Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19-11-2024 21:28
Static task
static1
Behavioral task
behavioral1
Sample
3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe
Resource
win10v2004-20241007-en
General
-
Target
3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe
-
Size
1.2MB
-
MD5
0de4333f75d28ab023f56e208ea1f4f2
-
SHA1
7edd7e6ce18728cbe132c256bbdc51a7b24002d5
-
SHA256
3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d
-
SHA512
d8c0cf967227837f9d49dd271e99c408d63909cc954074dc21f1fb788bb5bf1bccd9e5a1b7c997b2373b35ff0897fe43bcd3221e38a708642a14493a6271e54e
-
SSDEEP
24576:oGl/8l+k1W0tq78x3s+hPNt790/ASMcmqhrbjXxI+PpKWSJTzCduD:Ll/8l+kAf78x3B2ASMHKrfPpATz3D
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 7 IoCs
pid Process 2536 tmp142.exe 2872 tmp142.exe 3024 ._cache_tmp142.exe 2624 Synaptics.exe 1312 Server.exe 2852 Synaptics.exe 1288 ._cache_Synaptics.exe -
Loads dropped DLL 9 IoCs
pid Process 2304 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe 2304 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe 2536 tmp142.exe 2872 tmp142.exe 2872 tmp142.exe 2872 tmp142.exe 2872 tmp142.exe 2852 Synaptics.exe 2852 Synaptics.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\????? = "C:\\ProgramData\\Synaptics\\Synaptics.exe" tmp142.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Server = "C:\\Users\\Admin\\AppData\\Local\\Temp\\._cache_tmp142.exe" ._cache_tmp142.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Server = "C:\\Users\\Admin\\AppData\\Roaming\\VanToM Folder\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Server = "C:\\Users\\Admin\\AppData\\Local\\Temp\\._cache_Synaptics.exe" ._cache_Synaptics.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2536 set thread context of 2872 2536 tmp142.exe 34 PID 2624 set thread context of 2852 2624 Synaptics.exe 39 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp142.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp142.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\_auto_file rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1896 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2304 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe 2536 tmp142.exe 2624 Synaptics.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3024 ._cache_tmp142.exe 1312 Server.exe 1288 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3024 ._cache_tmp142.exe 1312 Server.exe 1288 ._cache_Synaptics.exe 1896 EXCEL.EXE -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2536 2304 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe 31 PID 2304 wrote to memory of 2536 2304 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe 31 PID 2304 wrote to memory of 2536 2304 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe 31 PID 2304 wrote to memory of 2536 2304 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe 31 PID 2304 wrote to memory of 2208 2304 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe 32 PID 2304 wrote to memory of 2208 2304 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe 32 PID 2304 wrote to memory of 2208 2304 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe 32 PID 2304 wrote to memory of 2208 2304 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe 32 PID 2536 wrote to memory of 2872 2536 tmp142.exe 34 PID 2536 wrote to memory of 2872 2536 tmp142.exe 34 PID 2536 wrote to memory of 2872 2536 tmp142.exe 34 PID 2536 wrote to memory of 2872 2536 tmp142.exe 34 PID 2536 wrote to memory of 2872 2536 tmp142.exe 34 PID 2536 wrote to memory of 2872 2536 tmp142.exe 34 PID 2536 wrote to memory of 2872 2536 tmp142.exe 34 PID 2536 wrote to memory of 2872 2536 tmp142.exe 34 PID 2536 wrote to memory of 2872 2536 tmp142.exe 34 PID 2536 wrote to memory of 2872 2536 tmp142.exe 34 PID 2536 wrote to memory of 2872 2536 tmp142.exe 34 PID 2536 wrote to memory of 2872 2536 tmp142.exe 34 PID 2872 wrote to