Analysis
-
max time kernel
112s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 18:14
Behavioral task
behavioral1
Sample
940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exe
Resource
win10v2004-20241007-en
General
-
Target
940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exe
-
Size
1.2MB
-
MD5
64ace44faaea86f0c330eb1362ee46e0
-
SHA1
f6d730bfb6ac0eba02b7cbeddba9182dbd0d31e7
-
SHA256
940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459
-
SHA512
134096945706c2b5d1c3f6f796593245e982a6939d075965d4b68189abed238984f2e1f331684b8ac1a4b6f6580a49d30407ed5a55b4e65b7775001fb0024911
-
SSDEEP
24576:TnsJ39LyjbJkQFMhmC+6GD9wrYUhw/Fcy0f1u/olezk:TnsHyjtk2MYC5GDO0Ujs/oleo
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exeSynaptics.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 7 IoCs
Processes:
._cache_940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exesetup.exeSynaptics.exesetup.tmp._cache_Synaptics.exesetup.exesetup.tmppid process 4796 ._cache_940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exe 1844 setup.exe 3108 Synaptics.exe 3564 setup.tmp 1404 ._cache_Synaptics.exe 1868 setup.exe 4408 setup.tmp -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
._cache_Synaptics.exesetup.exesetup.tmp940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exe._cache_940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exeSynaptics.exesetup.exesetup.tmpdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.tmp -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
Processes:
940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exeSynaptics.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1436 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
EXCEL.EXEpid process 1436 EXCEL.EXE 1436 EXCEL.EXE 1436 EXCEL.EXE 1436 EXCEL.EXE 1436 EXCEL.EXE 1436 EXCEL.EXE 1436 EXCEL.EXE 1436 EXCEL.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exe._cache_940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exesetup.exeSynaptics.exe._cache_Synaptics.exesetup.exedescription pid process target process PID 4992 wrote to memory of 4796 4992 940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exe ._cache_940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exe PID 4992 wrote to memory of 4796 4992 940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exe ._cache_940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exe PID 4992 wrote to memory of 4796 4992 940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exe ._cache_940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exe PID 4796 wrote to memory of 1844 4796 ._cache_940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exe setup.exe PID 4796 wrote to memory of 1844 4796 ._cache_940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exe setup.exe PID 4796 wrote to memory of 1844 4796 ._cache_940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exe setup.exe PID 4992 wrote to memory of 3108 4992 940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exe Synaptics.exe PID 4992 wrote to memory of 3108 4992 940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exe Synaptics.exe PID 4992 wrote to memory of 3108 4992 940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exe Synaptics.exe PID 1844 wrote to memory of 3564 1844 setup.exe setup.tmp PID 1844 wrote