Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2024 03:15
Behavioral task
behavioral1
Sample
Munzy Temp Spoofer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Munzy Temp Spoofer.exe
Resource
win10v2004-20241007-en
General
-
Target
Munzy Temp Spoofer.exe
-
Size
1.1MB
-
MD5
9ecc5c00e6ef385d71f87f66da559241
-
SHA1
f0f1bec3a9ae9214bb2daa3574f6dd064f6c2451
-
SHA256
f5855524bf79d214423b91be83872ebf9674fe277175b6ab28b6c48be3d07f3e
-
SHA512
b8cd2b51a42d30257b9bbf3cec0326ed933d1f0a1a824159551b92d244d6d3790bbb1b0e465bfa6a7251c7e95a7eedbb2eddc2d4635a89a248a95088b3865dc1
-
SSDEEP
24576:onsJ39LyjbJkQFMhmC+6GD9tMhriNgMJ+/n:onsHyjtk2MYC5GDkhriin
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Munzy Temp Spoofer.exeSynaptics.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Munzy Temp Spoofer.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
Processes:
._cache_Munzy Temp Spoofer.exeSynaptics.exe._cache_Synaptics.exepid Process 2616 ._cache_Munzy Temp Spoofer.exe 1668 Synaptics.exe 4884 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Munzy Temp Spoofer.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" Munzy Temp Spoofer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Synaptics.exeMunzy Temp Spoofer.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Munzy Temp Spoofer.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
Processes:
Munzy Temp Spoofer.exeSynaptics.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Munzy Temp Spoofer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 4840 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
._cache_Munzy Temp Spoofer.exe._cache_Synaptics.exedescription pid Process Token: SeDebugPrivilege 2616 ._cache_Munzy Temp Spoofer.exe Token: SeDebugPrivilege 4884 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
EXCEL.EXEpid Process 4840 EXCEL.EXE 4840 EXCEL.EXE 4840 EXCEL.EXE 4840 EXCEL.EXE 4840 EXCEL.EXE 4840 EXCEL.EXE 4840 EXCEL.EXE 4840 EXCEL.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
Munzy Temp Spoofer.exeSynaptics.exedescription pid Process procid_target PID 1176 wrote to memory of 2616 1176 Munzy Temp Spoofer.exe 84 PID 1176 wrote to memory of 2616 1176 Munzy Temp Spoofer.exe 84 PID 1176 wrote to memory of 1668 1176 Munzy Temp Spoofer.exe 85 PID 1176 wrote to memory of 1668 1176 Munzy Temp Spoofer.exe 85 PID 1176 wrote to memory of 1668 1176 Munzy Temp Spoofer.exe 85 PID 1668 wrote to memory of 4884 1668 Synaptics.exe 86 PID 1668 wrote to memory of 4884 1668 Synaptics.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Munzy Temp Spoofer.exe"C:\Users\Admin\AppData\Local\Temp\Munzy Temp Spoofer.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\._cache_Munzy Temp Spoofer.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Munzy Temp Spoofer.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4884
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4840
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD59ecc5c00e6ef385d71f87f66da559241
SHA1f0f1bec3a9ae9214bb2daa3574f6dd064f6c2451
SHA256f5855524bf79d214423b91be83872ebf9674fe277175b6ab28b6c48be3d07f3e
SHA512b8cd2b51a42d30257b9bbf3cec0326ed933d1f0a1a824159551b92d244d6d3790bbb1b0e465bfa6a7251c7e95a7eedbb2eddc2d4635a89a248a95088b3865dc1
-
Filesize
404KB
MD55943152febf4a8f81d10761dae44b013
SHA1ed988f1166c47c098d45d78df08e94357dfd589e
SHA25604772a59466564dabfcc0213fa6c86088f20f3ffa39c7f06c1f24d132ce19b78
SHA512ac818af07ebaa435dd9aeba9941de83e6c5472aca750a0ce67f1375b9e74146927c07a56737f49ec33b1b587e7cac78f44374d51fbff36cd86f19c797355d0d6
-
Filesize
22KB
MD53848cb58186d14297cc7c45cf2a0d78b
SHA18e787171bc32cabd24f6392567d08853141b0797
SHA2564dbf8d7691f6dcd73524734ce740184f9e232520291d836cc80375273d025285
SHA51285af83c2413bf310097b62b54a6ab4b0bcb3347e02a8287b62a704e2fe82f4a3081f78fd88b8f835175e6e8c2421049ff8e84a6ef1fbb473ce6ea613ea79c1b4
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04