Analysis
-
max time kernel
142s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 08:47
Behavioral task
behavioral1
Sample
MunzyTempSpoofer.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
MunzyTempSpoofer.exe
Resource
win10v2004-20241007-en
General
-
Target
MunzyTempSpoofer.exe
-
Size
1.1MB
-
MD5
9ecc5c00e6ef385d71f87f66da559241
-
SHA1
f0f1bec3a9ae9214bb2daa3574f6dd064f6c2451
-
SHA256
f5855524bf79d214423b91be83872ebf9674fe277175b6ab28b6c48be3d07f3e
-
SHA512
b8cd2b51a42d30257b9bbf3cec0326ed933d1f0a1a824159551b92d244d6d3790bbb1b0e465bfa6a7251c7e95a7eedbb2eddc2d4635a89a248a95088b3865dc1
-
SSDEEP
24576:onsJ39LyjbJkQFMhmC+6GD9tMhriNgMJ+/n:onsHyjtk2MYC5GDkhriin
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
resource behavioral2/files/0x000c000000023a3c-238.dat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation MunzyTempSpoofer.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 2988 ._cache_MunzyTempSpoofer.exe 4868 Synaptics.exe 3540 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" MunzyTempSpoofer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MunzyTempSpoofer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ MunzyTempSpoofer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4052 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2988 ._cache_MunzyTempSpoofer.exe Token: SeDebugPrivilege 3540 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4052 EXCEL.EXE 4052 EXCEL.EXE 4052 EXCEL.EXE 4052 EXCEL.EXE 4052 EXCEL.EXE 4052 EXCEL.EXE 4052 EXCEL.EXE 4052 EXCEL.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4164 wrote to memory of 2988 4164 MunzyTempSpoofer.exe 88 PID 4164 wrote to memory of 2988 4164 MunzyTempSpoofer.exe 88 PID 4164 wrote to memory of 4868 4164 MunzyTempSpoofer.exe 89 PID 4164 wrote to memory of 4868 4164 MunzyTempSpoofer.exe 89 PID 4164 wrote to memory of 4868 4164 MunzyTempSpoofer.exe 89 PID 4868 wrote to memory of 3540 4868 Synaptics.exe 90 PID 4868 wrote to memory of 3540 4868 Synaptics.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\MunzyTempSpoofer.exe"C:\Users\Admin\AppData\Local\Temp\MunzyTempSpoofer.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\._cache_MunzyTempSpoofer.exe"C:\Users\Admin\AppData\Local\Temp\._cache_MunzyTempSpoofer.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3540
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD59ecc5c00e6ef385d71f87f66da559241
SHA1f0f1bec3a9ae9214bb2daa3574f6dd064f6c2451
SHA256f5855524bf79d214423b91be83872ebf9674fe277175b6ab28b6c48be3d07f3e
SHA512b8cd2b51a42d30257b9bbf3cec0326ed933d1f0a1a824159551b92d244d6d3790bbb1b0e465bfa6a7251c7e95a7eedbb2eddc2d4635a89a248a95088b3865dc1
-
Filesize
404KB
MD55943152febf4a8f81d10761dae44b013
SHA1ed988f1166c47c098d45d78df08e94357dfd589e
SHA25604772a59466564dabfcc0213fa6c86088f20f3ffa39c7f06c1f24d132ce19b78
SHA512ac818af07ebaa435dd9aeba9941de83e6c5472aca750a0ce67f1375b9e74146927c07a56737f49ec33b1b587e7cac78f44374d51fbff36cd86f19c797355d0d6
-
Filesize
24KB
MD57e4c2f29de680b51ec0ee44fc2d3d92f
SHA10689612f25083848dfde476d57c4e77668f4476b
SHA25639b8a6cdefa58b2aac5b2cf038304d6319963dff274fd3593584cdb12b084a60
SHA5127259484db7d6a4b7cc8685492159b3239f851ef470843ecdd185fa53d38a92bdaa9849341c60a3e75cd55d3938623a02311c505ade2bb0e0babe99da97f8adc3
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04