Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 21:30
Static task
static1
Behavioral task
behavioral1
Sample
3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe
Resource
win10v2004-20241007-en
General
-
Target
3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe
-
Size
1.2MB
-
MD5
0de4333f75d28ab023f56e208ea1f4f2
-
SHA1
7edd7e6ce18728cbe132c256bbdc51a7b24002d5
-
SHA256
3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d
-
SHA512
d8c0cf967227837f9d49dd271e99c408d63909cc954074dc21f1fb788bb5bf1bccd9e5a1b7c997b2373b35ff0897fe43bcd3221e38a708642a14493a6271e54e
-
SSDEEP
24576:oGl/8l+k1W0tq78x3s+hPNt790/ASMcmqhrbjXxI+PpKWSJTzCduD:Ll/8l+kAf78x3B2ASMHKrfPpATz3D
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation tmp142.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation ._cache_tmp142.exe -
Executes dropped EXE 7 IoCs
pid Process 4168 tmp142.exe 972 tmp142.exe 1676 ._cache_tmp142.exe 2696 Synaptics.exe 2600 Server.exe 3416 Synaptics.exe 1084 ._cache_Synaptics.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\????? = "C:\\ProgramData\\Synaptics\\Synaptics.exe" tmp142.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Server = "C:\\Users\\Admin\\AppData\\Local\\Temp\\._cache_tmp142.exe" ._cache_tmp142.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Server = "C:\\Users\\Admin\\AppData\\Roaming\\VanToM Folder\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Server = "C:\\Users\\Admin\\AppData\\Local\\Temp\\._cache_Synaptics.exe" ._cache_Synaptics.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4168 set thread context of 972 4168 tmp142.exe 96 PID 2696 set thread context of 3416 2696 Synaptics.exe 104 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp142.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp142.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings Server.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings ._cache_Synaptics.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ tmp142.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3540 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4348 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe 4348 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe 4168 tmp142.exe 4168 tmp142.exe 2696 Synaptics.exe 2696 Synaptics.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1676 ._cache_tmp142.exe 2600 Server.exe 1084 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1676 ._cache_tmp142.exe 2600 Server.exe 2020 OpenWith.exe 3540 EXCEL.EXE 3540 EXCEL.EXE 1084 ._cache_Synaptics.exe 3540 EXCEL.EXE 3540 EXCEL.EXE 3540 EXCEL.EXE 3540 EXCEL.EXE 1072 OpenWith.exe 3540 EXCEL.EXE 3540 EXCEL.EXE -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 4348 wrote to memory of 4168 4348 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe 86 PID 4348 wrote to memory of 4168 4348 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe 86 PID 4348 wrote to memory of 4168 4348 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe 86 PID 4348 wrote to memory of 3084 4348 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe 87 PID 4348 wrote to memory of 3084 4348 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe 87 PID 4348 wrote to memory of 3084 4348 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe 87 PID 4168 wrote to memory of 972 4168 tmp142.exe 96 PID 4168 wrote to memory of 972 4168 tmp142.exe 96 PID 4168 wrote to memory of 972 4168 tmp142.exe 96 PID 4168 wrote to memory of 972 4168 tmp142.exe 96 PID 4168 wrote to memory of 972 4168 tmp142.exe 96 PID 4168 wrote to memory of 972 4168 tmp142.exe 96 PID 4168 wrote to memory of 972 4168 tmp142.exe 96 PID 4168 wrote to memory of 972 4168 tmp142.exe 96 PID 4168 wrote to memory of 972 4168 tmp142.exe 96 PID 4168 wrote to memory of 972 4168 tmp142.exe 96 PID 4168 wrote to memory of 972 4168 tmp142.exe 96 PID 4168 wrote to memory of 972 4168 tmp142.exe 96 PID 4168 wrote to memory of 972 4168 