Analysis
-
max time kernel
111s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-11-2024 16:24
Behavioral task
behavioral1
Sample
527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exe
Resource
win10v2004-20241007-en
General
-
Target
527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exe
-
Size
975KB
-
MD5
74bf62d0872f462469647645e9c5e4e0
-
SHA1
cfd42b9afc04580ba4773d2988ab6b98094a3d5a
-
SHA256
527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79
-
SHA512
3bbfa4bb8f5ddb0e319a2800ef878c79b2911986321888db2073cccb6c7b906076ff419933c893a68acb949be1bf49f51a5ba975ba584cf3190a973a7000f922
-
SSDEEP
12288:3MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9utQRmA59j:3nsJ39LyjbJkQFMhmC+6GD9oQRJl
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Processes:
resource behavioral1/files/0x000a000000016dbe-107.dat -
Executes dropped EXE 3 IoCs
Processes:
._cache_527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exeSynaptics.exe._cache_Synaptics.exepid Process 2032 ._cache_527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exe 2364 Synaptics.exe 1680 ._cache_Synaptics.exe -
Loads dropped DLL 15 IoCs
Processes:
527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exeSynaptics.exeWerFault.exeWerFault.exepid Process 2904 527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exe 2904 527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exe 2904 527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exe 2364 Synaptics.exe 2364 Synaptics.exe 2444 WerFault.exe 2444 WerFault.exe 2444 WerFault.exe 2444 WerFault.exe 2388 WerFault.exe 2388 WerFault.exe 2388 WerFault.exe 2388 WerFault.exe 2388 WerFault.exe 2444 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 2444 1680 WerFault.exe 30 2388 2032 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
._cache_Synaptics.exeEXCEL.EXE527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exe._cache_527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exeSynaptics.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 2896 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
EXCEL.EXEpid Process 2896 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exeSynaptics.exe._cache_527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exe._cache_Synaptics.exedescription pid Process procid_target PID 2904 wrote to memory of 2032 2904 527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exe 28 PID 2904 wrote to memory of 2032 2904 527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exe 28 PID 2904 wrote to memory of 2032 2904 527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exe 28 PID 2904 wrote to memory of 2032 2904 527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exe 28 PID 2904 wrote to memory of 2364 2904 527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exe 29 PID 2904 wrote to memory of 2364 2904 527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exe 29 PID 2904 wrote to memory of 2364 2904 527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exe 29 PID 2904 wrote to memory of 2364 2904 527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exe 29 PID 2364 wrote to memory of 1680 2364 Synaptics.exe 30 PID 2364 wrote to memory of 1680 2364 Synaptics.exe 30 PID 2364 wrote to memory of 1680 2364 Synaptics.exe 30 PID 2364 wrote to memory of 1680 2364 Synaptics.exe 30 PID 2032 wrote to memory of 2388 2032 ._cache_527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exe 32 PID 2032 wrote to memory of 2388 2032 ._cache_527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exe 32 PID 2032 wrote to memory of 2388 2032 ._cache_527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exe 32 PID 2032 wrote to memory of 2388 2032 ._cache_527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exe 32 PID 1680 wrote to memory of 2444 1680 ._cache_Synaptics.exe 33 PID 1680 wrote to memory of 2444 1680 ._cache_Synaptics.exe 33 PID 1680 wrote to memory of 2444 1680 ._cache_Synaptics.exe 33 PID 1680 wrote to memory of 2444 1680 ._cache_Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exe"C:\Users\Admin\AppData\Local\Temp\527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\._cache_527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 6523⤵
- Loads dropped DLL
- Program crash
PID:2388
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 6564⤵
- Loads dropped DLL
- Program crash
PID:2444
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
975KB
MD574bf62d0872f462469647645e9c5e4e0
SHA1cfd42b9afc04580ba4773d2988ab6b98094a3d5a
SHA256527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79
SHA5123bbfa4bb8f5ddb0e319a2800ef878c79b2911986321888db2073cccb6c7b906076ff419933c893a68acb949be1bf49f51a5ba975ba584cf3190a973a7000f922
-
C:\Users\Admin\AppData\Local\Temp\._cache_527b317e120f7962291d30cf4e3ea9f8915556b6d4a36ca6b17aa286cf6f8e79N.exe
Filesize222KB
MD5d350e49da604c5f53bce1f42165020d5
SHA172768ed76cfc1aeb6698333578ab14b97ccf390c
SHA256b000ce156594deb2e723542c04fe45e8814c5c927fd7402c19f813ce0f78a1cc
SHA512b4a4b0aed33b020d5474c2acdf0aca11e1a8971037454d10e494fff32c5658208e78692b4db15ab1f47f84506d3a7db61b654d5dd80341627aaba2c264e2a3c5
-
Filesize
23KB
MD5ff5a4a3355103b92f0dc77d1f2f33a18
SHA152009eb2e4c99ce938248a8905b3d0e0bf30180e
SHA2568f0569b8ccae9db81a65a6726511924e5a0c283f632947113f9df88ef39b4a4d
SHA5128924dd0219aa613b5858fe084d15485a00013d925cd6b70d6b372f14a228b938ba5979d4666124ef2ad5f244f10a2b3876e003540c2451b6c880b1e81d24fae7
-
Filesize
26KB
MD551a8baa1c8c27d7164fdfe717d88a124
SHA1778a6e0f877ca10f55a2e294798bf50d821e8618
SHA25696fe81a5a9276b5a8c9181b222f34ff23a1e6957ad3573c6f15a6860a068c808
SHA5123fb267a95d6a6ea27501023aa3b0451a2f907a82127fab6529578564cd577f6fed88984085610a8f0ceb14cfc6346712ffe4cfa3864696067d377913e26ae193
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
25KB
MD5331347f20a6207b4a64aa81fac242722
SHA1b9769e6772f6e4e81678990933b3c4c80236bc4f
SHA256c660379332227f94b3142d5aa2e4b0396246182aabb1374e9ec219fae312f379
SHA512303dfa4685c914472a55466bf707fe724d041579cc8d47fad21cec15239a15b73ce98a05f51aceb05e33af5471727763ef8898609cfc7d7b7991a53bc19a3e4f