Analysis
-
max time kernel
111s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2024 02:46
Behavioral task
behavioral1
Sample
648bada01c407adcea6834df777c56d4d8bde0fb82344a1817bd9de2ee39e4d7N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
648bada01c407adcea6834df777c56d4d8bde0fb82344a1817bd9de2ee39e4d7N.exe
Resource
win10v2004-20241007-en
General
-
Target
648bada01c407adcea6834df777c56d4d8bde0fb82344a1817bd9de2ee39e4d7N.exe
-
Size
1.6MB
-
MD5
a81a4ea2532bfbea0be5001092949550
-
SHA1
eaad2b815247f8197776b7028951ac1b6cbca38c
-
SHA256
648bada01c407adcea6834df777c56d4d8bde0fb82344a1817bd9de2ee39e4d7
-
SHA512
55e5d7514dc698e83a7b87e596f9d4e23a859083984d57b64be7dfd779a8aa743941041d348e0abfe6bb0a8d38227e331c3108a2f64b23d25fe2d79ed4bed979
-
SSDEEP
49152:2nsHyjtk2MYC5GD6WHy3RqxE6pA79zE2CYvwpZer:2nsmtk2a1WHBpAxzE2nYpZer
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 648bada01c407adcea6834df777c56d4d8bde0fb82344a1817bd9de2ee39e4d7N.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 3076 ._cache_648bada01c407adcea6834df777c56d4d8bde0fb82344a1817bd9de2ee39e4d7N.exe 2884 Synaptics.exe 2504 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 648bada01c407adcea6834df777c56d4d8bde0fb82344a1817bd9de2ee39e4d7N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 648bada01c407adcea6834df777c56d4d8bde0fb82344a1817bd9de2ee39e4d7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 648bada01c407adcea6834df777c56d4d8bde0fb82344a1817bd9de2ee39e4d7N.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1928 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1928 EXCEL.EXE 1928 EXCEL.EXE 1928 EXCEL.EXE 1928 EXCEL.EXE 1928 EXCEL.EXE 1928 EXCEL.EXE 1928 EXCEL.EXE 1928 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 592 wrote to memory of 3076 592 648bada01c407adcea6834df777c56d4d8bde0fb82344a1817bd9de2ee39e4d7N.exe 86 PID 592 wrote to memory of 3076 592 648bada01c407adcea6834df777c56d4d8bde0fb82344a1817bd9de2ee39e4d7N.exe 86 PID 592 wrote to memory of 3076 592 648bada01c407adcea6834df777c56d4d8bde0fb82344a1817bd9de2ee39e4d7N.exe 86 PID 592 wrote to memory of 2884 592 648bada01c407adcea6834df777c56d4d8bde0fb82344a1817bd9de2ee39e4d7N.exe 87 PID 592 wrote to memory of 2884 592 648bada01c407adcea6834df777c56d4d8bde0fb82344a1817bd9de2ee39e4d7N.exe 87 PID 592 wrote to memory of 2884 592 648bada01c407adcea6834df777c56d4d8bde0fb82344a1817bd9de2ee39e4d7N.exe 87 PID 2884 wrote to memory of 2504 2884 Synaptics.exe 88 PID 2884 wrote to memory of 2504 2884 Synaptics.exe 88 PID 2884 wrote to memory of 2504 2884 Synaptics.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\648bada01c407adcea6834df777c56d4d8bde0fb82344a1817bd9de2ee39e4d7N.exe"C:\Users\Admin\AppData\Local\Temp\648bada01c407adcea6834df777c56d4d8bde0fb82344a1817bd9de2ee39e4d7N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Users\Admin\AppData\Local\Temp\._cache_648bada01c407adcea6834df777c56d4d8bde0fb82344a1817bd9de2ee39e4d7N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_648bada01c407adcea6834df777c56d4d8bde0fb82344a1817bd9de2ee39e4d7N.exe"2⤵
- Executes dropped EXE
PID:3076
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2504
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5a81a4ea2532bfbea0be5001092949550
SHA1eaad2b815247f8197776b7028951ac1b6cbca38c
SHA256648bada01c407adcea6834df777c56d4d8bde0fb82344a1817bd9de2ee39e4d7
SHA51255e5d7514dc698e83a7b87e596f9d4e23a859083984d57b64be7dfd779a8aa743941041d348e0abfe6bb0a8d38227e331c3108a2f64b23d25fe2d79ed4bed979
-
C:\Users\Admin\AppData\Local\Temp\._cache_648bada01c407adcea6834df777c56d4d8bde0fb82344a1817bd9de2ee39e4d7N.exe
Filesize886KB
MD5f2ba3b2cd8ea279d3a2db38185724b5c
SHA1bc127d8093962d710682aae4dac2a5a1f7f53554
SHA256bf2b96d756eb59f01f587fe58589e68fb9ad536a6569d6d29a48172f55625367
SHA51273ecefa1a4f98b463ae5e07557448cb4dbffad53bd7f0b8b7dc87841b2862a11f0a0b3066073a418841ad9c56fa525e8872207a1bf670f751817f7c0a3990d7d
-
Filesize
25KB
MD534a459e55aad49cd555c79f9e2fae4a7
SHA140b24d72e1e59ce9f155b8fcfd9a842ae9a4aff3
SHA256525fed7d8a8111de78aec4ecd47f1c9bf1d86680063f80423e2d5cbf6b389d53
SHA5123670c4b5765fd5ded43b90073699d43534d51a2ddf558608d2c8bfbc47a1f52385dbfd42d134287c9641d0411117f07f8c4c340d6ae08c65155dfea0ea79df1f
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04