memory of 3024 2872 tmp142.exe 35 PID 2872 wrote to memory of 3024 2872 tmp142.exe 35 PID 2872 wrote to memory of 3024 2872 tmp142.exe 35 PID 2872 wrote to memory of 3024 2872 tmp142.exe 35 PID 2872 wrote to memory of 2624 2872 tmp142.exe 36 PID 2872 wrote to memory of 2624 2872 tmp142.exe 36 PID 2872 wrote to memory of 2624 2872 tmp142.exe 36 PID 2872 wrote to memory of 2624 2872 tmp142.exe 36 PID 3024 wrote to memory of 1312 3024 ._cache_tmp142.exe 37 PID 3024 wrote to memory of 1312 3024 ._cache_tmp142.exe 37 PID 3024 wrote to memory of 1312 3024 ._cache_tmp142.exe 37 PID 1312 wrote to memory of 1868 1312 Server.exe 38 PID 1312 wrote to memory of 1868 1312 Server.exe 38 PID 1312 wrote to memory of 1868 1312 Server.exe 38 PID 2624 wrote to memory of 2852 2624 Synaptics.exe 39 PID 2624 wrote to memory of 2852 2624 Synaptics.exe 39 PID 2624 wrote to memory of 2852 2624 Synaptics.exe 39 PID 2624 wrote to memory of 2852 2624 Synaptics.exe 39 PID 2624 wrote to memory of 2852 2624 Synaptics.exe 39 PID 2624 wrote to memory of 2852 2624 Synaptics.exe 39 PID 2624 wrote to memory of 2852 2624 Synaptics.exe 39 PID 2624 wrote to memory of 2852 2624 Synaptics.exe 39 PID 2624 wrote to memory of 2852 2624 Synaptics.exe 39 PID 2624 wrote to memory of 2852 2624 Synaptics.exe 39 PID 2624 wrote to memory of 2852 2624 Synaptics.exe 39 PID 2624 wrote to memory of 2852 2624 Synaptics.exe 39 PID 2852 wrote to memory of 1288 2852 Synaptics.exe 40 PID 2852 wrote to memory of 1288 2852 Synaptics.exe 40 PID 2852 wrote to memory of 1288 2852 Synaptics.exe 40 PID 2852 wrote to memory of 1288 2852 Synaptics.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe"C:\Users\Admin\AppData\Local\Temp\3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\tmp142.exe"C:\Users\Admin\AppData\Local\Temp\tmp142.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\tmp142.exeC:\Users\Admin\AppData\Local\Temp\tmp142.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\._cache_tmp142.exe"C:\Users\Admin\AppData\Local\Temp\._cache_tmp142.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Roaming\VanToM Folder\Server.exe"C:\Users\Admin\AppData\Roaming\VanToM Folder\Server.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Roaming\Server6⤵
- Modifies registry class
PID:1868
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\ProgramData\Synaptics\Synaptics.exeC:\ProgramData\Synaptics\Synaptics.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1288
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\3B4B87~1.EXE >> NUL2⤵
- System Location Discovery: System Language Discovery
PID:2208
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1896
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
52B
MD529d493876bc0b2c8a6f38aa4a4379166
SHA1dbb33f3fc329e87dbf2dd292c61207570706fa41
SHA256984c05a8529073f415e789b0af9355d0c1f2e232993eed1b967403e42b34233e
SHA51245f6921600962d05a6cb03280194324a277d5a81fb1b7ff64679be38ad1b190fca2b531e08a834500861ac08283f063512c3e9d03274748d060d77bb083a006b
-
Filesize
55B
MD56b1120fc600709ac2a9bca24748ef527
SHA130edf806f6ca0fc848646e16736ffd4023e33d29
SHA25605efbecfb9f31be92e98e62caac469f974f49cbaeea800d5a6a42eba4f706ba6
SHA512861c6929c438e7985abb8ad3a9ce8dad1f1abc84ebf682ed4676ba5020e500ce63f94f88263c016308a4cbae95e7133c2617b253a05ed3e88967a512233d3982
-
Filesize
318KB
MD5166cf19911e45785a3407433a2b447c4
SHA1a08d582e55c5b66ef78bd5dd3e386730d8be4227
SHA256a7b85bf490f372521788658ec25d3de4a14babd79abb5ddb646e30d87dd9ae27
SHA5127934c5bf3657a4396fca70daebe01cd11e61c8e3f9b5cfd9c068d688f8b91ab5058c5dc68b0ba80b32b276348afb8ea6e70bba5f314722a7f04011607a3e7b14
-
Filesize
1.2MB
MD50de4333f75d28ab023f56e208ea1f4f2
SHA17edd7e6ce18728cbe132c256bbdc51a7b24002d5
SHA2563b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d
SHA512d8c0cf967227837f9d49dd271e99c408d63909cc954074dc21f1fb788bb5bf1bccd9e5a1b7c997b2373b35ff0897fe43bcd3221e38a708642a14493a6271e54e