Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-11-2024 22:24
Behavioral task
behavioral1
Sample
450e95e5770eed0478ef236077e07e113116bcbce0f7107ff51a41e58c6859fd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
450e95e5770eed0478ef236077e07e113116bcbce0f7107ff51a41e58c6859fd.exe
Resource
win10v2004-20241007-en
General
-
Target
450e95e5770eed0478ef236077e07e113116bcbce0f7107ff51a41e58c6859fd.exe
-
Size
850KB
-
MD5
be78967f31e6d64350527f74126bed00
-
SHA1
e2eeb5fad201f7e3f44e1810ad8d77aa01bcace7
-
SHA256
450e95e5770eed0478ef236077e07e113116bcbce0f7107ff51a41e58c6859fd
-
SHA512
635d0cb68749146c3756ac296459144371fcbe278a1c0bf71de7364d37a535fce5171ea65bf5c634f0e00a3f5ec47ae1795693b8aa8883bb9486d5a1513cbbeb
-
SSDEEP
12288:BMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9OigkI6:BnsJ39LyjbJkQFMhmC+6GD9jgkD
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2880 ._cache_450e95e5770eed0478ef236077e07e113116bcbce0f7107ff51a41e58c6859fd.exe 2768 Synaptics.exe 2776 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 2940 450e95e5770eed0478ef236077e07e113116bcbce0f7107ff51a41e58c6859fd.exe 2940 450e95e5770eed0478ef236077e07e113116bcbce0f7107ff51a41e58c6859fd.exe 2940 450e95e5770eed0478ef236077e07e113116bcbce0f7107ff51a41e58c6859fd.exe 2768 Synaptics.exe 2768 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 450e95e5770eed0478ef236077e07e113116bcbce0f7107ff51a41e58c6859fd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 450e95e5770eed0478ef236077e07e113116bcbce0f7107ff51a41e58c6859fd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_450e95e5770eed0478ef236077e07e113116bcbce0f7107ff51a41e58c6859fd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1940 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1940 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2940 wrote to memory of 2880 2940 450e95e5770eed0478ef236077e07e113116bcbce0f7107ff51a41e58c6859fd.exe 30 PID 2940 wrote to memory of 2880 2940 450e95e5770eed0478ef236077e07e113116bcbce0f7107ff51a41e58c6859fd.exe 30 PID 2940 wrote to memory of 2880 2940 450e95e5770eed0478ef236077e07e113116bcbce0f7107ff51a41e58c6859fd.exe 30 PID 2940 wrote to memory of 2880 2940 450e95e5770eed0478ef236077e07e113116bcbce0f7107ff51a41e58c6859fd.exe 30 PID 2940 wrote to memory of 2768 2940 450e95e5770eed0478ef236077e07e113116bcbce0f7107ff51a41e58c6859fd.exe 31 PID 2940 wrote to memory of 2768 2940 450e95e5770eed0478ef236077e07e113116bcbce0f7107ff51a41e58c6859fd.exe 31 PID 2940 wrote to memory of 2768 2940 450e95e5770eed0478ef236077e07e113116bcbce0f7107ff51a41e58c6859fd.exe 31 PID 2940 wrote to memory of 2768 2940 450e95e5770eed0478ef236077e07e113116bcbce0f7107ff51a41e58c6859fd.exe 31 PID 2768 wrote to memory of 2776 2768 Synaptics.exe 32 PID 2768 wrote to memory of 2776 2768 Synaptics.exe 32 PID 2768 wrote to memory of 2776 2768 Synaptics.exe 32 PID 2768 wrote to memory of 2776 2768 Synaptics.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\450e95e5770eed0478ef236077e07e113116bcbce0f7107ff51a41e58c6859fd.exe"C:\Users\Admin\AppData\Local\Temp\450e95e5770eed0478ef236077e07e113116bcbce0f7107ff51a41e58c6859fd.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\._cache_450e95e5770eed0478ef236077e07e113116bcbce0f7107ff51a41e58c6859fd.exe"C:\Users\Admin\AppData\Local\Temp\._cache_450e95e5770eed0478ef236077e07e113116bcbce0f7107ff51a41e58c6859fd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2880
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2776
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5d72f003eda84a4c18ebb3e1c063eae07
SHA1dc276592840193219c07293021edc12c92196f95
SHA256d4d0a97ef753de04453f8dbf689331d86724370d995a4bb95df65ab6a24eb3de
SHA5128f9eb0d366fc1b90d2812ad139cf9da47e536f0241294b4c758c2199a00362ad02a3c98267c03092491a2aec741c6c7d4c7a34c672294e617375b87e9e041e70
-
Filesize
24KB
MD5670e2140036db9f62766ce684d0692ca
SHA1053661af0c66287b35147f2e1ed70670127039e6
SHA256936c78af7cc38ddee991962b222674bdb518fb9f9d596ea612758ce0e345b3a8
SHA512409e987b4f5338d29f898b315ef717c338b7c007f819b4fc716e66b58fed3f85b09ffe7e350b7028a6164b33f655391c25b7b72a9a2068a12f4b33e625b7e443
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
20KB
MD5016f4afe091912011eb4723925a527ca
SHA129cfdb8aa59841fc35feeca7ccd4a84cd5f3a67f
SHA25693b06bde70de7cbae0fbf0d175f74e781e2d72f0b2bda913130dd48938e4d859
SHA51222b449c4f92a5cb523aaa4bba6715f24b3842c5903b87663bd47b4a719b18c558e9c4ce04574b2d61c06b63c7bbd8dba844212d9fd908084f18582e009a77f5b
-
Filesize
850KB
MD5be78967f31e6d64350527f74126bed00
SHA1e2eeb5fad201f7e3f44e1810ad8d77aa01bcace7
SHA256450e95e5770eed0478ef236077e07e113116bcbce0f7107ff51a41e58c6859fd
SHA512635d0cb68749146c3756ac296459144371fcbe278a1c0bf71de7364d37a535fce5171ea65bf5c634f0e00a3f5ec47ae1795693b8aa8883bb9486d5a1513cbbeb