Analysis
-
max time kernel
75s -
max time network
75s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
18-11-2024 08:44
Behavioral task
behavioral1
Sample
Munzy Temp Spoofer.exe
Resource
win11-20241007-en
General
-
Target
Munzy Temp Spoofer.exe
-
Size
1.1MB
-
MD5
9ecc5c00e6ef385d71f87f66da559241
-
SHA1
f0f1bec3a9ae9214bb2daa3574f6dd064f6c2451
-
SHA256
f5855524bf79d214423b91be83872ebf9674fe277175b6ab28b6c48be3d07f3e
-
SHA512
b8cd2b51a42d30257b9bbf3cec0326ed933d1f0a1a824159551b92d244d6d3790bbb1b0e465bfa6a7251c7e95a7eedbb2eddc2d4635a89a248a95088b3865dc1
-
SSDEEP
24576:onsJ39LyjbJkQFMhmC+6GD9tMhriNgMJ+/n:onsHyjtk2MYC5GDkhriin
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
Processes:
._cache_Munzy Temp Spoofer.exeSynaptics.exe._cache_Synaptics.exepid process 3708 ._cache_Munzy Temp Spoofer.exe 2656 Synaptics.exe 820 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Munzy Temp Spoofer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" Munzy Temp Spoofer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Munzy Temp Spoofer.exeSynaptics.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Munzy Temp Spoofer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 3 IoCs
Processes:
Synaptics.exeMiniSearchHost.exeMunzy Temp Spoofer.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Munzy Temp Spoofer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 4344 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
._cache_Munzy Temp Spoofer.exe._cache_Synaptics.exedescription pid process Token: SeDebugPrivilege 3708 ._cache_Munzy Temp Spoofer.exe Token: SeDebugPrivilege 820 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
Processes:
EXCEL.EXEMiniSearchHost.exepid process 4344 EXCEL.EXE 4344 EXCEL.EXE 4344 EXCEL.EXE 4344 EXCEL.EXE 4344 EXCEL.EXE 4344 EXCEL.EXE 4344 EXCEL.EXE 4344 EXCEL.EXE 3816 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
Munzy Temp Spoofer.exeSynaptics.exedescription pid process target process PID 3996 wrote to memory of 3708 3996 Munzy Temp Spoofer.exe ._cache_Munzy Temp Spoofer.exe PID 3996 wrote to memory of 3708 3996 Munzy Temp Spoofer.exe ._cache_Munzy Temp Spoofer.exe PID 3996 wrote to memory of 2656 3996 Munzy Temp Spoofer.exe Synaptics.exe PID 3996 wrote to memory of 2656 3996 Munzy Temp Spoofer.exe Synaptics.exe PID 3996 wrote to memory of 2656 3996 Munzy Temp Spoofer.exe Synaptics.exe PID 2656 wrote to memory of 820 2656 Synaptics.exe ._cache_Synaptics.exe PID 2656 wrote to memory of 820 2656 Synaptics.exe ._cache_Synaptics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Munzy Temp Spoofer.exe"C:\Users\Admin\AppData\Local\Temp\Munzy Temp Spoofer.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\._cache_Munzy Temp Spoofer.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Munzy Temp Spoofer.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3708
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:820
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4344
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD59ecc5c00e6ef385d71f87f66da559241
SHA1f0f1bec3a9ae9214bb2daa3574f6dd064f6c2451
SHA256f5855524bf79d214423b91be83872ebf9674fe277175b6ab28b6c48be3d07f3e
SHA512b8cd2b51a42d30257b9bbf3cec0326ed933d1f0a1a824159551b92d244d6d3790bbb1b0e465bfa6a7251c7e95a7eedbb2eddc2d4635a89a248a95088b3865dc1
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD576fbe77cbc68f3bd5f0decad25775716
SHA12ebc2dea0b2224ea73fb5413d94ad38218122bf3
SHA2568d59129db45c9f234318144380c9d167d89a9faa8e2a6aede9b5a3bcfdf650b6
SHA5121a5d850914bd033defe42de3a333c2a7497927a07289258acd5ec08e973b4ed45030b0f299d6da5bac16ad607ed471b3db52a5c9676a532ecaa0836682618230
-
Filesize
404KB
MD55943152febf4a8f81d10761dae44b013
SHA1ed988f1166c47c098d45d78df08e94357dfd589e
SHA25604772a59466564dabfcc0213fa6c86088f20f3ffa39c7f06c1f24d132ce19b78
SHA512ac818af07ebaa435dd9aeba9941de83e6c5472aca750a0ce67f1375b9e74146927c07a56737f49ec33b1b587e7cac78f44374d51fbff36cd86f19c797355d0d6
-
Filesize
22KB
MD58ea9e76d9471c9200943bb3090b1da4b
SHA15c4e5fdae8fc38ea0aafc18d0e1302cde31d63d8
SHA25633b73f870453042cbfc43a180759536cd97f2791746a8223e25f690bced00372
SHA5129f3d296552250a19ead358b4e67f0d19f4d838cb6707a94f232f8b674174dfa418832bff1db618b417debc56f8de7435e26a8919c13a7b42a975cf8f20af6fa1
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04