Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 04:50
Static task
static1
Behavioral task
behavioral1
Sample
df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exe
Resource
win10v2004-20241007-en
General
-
Target
df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exe
-
Size
1.2MB
-
MD5
b5b47f531d7f154f40987c7298eeead8
-
SHA1
f4a3e41d668ebde5403c7e6ecdefebb69733a244
-
SHA256
df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776
-
SHA512
cd5aa21d668c571a86e8ba61a5b4b537b3ef4bdc7002a7843693a362acbf37fae81ac78164dab5809ef007c63cc55e1ba450c4afbf8f6e3253519258a4fd46dd
-
SSDEEP
24576:oG+/8l+k1W0tq78x3s+hPNt790/ASMcmqhrbjXxI+PpKWSJTzCduD:L+/8l+kAf78x3B2ASMHKrfPpATz3D
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exetmp142.exe._cache_tmp142.exeSynaptics.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation tmp142.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation ._cache_tmp142.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 7 IoCs
Processes:
tmp142.exetmp142.exe._cache_tmp142.exeSynaptics.exeServer.exeSynaptics.exe._cache_Synaptics.exepid process 716 tmp142.exe 1448 tmp142.exe 1716 ._cache_tmp142.exe 3964 Synaptics.exe 4600 Server.exe 3644 Synaptics.exe 4000 ._cache_Synaptics.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
._cache_tmp142.exeServer.exe._cache_Synaptics.exetmp142.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Server = "C:\\Users\\Admin\\AppData\\Local\\Temp\\._cache_tmp142.exe" ._cache_tmp142.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Server = "C:\\Users\\Admin\\AppData\\Roaming\\VanToM Folder\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Server = "C:\\Users\\Admin\\AppData\\Local\\Temp\\._cache_Synaptics.exe" ._cache_Synaptics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\????? = "C:\\ProgramData\\Synaptics\\Synaptics.exe" tmp142.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
tmp142.exeSynaptics.exedescription pid process target process PID 716 set thread context of 1448 716 tmp142.exe tmp142.exe PID 3964 set thread context of 3644 3964 Synaptics.exe Synaptics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
tmp142.execmd.exetmp142.exeSynaptics.exeSynaptics.exedf44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp142.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp142.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 6 IoCs
Processes:
OpenWith.exe._cache_Synaptics.exeOpenWith.exetmp142.exeSynaptics.exeServer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings ._cache_Synaptics.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ tmp142.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings Server.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 3328 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exetmp142.exeSynaptics.exepid process 524 df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exe 524 df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exe 716 tmp142.exe 716 tmp142.exe 3964 Synaptics.exe 3964 Synaptics.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
._cache_tmp142.exeServer.exe._cache_Synaptics.exepid process 1716 ._cache_tmp142.exe 4600 Server.exe 4000 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
._cache_tmp142.exeServer.exeOpenWith.exeEXCEL.EXE._cache_Synaptics.exeOpenWith.exepid process 1716 ._cache_tmp142.exe 4600 Server.exe 740 OpenWith.exe 3328 EXCEL.EXE 3328 EXCEL.EXE 4000 ._cache_Synaptics.exe 3328 EXCEL.EXE 3328 EXCEL.EXE 4596 OpenWith.exe 3328 EXCEL.EXE 3328 EXCEL.EXE 3328 EXCEL.EXE 3328 EXCEL.EXE -
Suspicious use of WriteProcessMemory 41 IoCs
Processes:
df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exetmp142.exetmp142.exe._cache_tmp142.exeSynaptics.exeSynaptics.exedescription pid process target process PID 524 wrote to memory of 716 524 df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exe tmp142.exe PID 524 wrote to memory of 716 524 df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exe tmp142.exe PID 524 wrote to memory of 716 524 df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exe tmp142.exe PID 524 wrote to memory of 220 524 df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exe cmd.exe PID 524 wrote to memory of 220 524 df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exe cmd.exe PID 524 wrote to memory of 220 524 df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exe cmd.exe PID 716 wrote to memory of 1448 716 tmp142.exe tmp142.exe PID 716 wrote to memory of 1448 716 tmp142.exe tmp142.exe PID 716 wrote to memory of 1448 716 tmp142.exe tmp142.exe PID 716 wrote to memory of 1448 716 tmp142.exe tmp142.exe PID 716 wrote to memory of 1448 716 tmp142.exe tmp142.exe PID 716 wrote to