to memory of 3564 1844 setup.exe setup.tmp PID 1844 wrote to memory of 3564 1844 setup.exe setup.tmp PID 3108 wrote to memory of 1404 3108 Synaptics.exe ._cache_Synaptics.exe PID 3108 wrote to memory of 1404 3108 Synaptics.exe ._cache_Synaptics.exe PID 3108 wrote to memory of 1404 3108 Synaptics.exe ._cache_Synaptics.exe PID 1404 wrote to memory of 1868 1404 ._cache_Synaptics.exe setup.exe PID 1404 wrote to memory of 1868 1404 ._cache_Synaptics.exe setup.exe PID 1404 wrote to memory of 1868 1404 ._cache_Synaptics.exe setup.exe PID 1868 wrote to memory of 4408 1868 setup.exe setup.tmp PID 1868 wrote to memory of 4408 1868 setup.exe setup.tmp PID 1868 wrote to memory of 4408 1868 setup.exe setup.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exe"C:\Users\Admin\AppData\Local\Temp\940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\._cache_940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\7zSAA78.tmp\setup.exe.\setup.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\is-FMSR1.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-FMSR1.tmp\setup.tmp" /SL5="$501EC,54272,54272,C:\Users\Admin\AppData\Local\Temp\7zSAA78.tmp\setup.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3564
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\7zSAE70.tmp\setup.exe.\setup.exe InjUpdate4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\is-DHIIL.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-DHIIL.tmp\setup.tmp" /SL5="$70258,54272,54272,C:\Users\Admin\AppData\Local\Temp\7zSAE70.tmp\setup.exe" InjUpdate5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4408
-
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD564ace44faaea86f0c330eb1362ee46e0
SHA1f6d730bfb6ac0eba02b7cbeddba9182dbd0d31e7
SHA256940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459
SHA512134096945706c2b5d1c3f6f796593245e982a6939d075965d4b68189abed238984f2e1f331684b8ac1a4b6f6580a49d30407ed5a55b4e65b7775001fb0024911
-
C:\Users\Admin\AppData\Local\Temp\._cache_940f4d6772f50d20f4303ea10b95db7fd39efefd1b8ff8136a21c60e24acd459N.exe
Filesize440KB
MD5dc675f369e523ed611106d410d0a5562
SHA164ac68397eb3f18f8a9bfeb494e4983c7ab49cef
SHA256f83c2506a6af61d5c8a4d4b9f901cb1d5a6eb3a18c5f179bdf1fefe1e1283112
SHA5126bb3a5e3bd6f6f01f7f53a6bbbff56edc5bf0c6a22f9dac16014eaefc38b73a11f78c4aac3545bca413973b4a2090a722b7610651cc8865dd0e558d09d8f9f8f
-
Filesize
309KB
MD5ea383686b37fc135fc75eac4e1b9de88
SHA173ce3d8b38a4237d29f8bbeabe04c40baae42f35
SHA25640253e3508db7e8aae52627c4f10e0122e512f57cf3890012028f454b422cd50
SHA512bce78e7428c1a61b864decc833fbc9a3c24b2c91a7e100551a0a521b260436898e8017e554cd49bd5c5c1219dc9c7e0ac73ccfbf24c86cc7b5dd7c977c4bc22e
-
Filesize
2KB
MD51213ae755a10906c4064a3cefa4b2cf7
SHA111898b83e6e0c618e7f16673e0ac79c7b3a8d1ce
SHA2566ea21d1fe9515467afeeb5eef360dde1cc4f7b87015f30f4194108e4f57cdb8e
SHA5120c559712d0e41f36109e9aebea9b5fed5f491e0b71b226ede566edc3a4520480b0838ab2ad304bfe558cb7361a6372b261c79c99137b20a37a0d1b82b8ee6cb9
-
Filesize
3KB
MD5f01acf3a1b29d9ea79d45ccdd4fb51ee
SHA13740a5260fb134119a5ab30fc8757264d9377ef7
SHA256afbd1705b23a0e9d56b9a695dc1f6699f1b38d4fc66d6dd1887973b9d963f21c
SHA5128a935fbfc3f869f3fa7f00a2c7354293eeba20c6ce6229ceca436df6c8997b02ed6d5a962a32f5587e363bbcdc620b45712b4ae84880d8b9ef0b54117b85a27c
-
Filesize
7KB
MD54e2c672b039af5336f1e8be8ff718b43
