Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 04:43
Static task
static1
Behavioral task
behavioral1
Sample
df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exe
Resource
win10v2004-20241007-en
General
-
Target
df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exe
-
Size
1.2MB
-
MD5
b5b47f531d7f154f40987c7298eeead8
-
SHA1
f4a3e41d668ebde5403c7e6ecdefebb69733a244
-
SHA256
df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776
-
SHA512
cd5aa21d668c571a86e8ba61a5b4b537b3ef4bdc7002a7843693a362acbf37fae81ac78164dab5809ef007c63cc55e1ba450c4afbf8f6e3253519258a4fd46dd
-
SSDEEP
24576:oG+/8l+k1W0tq78x3s+hPNt790/ASMcmqhrbjXxI+PpKWSJTzCduD:L+/8l+kAf78x3B2ASMHKrfPpATz3D
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Deletes itself 1 IoCs
pid Process 2920 cmd.exe -
Executes dropped EXE 7 IoCs
pid Process 2792 tmp142.exe 2956 tmp142.exe 2724 ._cache_tmp142.exe 1436 Synaptics.exe 992 Server.exe 2968 Synaptics.exe 2992 ._cache_Synaptics.exe -
Loads dropped DLL 9 IoCs
pid Process 2744 df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exe 2744 df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exe 2792 tmp142.exe 2956 tmp142.exe 2956 tmp142.exe 2956 tmp142.exe 2956 tmp142.exe 2968 Synaptics.exe 2968 Synaptics.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\????? = "C:\\ProgramData\\Synaptics\\Synaptics.exe" tmp142.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\Server = "C:\\Users\\Admin\\AppData\\Local\\Temp\\._cache_tmp142.exe" ._cache_tmp142.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\Server = "C:\\Users\\Admin\\AppData\\Roaming\\VanToM Folder\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\Server = "C:\\Users\\Admin\\AppData\\Local\\Temp\\._cache_Synaptics.exe" ._cache_Synaptics.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2792 set thread context of 2956 2792 tmp142.exe 33 PID 1436 set thread context of 2968 1436 Synaptics.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp142.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp142.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1908 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2744 df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exe 2792 tmp142.exe 1436 Synaptics.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2724 ._cache_tmp142.exe 992 Server.exe 2992 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2724 ._cache_tmp142.exe 992 Server.exe 1908 EXCEL.EXE 2992 ._cache_Synaptics.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2792 2744 df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exe 30 PID 2744 wrote to memory of 2792 2744 df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exe 30 PID 2744 wrote to memory of 2792 2744 df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exe 30 PID 2744 wrote to memory of 2792 2744 df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exe 30 PID 2744 wrote to memory of 2920 2744 df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exe 31 PID 2744 wrote to memory of 2920 2744 df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exe 31 PID 2744 wrote to memory of 2920 2744 df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exe 31 PID 2744 wrote to memory of 2920 2744 df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exe 31 PID 2792 wrote to memory of 2956 2792 tmp142.exe 33 PID 2792 wrote to memory of 2956 2792 tmp142.exe 33 PID 2792 wrote to memory of 2956 2792 tmp142.exe 33 PID 2792 wrote to memory of 2956 2792 tmp142.exe 33 PID 2792 wrote to memory of 2956 2792 tmp142.exe 33 PID 2792 wrote to memory of 2956 2792 tmp142.exe 33 PID 2792 wrote to memory of 2956 2792 tmp142.exe 33 PID 2792 wrote to memory of 2956 2792 tmp142.exe 33 PID 2792 wrote to memory of 2956 2792 tmp142.exe 33 PID 2792 wrote to memory of 2956 2792 tmp142.exe 33 PID 2792 wrote to memory of 2956 2792 tmp142.exe 33 PID 2792 wrote to memory of 2956 2792 tmp142.exe 33 PID 2956 wrote to memory of 2724 2956 tmp142.exe 34 PID 2956 wrote to memory of 2724 2956 tmp142.exe 34 PID 2956 wrote to memory of 2724 2956 tmp142.exe 34 PID 2956 wrote to memory of 2724 2956 tmp142.exe 34 PID 2956 wrote to memory of 1436 2956 tmp142.exe 35 PID 2956 wrote to memory of 1436 2956 tmp142.exe 35 PID 2956 wrote to memory of 1436 2956 tmp142.exe 35 PID 2956 wrote to memory of 1436 2956 