Analysis
-
max time kernel
112s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 05:13
Behavioral task
behavioral1
Sample
23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923.exe
Resource
win10v2004-20241007-en
General
-
Target
23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923.exe
-
Size
6.5MB
-
MD5
66bcf50be9c6bbabed2ca19c2b64b8a3
-
SHA1
6398f759d71b771c7051cdd25d8c881c73f598c3
-
SHA256
23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923
-
SHA512
68cbc0e273fc9c5f1741f6d264b154a6b6a06be87f9e33f7c2ddd15001a17d18cbbb0243edf65a7c8766a5d1c5ea917854ccef7aa0defb32c1880f59d871f6f2
-
SSDEEP
98304:ansmtk2afBa/eaDz7w3zdnYwPccKfHPqtRzIL6VaL7LahgUtb9khmC9618IB4tkK:UL2Ba3z03+O1KfuNVa/Gycb2D94J4OK
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923.exeSynaptics.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
Processes:
._cache_23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923.exeSynaptics.exe._cache_Synaptics.exepid process 2856 ._cache_23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923.exe 2268 Synaptics.exe 2000 ._cache_Synaptics.exe -
Loads dropped DLL 6 IoCs
Processes:
._cache_23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923.exe._cache_Synaptics.exepid process 2856 ._cache_23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923.exe 2000 ._cache_Synaptics.exe 2000 ._cache_Synaptics.exe 2856 ._cache_23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923.exe 2000 ._cache_Synaptics.exe 2000 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923.exe._cache_23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923.exeSynaptics.exe._cache_Synaptics.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
Processes:
23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923.exeSynaptics.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 4176 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
EXCEL.EXEpid process 4176 EXCEL.EXE 4176 EXCEL.EXE 4176 EXCEL.EXE 4176 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923.exeSynaptics.exedescription pid process target process PID 3224 wrote to memory of 2856 3224 23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923.exe ._cache_23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923.exe PID 3224 wrote to memory of 2856 3224 23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923.exe ._cache_23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923.exe PID 3224 wrote to memory of 2856 3224 23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923.exe ._cache_23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923.exe PID 3224 wrote to memory of 2268 3224 23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923.exe Synaptics.exe PID 3224 wrote to memory of 2268 3224 23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923.exe Synaptics.exe PID 3224 wrote to memory of 2268 3224 23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923.exe Synaptics.exe PID 2268 wrote to memory of 2000 2268 Synaptics.exe ._cache_Synaptics.exe PID 2268 wrote to memory of 2000 2268 Synaptics.exe ._cache_Synaptics.exe PID 2268 wrote to memory of 2000 2268 Synaptics.exe ._cache_Synaptics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923.exe"C:\Users\Admin\AppData\Local\Temp\23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\._cache_23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923.exe"C:\Users\Admin\AppData\Local\Temp\._cache_23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2856
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2000
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.5MB
MD566bcf50be9c6bbabed2ca19c2b64b8a3
SHA16398f759d71b771c7051cdd25d8c881c73f598c3
SHA25623de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923
SHA51268cbc0e273fc9c5f1741f6d264b154a6b6a06be87f9e33f7c2ddd15001a17d18cbbb0243edf65a7c8766a5d1c5ea917854ccef7aa0defb32c1880f59d871f6f2
-
C:\Users\Admin\AppData\Local\Temp\._cache_23de2ff140b880d156bb16b821d92bb464f3eb33ffbeac198587b7a95f783923.exe
Filesize5.8MB
MD58cc39739b5418a1bbde9684807376325
SHA1232794de7993036c4cad65a1936c1fb341da7b37
SHA25645529eeaac3e24fcd31cb392dc66058dab4f13cce1462c129606aa01c7c66755
SHA512010ee6e2cd656d5b191d1aa5360551facb230605153d879c62de2eff009fd01dd43d525cc81c5fc796892a5507799e5cf70fbc8297e4c21ea4693bece459de5e
-
Filesize
17KB
MD5af4d37aad8b34471da588360a43e768a
SHA183ed64667d4e68ea531b8bcf58aab3ed4a5ca998
SHA256e7550c3453156531308fda255a198c3710aa4bc7412819c180b103c11e85cef1
SHA51274f5000038c47b7c909c4ee5740e0e87cac12c9c96fff8b1c7ec749541ee3d4b7efd80f9ac02cd39809dca3f2707d0063fa852a3a541342d93a9d03de08823da
-
Filesize
11KB
MD5cd0664e18c7c4587f9a61be1dd534e22
SHA1ceb2cc7dd87e0221ce8a0bff87c010174c3113e8
SHA25663ddd3d99e919f0d27e0c438c9798ba8307f00ad439b3620e03b7badc6f728ff
SHA512dec32d8f95f15a92f33fb12a65c1e45a3799d1ce6957fa6aa71f5f454fca572d1cb97fff011774bc7b2f4bac9d7da557abe95d4a994dabde9541aa1178766e44
-
Filesize
9KB
MD57bdc263925cc66ffbfe5818bdf75db92
SHA1ce4fd90b133a984b00066b16ea7a990be55f5e2d
SHA256717f0c111a9eba8bc06ce7b5e8ca50f55e2bf9a136d5867b7e46ca5709ff83f3
SHA512a4989529dc8f76bf4d5b12542e4d3ab754050ad7d97fe69e4c24504ee0b444a729bdb32c25722800ce2a1a0263c2f35ab3e32e6d7aac12e4244a8dec0dc1c9fb
-
Filesize
5KB
MD58f1c566e12153e91d4a7319892a122a5
SHA1cf2e091b6b7117bf2c4642cfd549c5a8463eb397
SHA256012662cfbb6bfbabca4d5cc3a5904a230d199c29a98b63b5b240aebba3dab9c9
SHA51296a3d36aaf9961c7af1c107df08af2231025f9852c1ad15556c00f2361b1e4772e1a9929890bbdd82d23014dffa3364bc7ee278cc80d3d692c3c47d8d406dd33