SHA1d7042f3a165986ae5c83c476e60f73dc57a1211e
SHA2562f6a76c99355627965623d91823c4b957f69807a4675c2b4e409c9d4c3f33baa
SHA512c90020f312d2e3c740bf8e43f656dd73fe2c21739e4c453fac3c5140bfc4c4fe10be0ed6213f23bce1322eb9d9f0276b13cdc968cd6ac5823f6ee3038b478ce4
-
Filesize
91KB
MD505c2dc36f2019f116b815d848e287699
SHA1062f6a8eceab1ea25f11b829f6c25fa1bb3be094
SHA256fcca4e4f69d4192099491a1855815042b6615888eb54f71bf2e3ef52cd4db3ba
SHA512a602e258e289cfbd321b44d97ad63ee968fa7e9351a482f50d117371cc1be1b1511c35a57b2a15d13077856210672d5337038ffd8c2eb821510beb630cfa4bca
-
Filesize
1KB
MD53a10c8ca361c29a3b25ec29e87ac1f4b
SHA1f4b2c41ec1c084a4ba0a167975a96929c346e714
SHA2567a9cb44434363740ad9891fe05d498f2597968e29fb18be2deabb1cc04462395
SHA5121c9bc5e86a8985f0b7c0fa940d146779a10025df49e064be05bd5e249d3b7cd03c57e65f3c3fb78d490462157e539687caba7be4c3cc77574ed2ad7f306efd0a
-
Filesize
6KB
MD5a6157b4b0608061d8cb12ea87a685eae
SHA1dc13b65840453aa4113a86a627d9c30ab1badb87
SHA25665e70a4ecb5e42dffff0e9ad414a83a691e78e972006aa674a7a9cb07e908335
SHA51255b787e43c101c13e6ee30dfb4009a5625c884826afc9ab072f7ad9a600f3445e22833a814e2766202612390b7fe1361d3384e952bae89b3d378d6f1bce5a8c7
-
Filesize
5KB
MD5759ea99e342b0c7c3749e0fb6ac68c3c
SHA100dbc55fddf034287dcdf28be6f54ef66eaab40d
SHA25641382a6af30e01b0ca7b2b36d5f86dae90cad5ff109d9a76c6090719b67d03ca
SHA5126ae0a8dc015632b139694183f39f7202e314ba16f63f841107184dfe0b82f73d9460eff494a80d3b3559903d17d5fdbbeff60579d20e693ce2dba235f7cff2f7
-
Filesize
6KB
MD595131db75bb16a676fe9836757c49e67
SHA12da41a6f91c88b9df84c7482a20793d5f3490c12
SHA2569646c1af1dba61ae5245e5282048f250fd9b871810ba2969d6ae9c46e3553176
SHA512ff22a398d21c90749a0462573b2f20a374f9dce8f28d67f82e4c2d0d1d39e5013ef52bfecfb8f9ba1eab7e575a1599013e0f7b2a8a10a6cb5cb4fd7bc2d143d7
-
Filesize
87B
MD579d0b300f17c1f9af86876d49d66401d
SHA16e902355a3bfa6328d0b1c253aa4bc5172140fef
SHA25683f6c1b24160a01be3381471b9647c818002b1351b5c4d11e1c8cbc9480ecdb4
SHA5124aa0334c847683dfce449d9654518a2e1d2caa90377b485e4ac6a6b5446ef426b0f27b05fa14ecc4aef6ee6eea8dbb09078543d71c186419c316ba2919e1fce3
-
Filesize
1KB
MD56a89a2905139522d3a1b4269d0b6ebd6
SHA1617a4a0cdc9231c845d72acdd26d0b9ea195af56
SHA25600b34c3b0c7359f7f3e4a6cb1a85db641732dd56b72907725da6eb4a74cc3417
SHA512513ae4952ba460367bf180ff601c8d69ca0ebd0c1cdd23628fd51f7784075350acfc41d46284786ff6e6fbeb313602a6ac24deeedd0ffbbdb391a2d7f4a6b067
-
Filesize
2KB
MD58da98c7db3497cff27c160a4c0a019fc
SHA1a6367cfdd51767db6fa862158a9e392032e6aa00
SHA25643b0fb6a39684018ddb4c14ed59abdaaa43073893537b0e378bc918161fdd849
SHA512672b2ad6a55c4e234526d19da4f2eba53b1e8207d6ffdef085f052ae05455f02f74bf597da55a4b4e4afa3bef92bc44e9b094c2dabf71e54750772a0fb6c78bc
-
Filesize
22KB
MD592513ea2ab5a92e71ec5fd2896b73b32
SHA1bdfa011fb8c7622586581e789bc125524c0a7499
SHA2564317ad41f9a57099a18ca78f62f87ee247da922614f159594cbcad089bd9099b
SHA512b2df07bc919ffe63e4c72ef64f4647c7873fda098ba34f44e96ce2c7c07f1eb7b69e721edbaf2eddc1c8185002aa6e8cdf8ce24e7c9ca3132071d240c8a9125f
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
695KB
MD5620f32e56b46e90e8aee43febc59f6e3
SHA1d5edd63dd1390a1420b85f746e12a66625ae9354
SHA256bcc9d63213012bf25a37f48015e5f755d359f3b08d05d35319b03b4a72710730
SHA5128a9d2a2eb3891265cec379978399ad6c9b4bf3e12e0f381946b4390621b943b97fa04fbb87ad628652bd765b706eb2ff56001f24de24e9bcc487a59ca2f07d9c