Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:18
Behavioral task
behavioral1
Sample
TempPerm1.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
TempPerm1.exe
Resource
win10v2004-20241007-en
General
-
Target
TempPerm1.exe
-
Size
2.5MB
-
MD5
21f6c0f608202615f141499e0b9238f8
-
SHA1
29b41725e9a3b6f4f4ab3eb4b444c7fa6bfc84ef
-
SHA256
b5b1f5fa5d43d0deddd368f6a16000a21e2fd1b6a7a2616acf0710fd30b7062e
-
SHA512
9221f37decf63c0e814527a96aaba65aa907a62474c631c2f9f1ce0b220f6409614af5d9ca81d956da8bec39eec06cd2eaa3684b22f4398dd411cb7ce2615320
-
SSDEEP
49152:+nsHyjtk2MYC5GDu0C2lkASpEITYbNbNWo4kSH3OqtwImAanC:+nsmtk2aWCKkRpEIT4bNJFY3Oqt6AWC
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Synaptics.exeTempPerm1.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation TempPerm1.exe -
Executes dropped EXE 3 IoCs
Processes:
._cache_TempPerm1.exeSynaptics.exe._cache_Synaptics.exepid Process 3092 ._cache_TempPerm1.exe 4348 Synaptics.exe 3452 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
TempPerm1.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" TempPerm1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
TempPerm1.exe._cache_TempPerm1.exeSynaptics.exe._cache_Synaptics.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempPerm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_TempPerm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 9 IoCs
Processes:
._cache_TempPerm1.exe._cache_Synaptics.exeEXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS ._cache_TempPerm1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer ._cache_TempPerm1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion ._cache_TempPerm1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Modifies registry class 2 IoCs
Processes:
TempPerm1.exeSynaptics.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ TempPerm1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 3152 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
EXCEL.EXEpid Process 3152 EXCEL.EXE 3152 EXCEL.EXE 3152 EXCEL.EXE 3152 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
TempPerm1.exeSynaptics.exedescription pid Process procid_target PID 468 wrote to memory of 3092 468 TempPerm1.exe 86 PID 468 wrote to memory of 3092 468 TempPerm1.exe 86 PID 468 wrote to memory of 3092 468 TempPerm1.exe 86 PID 468 wrote to memory of 4348 468 TempPerm1.exe 87 PID 468 wrote to memory of 4348 468 TempPerm1.exe 87 PID 468 wrote to memory of 4348 468 TempPerm1.exe 87 PID 4348 wrote to memory of 3452 4348 Synaptics.exe 88 PID 4348 wrote to memory of 3452 4348 Synaptics.exe 88 PID 4348 wrote to memory of 3452 4348 Synaptics.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\TempPerm1.exe"C:\Users\Admin\AppData\Local\Temp\TempPerm1.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Users\Admin\AppData\Local\Temp\._cache_TempPerm1.exe"C:\Users\Admin\AppData\Local\Temp\._cache_TempPerm1.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:3092
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:3452
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD521f6c0f608202615f141499e0b9238f8
SHA129b41725e9a3b6f4f4ab3eb4b444c7fa6bfc84ef
SHA256b5b1f5fa5d43d0deddd368f6a16000a21e2fd1b6a7a2616acf0710fd30b7062e
SHA5129221f37decf63c0e814527a96aaba65aa907a62474c631c2f9f1ce0b220f6409614af5d9ca81d956da8bec39eec06cd2eaa3684b22f4398dd411cb7ce2615320
-
Filesize
1.8MB
MD502e2011ab01fac81d4b8b2097f488ca1
SHA15539e5a7b7ee674f06810b9e8d0ba67872491573
SHA256cd7e41494768b82ddb16d6dc97f90f75600424bf18e8b05f5ce007e9d136b38e
SHA51289feb543037b7cb5f999767864741798820f0198995380b348a7e18d6e88209e3fc3a69a5a6dd28f93383a84eb636a3ac3bd5fdf5f2d8f4658a0b91415b90086
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04