tmp142.exe 96 PID 972 wrote to memory of 1676 972 tmp142.exe 97 PID 972 wrote to memory of 1676 972 tmp142.exe 97 PID 972 wrote to memory of 2696 972 tmp142.exe 101 PID 972 wrote to memory of 2696 972 tmp142.exe 101 PID 972 wrote to memory of 2696 972 tmp142.exe 101 PID 1676 wrote to memory of 2600 1676 ._cache_tmp142.exe 102 PID 1676 wrote to memory of 2600 1676 ._cache_tmp142.exe 102 PID 2696 wrote to memory of 3416 2696 Synaptics.exe 104 PID 2696 wrote to memory of 3416 2696 Synaptics.exe 104 PID 2696 wrote to memory of 3416 2696 Synaptics.exe 104 PID 2696 wrote to memory of 3416 2696 Synaptics.exe 104 PID 2696 wrote to memory of 3416 2696 Synaptics.exe 104 PID 2696 wrote to memory of 3416 2696 Synaptics.exe 104 PID 2696 wrote to memory of 3416 2696 Synaptics.exe 104 PID 2696 wrote to memory of 3416 2696 Synaptics.exe 104 PID 2696 wrote to memory of 3416 2696 Synaptics.exe 104 PID 2696 wrote to memory of 3416 2696 Synaptics.exe 104 PID 2696 wrote to memory of 3416 2696 Synaptics.exe 104 PID 2696 wrote to memory of 3416 2696 Synaptics.exe 104 PID 2696 wrote to memory of 3416 2696 Synaptics.exe 104 PID 3416 wrote to memory of 1084 3416 Synaptics.exe 105 PID 3416 wrote to memory of 1084 3416 Synaptics.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe"C:\Users\Admin\AppData\Local\Temp\3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\tmp142.exe"C:\Users\Admin\AppData\Local\Temp\tmp142.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\tmp142.exeC:\Users\Admin\AppData\Local\Temp\tmp142.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\._cache_tmp142.exe"C:\Users\Admin\AppData\Local\Temp\._cache_tmp142.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Roaming\VanToM Folder\Server.exe"C:\Users\Admin\AppData\Roaming\VanToM Folder\Server.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2600
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\ProgramData\Synaptics\Synaptics.exeC:\ProgramData\Synaptics\Synaptics.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1084
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\3B4B87~1.EXE >> NUL2⤵
- System Location Discovery: System Language Discovery
PID:3084
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2020
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3540
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1072
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
318KB
MD5166cf19911e45785a3407433a2b447c4
SHA1a08d582e55c5b66ef78bd5dd3e386730d8be4227
SHA256a7b85bf490f372521788658ec25d3de4a14babd79abb5ddb646e30d87dd9ae27
SHA5127934c5bf3657a4396fca70daebe01cd11e61c8e3f9b5cfd9c068d688f8b91ab5058c5dc68b0ba80b32b276348afb8ea6e70bba5f314722a7f04011607a3e7b14
-
Filesize
20KB
MD53ce0554d1abb3b529a3301ab1d92306b
SHA1c21c7f4241bcc4d28a0a78eec853dd17f4953b6b
SHA256171692e2ba3d4d3d2eab4e186748b5fb6eed85db90501a4c25a074996f762286
SHA512610c9bbe4446a25a64ee8350160e2d4d58446ccd7354ba7dea0d5db115de460f1368ddb0ba3a0d679e80c5f157bbd7aee32bfa0d79bb501a1d4832a585de4364
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
52B
MD529d493876bc0b2c8a6f38aa4a4379166
SHA1dbb33f3fc329e87dbf2dd292c61207570706fa41
SHA256984c05a8529073f415e789b0af9355d0c1f2e232993eed1b967403e42b34233e
SHA51245f6921600962d05a6cb03280194324a277d5a81fb1b7ff64679be38ad1b190fca2b531e08a834500861ac08283f063512c3e9d03274748d060d77bb083a006b
-
Filesize
55B
MD56b1120fc600709ac2a9bca24748ef527
SHA130edf806f6ca0fc848646e16736ffd4023e33d29
SHA25605efbecfb9f31be92e98e62caac469f974f49cbaeea800d5a6a42eba4f706ba6
SHA512861c6929c438e7985abb8ad3a9ce8dad1f1abc84ebf682ed4676ba5020e500ce63f94f88263c016308a4cbae95e7133c2617b253a05ed3e88967a512233d3982
-
Filesize
1.2MB
MD50de4333f75d28ab023f56e208ea1f4f2
SHA17edd7e6ce18728cbe132c256bbdc51a7b24002d5
SHA2563b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d
SHA512d8c0cf967227837f9d49dd271e99c408d63909cc954074dc21f1fb788bb5bf1bccd9e5a1b7c997b2373b35ff0897fe43bcd3221e38a708642a14493a6271e54e