Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-11-2024 02:18
Behavioral task
behavioral1
Sample
c2b56b861efbc46fcd214976cc13730f2331baeded24ce888226e3b58550871a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c2b56b861efbc46fcd214976cc13730f2331baeded24ce888226e3b58550871a.exe
Resource
win10v2004-20241007-en
General
-
Target
c2b56b861efbc46fcd214976cc13730f2331baeded24ce888226e3b58550871a.exe
-
Size
785KB
-
MD5
31b1cfc25ec2f832d8fc9680f371f25f
-
SHA1
39ee9cfe77ae4570ba89b1208a7b999beba65988
-
SHA256
c2b56b861efbc46fcd214976cc13730f2331baeded24ce888226e3b58550871a
-
SHA512
4c40128d66217b3ea541eaab4a4124230bf9ed189f18d29e9532d09f62154cf091622c89ce7c69550247794eadc888bbdb7aa25be4107eb565618b970d857d18
-
SSDEEP
12288:GMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9zij:GnsJ39LyjbJkQFMhmC+6GD9S
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
resource behavioral1/files/0x0006000000015fa6-80.dat -
Executes dropped EXE 3 IoCs
pid Process 2804 ._cache_c2b56b861efbc46fcd214976cc13730f2331baeded24ce888226e3b58550871a.exe 1992 Synaptics.exe 2208 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 2984 c2b56b861efbc46fcd214976cc13730f2331baeded24ce888226e3b58550871a.exe 2984 c2b56b861efbc46fcd214976cc13730f2331baeded24ce888226e3b58550871a.exe 2984 c2b56b861efbc46fcd214976cc13730f2331baeded24ce888226e3b58550871a.exe 2984 c2b56b861efbc46fcd214976cc13730f2331baeded24ce888226e3b58550871a.exe 1992 Synaptics.exe 1992 Synaptics.exe 1992 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" c2b56b861efbc46fcd214976cc13730f2331baeded24ce888226e3b58550871a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c2b56b861efbc46fcd214976cc13730f2331baeded24ce888226e3b58550871a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_c2b56b861efbc46fcd214976cc13730f2331baeded24ce888226e3b58550871a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1988 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2804 ._cache_c2b56b861efbc46fcd214976cc13730f2331baeded24ce888226e3b58550871a.exe 2208 ._cache_Synaptics.exe 1988 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2804 2984 c2b56b861efbc46fcd214976cc13730f2331baeded24ce888226e3b58550871a.exe 30 PID 2984 wrote to memory of 2804 2984 c2b56b861efbc46fcd214976cc13730f2331baeded24ce888226e3b58550871a.exe 30 PID 2984 wrote to memory of 2804 2984 c2b56b861efbc46fcd214976cc13730f2331baeded24ce888226e3b58550871a.exe 30 PID 2984 wrote to memory of 2804 2984 c2b56b861efbc46fcd214976cc13730f2331baeded24ce888226e3b58550871a.exe 30 PID 2984 wrote to memory of 1992 2984 c2b56b861efbc46fcd214976cc13730f2331baeded24ce888226e3b58550871a.exe 31 PID 2984 wrote to memory of 1992 2984 c2b56b861efbc46fcd214976cc13730f2331baeded24ce888226e3b58550871a.exe 31 PID 2984 wrote to memory of 1992 2984 c2b56b861efbc46fcd214976cc13730f2331baeded24ce888226e3b58550871a.exe 31 PID 2984 wrote to memory of 1992 2984 c2b56b861efbc46fcd214976cc13730f2331baeded24ce888226e3b58550871a.exe 31 PID 1992 wrote to memory of 2208 1992 Synaptics.exe 32 PID 1992 wrote to memory of 2208 1992 Synaptics.exe 32 PID 1992 wrote to memory of 2208 1992 Synaptics.exe 32 PID 1992 wrote to memory of 2208 1992 Synaptics.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2b56b861efbc46fcd214976cc13730f2331baeded24ce888226e3b58550871a.exe"C:\Users\Admin\AppData\Local\Temp\c2b56b861efbc46fcd214976cc13730f2331baeded24ce888226e3b58550871a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\._cache_c2b56b861efbc46fcd214976cc13730f2331baeded24ce888226e3b58550871a.exe"C:\Users\Admin\AppData\Local\Temp\._cache_c2b56b861efbc46fcd214976cc13730f2331baeded24ce888226e3b58550871a.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2804
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2208
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
785KB
MD531b1cfc25ec2f832d8fc9680f371f25f
SHA139ee9cfe77ae4570ba89b1208a7b999beba65988
SHA256c2b56b861efbc46fcd214976cc13730f2331baeded24ce888226e3b58550871a
SHA5124c40128d66217b3ea541eaab4a4124230bf9ed189f18d29e9532d09f62154cf091622c89ce7c69550247794eadc888bbdb7aa25be4107eb565618b970d857d18
-
Filesize
23KB
MD5b2fa53befce302b09771bfd783306312
SHA137b29684efcd4036f3af9f2c5e8af9975a60c442
SHA256aa00e40f4c91265c31450a910051bd7c822e9b40e649df9fef10352152ee6471
SHA512bcc6808e63a4c83444c196b9b2a6f70903e95500eb53491834d77fd5bb35a3026065d0f0e2b33b73b0b173b5e482dba1a57b7d7b37b5ae9d31876fcfbb67f8fc
-
Filesize
24KB
MD5494f925ad56c766c7579927d61fc784c
SHA1771dcc2d98ff21ceb21c5ec70bfc35e28a68689f
SHA256395b3dac4b518891f023fbc0af6205ad9e5afdf7cc74fe10513e016ce28c6bd8
SHA5126349dc11e4b4f7aac6360636915b439da8d0aa5122e161153df2493b34f561b6740c9e7f43a661b86fb82fb90501ac4948afcf42a10b8deed5123994f158f47a
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
26KB
MD5ad5a3b0c5d76f8e8fb778d820baeeb63
SHA1adfa5ff96fcb8e731c7ff8fd6383ee6a71b916b2
SHA256775e6cec57dde44606dc75fc1baa5d646aa9876b94ea32e793d0d6eb1309aed3
SHA51247aa8bedf50d8da05f66b23830a21d538cfea2068a0f99026c567b32690fb73d813f42721b33a695bb8a677e03e91d619eff4218fa446352ab7826bb710d9faa
-
\Users\Admin\AppData\Local\Temp\._cache_c2b56b861efbc46fcd214976cc13730f2331baeded24ce888226e3b58550871a.exe
Filesize32KB
MD581596a9d8d94dc49eeb3de71773113f9
SHA1e05af6f13a8f979531ac3e3d514e537610a24c9f
SHA256ac083880953c63868065e223dfbcb54272e37161aa7648277fe54d56b9c9f2f3
SHA5120eb973abb349cc5cacd21917198bd7df2f48317b7352f1ef44fde7a1fb3057f1994cff699cb43c6940e60e69713d0a0af1308e641c918e0426ebc04620a806b2