Temp + Perm (1).exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Temp + Perm (1).exe
Resource
win10v2004-20241007-en
General
-
Target
Temp + Perm (1).exe
-
Size
2.5MB
-
MD5
21f6c0f608202615f141499e0b9238f8
-
SHA1
29b41725e9a3b6f4f4ab3eb4b444c7fa6bfc84ef
-
SHA256
b5b1f5fa5d43d0deddd368f6a16000a21e2fd1b6a7a2616acf0710fd30b7062e
-
SHA512
9221f37decf63c0e814527a96aaba65aa907a62474c631c2f9f1ce0b220f6409614af5d9ca81d956da8bec39eec06cd2eaa3684b22f4398dd411cb7ce2615320
-
SSDEEP
49152:+nsHyjtk2MYC5GDu0C2lkASpEITYbNbNWo4kSH3OqtwImAanC:+nsmtk2aWCKkRpEIT4bNJFY3Oqt6AWC
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Synaptics.exeTemp + Perm (1).exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Temp + Perm (1).exe -
Executes dropped EXE 3 IoCs
Processes:
._cache_Temp + Perm (1).exeSynaptics.exe._cache_Synaptics.exepid Process 440 ._cache_Temp + Perm (1).exe 1404 Synaptics.exe 3368 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Temp + Perm (1).exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" Temp + Perm (1).exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Temp + Perm (1).exe._cache_Temp + Perm (1).exeSynaptics.exe._cache_Synaptics.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Temp + Perm (1).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Temp + Perm (1).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 9 IoCs
Processes:
._cache_Temp + Perm (1).exe._cache_Synaptics.exeEXCEL.EXEdescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer ._cache_Temp + Perm (1).exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS ._cache_Temp + Perm (1).exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion ._cache_Temp + Perm (1).exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 3 IoCs
Processes:
Temp + Perm (1).exeSynaptics.exetaskmgr.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Temp + Perm (1).exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings taskmgr.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 1216 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
taskmgr.exepid Process 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
taskmgr.exedescription pid Process Token: SeDebugPrivilege 936 taskmgr.exe Token: SeSystemProfilePrivilege 936 taskmgr.exe Token: SeCreateGlobalPrivilege 936 taskmgr.exe Token: 33 936 taskmgr.exe Token: SeIncBasePriorityPrivilege 936 taskmgr.exe -
Suspicious use of FindShellTrayWindow 48 IoCs
Processes:
taskmgr.exepid Process 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe -
Suspicious use of SendNotifyMessage 48 IoCs
Processes:
taskmgr.exepid Process 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe 936 taskmgr.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
EXCEL.EXEpid Process 1216 EXCEL.EXE 1216 EXCEL.EXE 1216 EXCEL.EXE 1216 EXCEL.EXE 1216 EXCEL.EXE 1216 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
Temp + Perm (1).exeSynaptics.exedescription pid Process procid_target PID 4628 wrote to memory of 440 4628 Temp + Perm (1).exe 86 PID 4628 wrote to memory of 440 4628 Temp + Perm (1).exe 86 PID 4628 wrote to memory of 440 4628 Temp + Perm (1).exe 86 PID 4628 wrote to memory of 1404 4628 Temp + Perm (1).exe 87 PID 4628 wrote to memory of 1404 4628 Temp + Perm (1).exe 87 PID 4628 wrote to memory of 1404 4628 Temp + Perm (1).exe 87 PID 1404 wrote to memory of 3368 1404 Synaptics.exe 88 PID 1404 wrote to memory of 3368 1404 Synaptics.exe 88 PID 1404 wrote to memory of 3368 1404 Synaptics.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\Temp + Perm (1).exe"C:\Users\Admin\AppData\Local\Temp\Temp + Perm (1).exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\._cache_Temp + Perm (1).exe"C:\Users\Admin\AppData\Local\Temp\._cache_Temp + Perm (1).exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:440
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:3368
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1216
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:936
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD521f6c0f608202615f141499e0b9238f8
SHA129b41725e9a3b6f4f4ab3eb4b444c7fa6bfc84ef
SHA256b5b1f5fa5d43d0deddd368f6a16000a21e2fd1b6a7a2616acf0710fd30b7062e
SHA5129221f37decf63c0e814527a96aaba65aa907a62474c631c2f9f1ce0b220f6409614af5d9ca81d956da8bec39eec06cd2eaa3684b22f4398dd411cb7ce2615320
-
Filesize
1.8MB
MD502e2011ab01fac81d4b8b2097f488ca1
SHA15539e5a7b7ee674f06810b9e8d0ba67872491573
SHA256cd7e41494768b82ddb16d6dc97f90f75600424bf18e8b05f5ce007e9d136b38e
SHA51289feb543037b7cb5f999767864741798820f0198995380b348a7e18d6e88209e3fc3a69a5a6dd28f93383a84eb636a3ac3bd5fdf5f2d8f4658a0b91415b90086
-
Filesize
22KB
MD5285d4701baec9650bd5cb2c3d09ec1b0
SHA1f79af3d8db7f3b16caa746d9ac43c484fd90e7d7
SHA256e0fe17d06d9f8457003bca5e93730a3083af36d44e5fc67c337d0c08f9fae162
SHA51237a82b72202db807eab2feaf4422b9eafc6111130573359e6a2cdf912916dbe89fe4dbe7f788277779a159da1283ebfbc1a5926c4af6fd350d6d61660a066740
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04