tmp142.exe 35 PID 2724 wrote to memory of 992 2724 ._cache_tmp142.exe 36 PID 2724 wrote to memory of 992 2724 ._cache_tmp142.exe 36 PID 2724 wrote to memory of 992 2724 ._cache_tmp142.exe 36 PID 1436 wrote to memory of 2968 1436 Synaptics.exe 37 PID 1436 wrote to memory of 2968 1436 Synaptics.exe 37 PID 1436 wrote to memory of 2968 1436 Synaptics.exe 37 PID 1436 wrote to memory of 2968 1436 Synaptics.exe 37 PID 1436 wrote to memory of 2968 1436 Synaptics.exe 37 PID 1436 wrote to memory of 2968 1436 Synaptics.exe 37 PID 1436 wrote to memory of 2968 1436 Synaptics.exe 37 PID 1436 wrote to memory of 2968 1436 Synaptics.exe 37 PID 1436 wrote to memory of 2968 1436 Synaptics.exe 37 PID 1436 wrote to memory of 2968 1436 Synaptics.exe 37 PID 1436 wrote to memory of 2968 1436 Synaptics.exe 37 PID 1436 wrote to memory of 2968 1436 Synaptics.exe 37 PID 2968 wrote to memory of 2992 2968 Synaptics.exe 38 PID 2968 wrote to memory of 2992 2968 Synaptics.exe 38 PID 2968 wrote to memory of 2992 2968 Synaptics.exe 38 PID 2968 wrote to memory of 2992 2968 Synaptics.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exe"C:\Users\Admin\AppData\Local\Temp\df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\tmp142.exe"C:\Users\Admin\AppData\Local\Temp\tmp142.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\tmp142.exeC:\Users\Admin\AppData\Local\Temp\tmp142.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\._cache_tmp142.exe"C:\Users\Admin\AppData\Local\Temp\._cache_tmp142.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Roaming\VanToM Folder\Server.exe"C:\Users\Admin\AppData\Roaming\VanToM Folder\Server.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:992
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\ProgramData\Synaptics\Synaptics.exeC:\ProgramData\Synaptics\Synaptics.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2992
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\DF44DE~1.EXE >> NUL2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2920
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1908
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
318KB
MD5166cf19911e45785a3407433a2b447c4
SHA1a08d582e55c5b66ef78bd5dd3e386730d8be4227
SHA256a7b85bf490f372521788658ec25d3de4a14babd79abb5ddb646e30d87dd9ae27
SHA5127934c5bf3657a4396fca70daebe01cd11e61c8e3f9b5cfd9c068d688f8b91ab5058c5dc68b0ba80b32b276348afb8ea6e70bba5f314722a7f04011607a3e7b14
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
21KB
MD5938b498d6e36efa13de6a3397800b809
SHA11f22182b16158b832d4a7a7adc9ef8ddfd5083af
SHA2562d99c0706144f9a56f4405dd2b29dc7c5c1e2fd30508c1614ab5a6bcd556b59e
SHA5123b3713d89340ce7dd718a0fb06cd4ad404e06b7418a3ff489aba8576b56b18904937979e908571ffd8267734f188619d0dec47901e7e3a312cb8473a31dc4a86
-
Filesize
25KB
MD5cdd557d5e182ae250fb4b9c3735ec597
SHA17fae34512f5a258dd806334c62652b20e67fa273
SHA256f59239f69dde3cb9bfb8e1a148dc3771eca660a17b164fb38a27b46b3e1887c9
SHA512f1dd7727ed020ecaf9b3cb50a0576978947bc93505115165282328c36510a8c04476a6a6075f812de325a42c02bab696eea54ab6a18b3ff12065d144d3e27faf
-
Filesize
25KB
MD52a6781904ce067e4ecbc7f878bd8d3dc
SHA168807329d3cc2be976c8cc10e7d730c685d2029e
SHA256dba497aea4122df06551b59c15bd67500f70afc4b64ad94b26becf86607f0b5e
SHA512b945201ae0b13478c27e8e8c8327f28abb468590f7fe9be911a791bde7e8585c64765a68671dbfbdd32a6777375e650524e1db6098f05384d6db3c346ec61988
-
Filesize
27KB
MD54c1ceac313789573fcfb8783832f984d
SHA1b2efa6b512e99b2564ebeb80b05dc5bc12f4a016
SHA2561d1915930e1eab3b1e3961c48fc10268a4e546a2b3bc6c1e0c29927259b0b1ce
SHA51226642a8577e9b2a5c6510dcc1088bb1192aa4f47c15918aa3402416fdbf24e3437baac5282655d78c574fafe0d97d86749df203f29a9a16d525be0a697bb4f06
-
Filesize
52B
MD529d493876bc0b2c8a6f38aa4a4379166
SHA1dbb33f3fc329e87dbf2dd292c61207570706fa41
SHA256984c05a8529073f415e789b0af9355d0c1f2e232993eed1b967403e42b34233e
SHA51245f6921600962d05a6cb03280194324a277d5a81fb1b7ff64679be38ad1b190fca2b531e08a834500861ac08283f063512c3e9d03274748d060d77bb083a006b
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
Filesize
1.2MB
MD5b5b47f531d7f154f40987c7298eeead8
SHA1f4a3e41d668ebde5403c7e6ecdefebb69733a244
SHA256df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776
SHA512cd5aa21d668c571a86e8ba61a5b4b537b3ef4bdc7002a7843693a362acbf37fae81ac78164dab5809ef007c63cc55e1ba450c4afbf8f6e3253519258a4fd46dd