memory of 1448 716 tmp142.exe tmp142.exe PID 716 wrote to memory of 1448 716 tmp142.exe tmp142.exe PID 716 wrote to memory of 1448 716 tmp142.exe tmp142.exe PID 716 wrote to memory of 1448 716 tmp142.exe tmp142.exe PID 716 wrote to memory of 1448 716 tmp142.exe tmp142.exe PID 716 wrote to memory of 1448 716 tmp142.exe tmp142.exe PID 716 wrote to memory of 1448 716 tmp142.exe tmp142.exe PID 716 wrote to memory of 1448 716 tmp142.exe tmp142.exe PID 1448 wrote to memory of 1716 1448 tmp142.exe ._cache_tmp142.exe PID 1448 wrote to memory of 1716 1448 tmp142.exe ._cache_tmp142.exe PID 1448 wrote to memory of 3964 1448 tmp142.exe Synaptics.exe PID 1448 wrote to memory of 3964 1448 tmp142.exe Synaptics.exe PID 1448 wrote to memory of 3964 1448 tmp142.exe Synaptics.exe PID 1716 wrote to memory of 4600 1716 ._cache_tmp142.exe Server.exe PID 1716 wrote to memory of 4600 1716 ._cache_tmp142.exe Server.exe PID 3964 wrote to memory of 3644 3964 Synaptics.exe Synaptics.exe PID 3964 wrote to memory of 3644 3964 Synaptics.exe Synaptics.exe PID 3964 wrote to memory of 3644 3964 Synaptics.exe Synaptics.exe PID 3964 wrote to memory of 3644 3964 Synaptics.exe Synaptics.exe PID 3964 wrote to memory of 3644 3964 Synaptics.exe Synaptics.exe PID 3964 wrote to memory of 3644 3964 Synaptics.exe Synaptics.exe PID 3964 wrote to memory of 3644 3964 Synaptics.exe Synaptics.exe PID 3964 wrote to memory of 3644 3964 Synaptics.exe Synaptics.exe PID 3964 wrote to memory of 3644 3964 Synaptics.exe Synaptics.exe PID 3964 wrote to memory of 3644 3964 Synaptics.exe Synaptics.exe PID 3964 wrote to memory of 3644 3964 Synaptics.exe Synaptics.exe PID 3964 wrote to memory of 3644 3964 Synaptics.exe Synaptics.exe PID 3964 wrote to memory of 3644 3964 Synaptics.exe Synaptics.exe PID 3644 wrote to memory of 4000 3644 Synaptics.exe ._cache_Synaptics.exe PID 3644 wrote to memory of 4000 3644 Synaptics.exe ._cache_Synaptics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exe"C:\Users\Admin\AppData\Local\Temp\df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Users\Admin\AppData\Local\Temp\tmp142.exe"C:\Users\Admin\AppData\Local\Temp\tmp142.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Users\Admin\AppData\Local\Temp\tmp142.exeC:\Users\Admin\AppData\Local\Temp\tmp142.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\._cache_tmp142.exe"C:\Users\Admin\AppData\Local\Temp\._cache_tmp142.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Roaming\VanToM Folder\Server.exe"C:\Users\Admin\AppData\Roaming\VanToM Folder\Server.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4600
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\ProgramData\Synaptics\Synaptics.exeC:\ProgramData\Synaptics\Synaptics.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4000
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\DF44DE~1.EXE >> NUL2⤵
- System Location Discovery: System Language Discovery
PID:220
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:740
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3328
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4596
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
318KB
MD5166cf19911e45785a3407433a2b447c4
SHA1a08d582e55c5b66ef78bd5dd3e386730d8be4227
SHA256a7b85bf490f372521788658ec25d3de4a14babd79abb5ddb646e30d87dd9ae27
SHA5127934c5bf3657a4396fca70daebe01cd11e61c8e3f9b5cfd9c068d688f8b91ab5058c5dc68b0ba80b32b276348afb8ea6e70bba5f314722a7f04011607a3e7b14
-
Filesize
23KB
MD536937a0c1b78fabc7c6be469236fd601
SHA1f65bed8f4d54b04008a789ccde3029d9a3bb6410
SHA256082141c7988aa747f1e32cf49e5375da3380bce00a31d9315f3e4b8eae728158
SHA512462e421e276ec343a7ed118148fbfbe62f168001d543a503b1ea889e53c447ae45f6a7328b60e3c1cec42e429d904773b4d3c952d7723227e9cf21b1c90dd159
-
Filesize
52B
MD529d493876bc0b2c8a6f38aa4a4379166
SHA1dbb33f3fc329e87dbf2dd292c61207570706fa41
SHA256984c05a8529073f415e789b0af9355d0c1f2e232993eed1b967403e42b34233e
SHA51245f6921600962d05a6cb03280194324a277d5a81fb1b7ff64679be38ad1b190fca2b531e08a834500861ac08283f063512c3e9d03274748d060d77bb083a006b
-
Filesize
55B
MD56b1120fc600709ac2a9bca24748ef527
SHA130edf806f6ca0fc848646e16736ffd4023e33d29
SHA25605efbecfb9f31be92e98e62caac469f974f49cbaeea800d5a6a42eba4f706ba6
SHA512861c6929c438e7985abb8ad3a9ce8dad1f1abc84ebf682ed4676ba5020e500ce63f94f88263c016308a4cbae95e7133c2617b253a05ed3e88967a512233d3982
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
1.2MB
MD5b5b47f531d7f154f40987c7298eeead8
SHA1f4a3e41d668ebde5403c7e6ecdefebb69733a244
SHA256df44de684671c741c6829e74c2ca682c7db85240fa600b769d7cee78a3b73776
SHA512cd5aa21d668c571a86e8ba61a5b4b537b3ef4bdc7002a7843693a362acbf37fae81ac78164dab5809ef007c63cc55e1ba450c4afbf8f6e3253519258a4fd46dd