Analysis
-
max time kernel
112s -
max time network
103s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16-11-2024 03:04
Behavioral task
behavioral1
Sample
24c16ef46a0314d0877317d87f55e226e88c66a2842d09052175795ddb09ad92N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
24c16ef46a0314d0877317d87f55e226e88c66a2842d09052175795ddb09ad92N.exe
Resource
win10v2004-20241007-en
General
-
Target
24c16ef46a0314d0877317d87f55e226e88c66a2842d09052175795ddb09ad92N.exe
-
Size
832KB
-
MD5
ca36e1d2e23a63107904f1590ae87cf0
-
SHA1
fe08e68d52e0c7ccbe8b687e1053f16f0fda45d7
-
SHA256
24c16ef46a0314d0877317d87f55e226e88c66a2842d09052175795ddb09ad92
-
SHA512
5802641ef67b1445960d70e47ae3aeb84c9f9344ff61988efd7aacf56add1ac59255c827a68128644e86bb3145c0bbd853d437b69d0a4f40465e64160040a4dc
-
SSDEEP
12288:0MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9ylQG3QG:0nsJ39LyjbJkQFMhmC+6GD9Gf3x
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2916 ._cache_24c16ef46a0314d0877317d87f55e226e88c66a2842d09052175795ddb09ad92N.exe 3020 Synaptics.exe 2500 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 2548 24c16ef46a0314d0877317d87f55e226e88c66a2842d09052175795ddb09ad92N.exe 2548 24c16ef46a0314d0877317d87f55e226e88c66a2842d09052175795ddb09ad92N.exe 2548 24c16ef46a0314d0877317d87f55e226e88c66a2842d09052175795ddb09ad92N.exe 3020 Synaptics.exe 3020 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 24c16ef46a0314d0877317d87f55e226e88c66a2842d09052175795ddb09ad92N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24c16ef46a0314d0877317d87f55e226e88c66a2842d09052175795ddb09ad92N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2508 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2508 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2916 2548 24c16ef46a0314d0877317d87f55e226e88c66a2842d09052175795ddb09ad92N.exe 30 PID 2548 wrote to memory of 2916 2548 24c16ef46a0314d0877317d87f55e226e88c66a2842d09052175795ddb09ad92N.exe 30 PID 2548 wrote to memory of 2916 2548 24c16ef46a0314d0877317d87f55e226e88c66a2842d09052175795ddb09ad92N.exe 30 PID 2548 wrote to memory of 2916 2548 24c16ef46a0314d0877317d87f55e226e88c66a2842d09052175795ddb09ad92N.exe 30 PID 2548 wrote to memory of 3020 2548 24c16ef46a0314d0877317d87f55e226e88c66a2842d09052175795ddb09ad92N.exe 32 PID 2548 wrote to memory of 3020 2548 24c16ef46a0314d0877317d87f55e226e88c66a2842d09052175795ddb09ad92N.exe 32 PID 2548 wrote to memory of 3020 2548 24c16ef46a0314d0877317d87f55e226e88c66a2842d09052175795ddb09ad92N.exe 32 PID 2548 wrote to memory of 3020 2548 24c16ef46a0314d0877317d87f55e226e88c66a2842d09052175795ddb09ad92N.exe 32 PID 3020 wrote to memory of 2500 3020 Synaptics.exe 33 PID 3020 wrote to memory of 2500 3020 Synaptics.exe 33 PID 3020 wrote to memory of 2500 3020 Synaptics.exe 33 PID 3020 wrote to memory of 2500 3020 Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\24c16ef46a0314d0877317d87f55e226e88c66a2842d09052175795ddb09ad92N.exe"C:\Users\Admin\AppData\Local\Temp\24c16ef46a0314d0877317d87f55e226e88c66a2842d09052175795ddb09ad92N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\._cache_24c16ef46a0314d0877317d87f55e226e88c66a2842d09052175795ddb09ad92N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_24c16ef46a0314d0877317d87f55e226e88c66a2842d09052175795ddb09ad92N.exe"2⤵
- Executes dropped EXE
PID:2916
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2500
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
832KB
MD5ca36e1d2e23a63107904f1590ae87cf0
SHA1fe08e68d52e0c7ccbe8b687e1053f16f0fda45d7
SHA25624c16ef46a0314d0877317d87f55e226e88c66a2842d09052175795ddb09ad92
SHA5125802641ef67b1445960d70e47ae3aeb84c9f9344ff61988efd7aacf56add1ac59255c827a68128644e86bb3145c0bbd853d437b69d0a4f40465e64160040a4dc
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
27KB
MD56c924ddef0d8f4094aa1dfa34a4e1622
SHA1ad005cfca68e7722032ae6eb97f711bcd820c2ce
SHA2562275d030c147df8f50fa2269dd436b7cdd03c2fe31e97a0f26ab8ad256e3f58e
SHA51250c73df2868cb55153173e92b006cf17bbe6aa685daf274070b00596f2a15a5b06f5dd08b77f872a64e89a86db80ba1b100f2e10d471151af11190caf5ca39e5
-
Filesize
28KB
MD5096523f6e99358df37b7c170a14aa59c
SHA19bad9fd51204dc1a4a086c2d585be37c1593f87e
SHA25619cd1de9e9e8bf2233165d4e70ea2e7f27b137839801f1c9364ed8766a264304
SHA512cd4e82a1f13c67ca0905c9c32de46916509fe0660e6e285e749cb49adc37dbcaeb1930043813699a4105f34d3d06b5a00b0a9083c81344273d392ffd5566185d
-
Filesize
29KB
MD5bb444b104a290f66f028c528438e0654
SHA167b0d94a2cd0207bbf487550b6bacb6e221a42cc
SHA256966140ca90e609a06f0b526f49f0b7711492fd51bc3d77f1953ac06075d997a0
SHA512391346fa53c12b57149c6f2ed9118012b96b61edb3d6bb1c71af772705c764ee81eb1b9155b9856e09ba6ca2ce8ad53672a3eb26c55ecef68b3b9a0972caf1be
-
\Users\Admin\AppData\Local\Temp\._cache_24c16ef46a0314d0877317d87f55e226e88c66a2842d09052175795ddb09ad92N.exe
Filesize78KB
MD5262fd671d34e41e6cdf4b8ffae4c1011
SHA16f244ef47b797dc21443e6671abe8a8931636edb
SHA256bef10a4fb86619de02eeaacac5b3e8698b5015640dccc885727580525c487855
SHA5128ebb974a4a33a8ce3b49d221c59e31775beb8f1929fecb9a28bad4757227964cc8055b48b7680a8b5176219eb24e193eae05db24a522ed07e30b8873747805b3