Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:01
Static task
static1
Behavioral task
behavioral1
Sample
74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe
Resource
win7-20240903-en
General
-
Target
74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe
-
Size
1.2MB
-
MD5
51f1f9633fda9697a21cfe3803505300
-
SHA1
f2c28c2fadfa10fbe41789736ef044fcccac9325
-
SHA256
74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c
-
SHA512
05c2b63e193f34f188dc226013a3366481302302b37c4ac6b2dfebe9b8986dfcc9329f1f528b4c300ac5c83a5d9390ca39f1132ae716f8411880ce41fe711fa5
-
SSDEEP
24576:v8s2L74wp7Fd0D5wHcgsVPorazZ+Dq9RE7:vb2L7HLM5wHcgkorU+DS
Malware Config
Extracted
xloader
2.3
b0ar
fbadformula.com
appdios.com
guyhoquet-immobilier-drancy.com
pokerwiro.com
maxwellhospitaljaipur.com
88n9.com
bennypc.com
corcoranconsult.com
cuidatusaludcuidatucasa.com
motlakfitnes.com
laurahurricanerelief.com
nostacktofullstack.com
privsec-mail.com
andalusaihealth.com
doosanmodelhouse.com
quickbookaccountingpro.com
falconrysouk.com
vnielvmdqxk538.xyz
asshop.space
mhscdnv1.club
artjohntravis.com
theonandpopoinponytail.net
cunerier.com
6972399.com
wineandhike.com
mcinerneychrysler.com
householdtools.net
smartbusinessforums.com
dashrdog.com
startearningaffiliateincome.com
newdimensionbooks.com
jusarbolivia.com
leverdnice.store
lawlessbritain.com
nanotechslaud.com
pdivale-snapshot.net
thepink.club
khoangsannamtriviet.com
cryptocoin.land
lovelymobilemassage.com
surgeryprovider.com
lapaneradelarepublica.cat
algarmotorcars.com
vib-deutschland.com
secure-dwellant.com
sjhexperiences.com
mgd-ip.com
canadiangrogg.com
livingalcohol.com
evantrah.com
seatssaver.com
smdbusiness.com
poweronelectricalllc.com
zzfdsy.com
tuglapanel.com
classicmotorcycle-tokyo.com
getvrtours.com
poolergeorgiahomes.com
benbyrnemedia.com
voltelectricals.com
massive-racing.com
ceaice.com
shopniagara.net
smileglobe.net
poslity.com
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xloader family
-
Xred family
-
Xloader payload 11 IoCs
resource yara_rule behavioral2/memory/5036-12-0x0000000000400000-0x00000000004EA000-memory.dmp xloader behavioral2/memory/5036-13-0x0000000000400000-0x00000000004EA000-memory.dmp xloader behavioral2/memory/5036-15-0x0000000000400000-0x00000000004EA000-memory.dmp xloader behavioral2/memory/5036-16-0x0000000000400000-0x00000000004EA000-memory.dmp xloader behavioral2/files/0x0009000000023c5a-22.dat xloader behavioral2/memory/5036-116-0x0000000000400000-0x00000000004EA000-memory.dmp xloader behavioral2/memory/4220-121-0x0000000000400000-0x00000000004EA000-memory.dmp xloader behavioral2/memory/4220-212-0x0000000000400000-0x00000000004EA000-memory.dmp xloader behavioral2/memory/4220-213-0x0000000000400000-0x00000000004EA000-memory.dmp xloader behavioral2/memory/924-215-0x0000000000590000-0x00000000005B9000-memory.dmp xloader behavioral2/memory/4220-216-0x0000000000400000-0x00000000004EA000-memory.dmp xloader -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 5 IoCs
pid Process 1952 ._cache_74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe 4472 Synaptics.exe 3252 Synaptics.exe 4220 Synaptics.exe 3132 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4956 set thread context of 5036 4956 74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe 92 PID 4472 set thread context of 4220 4472 Synaptics.exe 96 PID 3132 set thread context of 3424 3132 ._cache_Synaptics.exe 55 PID 924 set thread context of 3424 924 rundll32.exe 55 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2968 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 4956 74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe 4956 74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe 1952 ._cache_74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe 1952 ._cache_74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe 4472 Synaptics.exe 4472 Synaptics.exe 3132 ._cache_Synaptics.exe 3132 ._cache_Synaptics.exe 3132 ._cache_Synaptics.exe 3132 ._cache_Synaptics.exe 924 rundll32.exe 924 rundll32.exe 924 rundll32.exe 924 rundll32.exe 924 rundll32.exe 924 rundll32.exe 924 rundll32.exe 924 rundll32.exe 924 rundll32.exe 924 rundll32.exe 924 rundll32.exe 924 rundll32.exe 924 rundll32.exe 924 rundll32.exe 924 rundll32.exe 924 rundll32.exe 924 rundll32.exe 924 rundll32.exe 924 rundll32.exe 924 rundll32.exe 924 rundll32.exe 924 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3132 ._cache_Synaptics.exe 3132 ._cache_Synaptics.exe 3132 ._cache_Synaptics.exe 924 rundll32.exe 924 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 4956 74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe Token: SeDebugPrivilege 4472 Synaptics.exe Token: SeDebugPrivilege 3132 ._cache_Synaptics.exe Token: SeShutdownPrivilege 3424 Explorer.EXE Token: SeCreatePagefilePrivilege 3424 Explorer.EXE Token: SeShutdownPrivilege 3424 Explorer.EXE Token: SeCreatePagefilePrivilege 3424 Explorer.EXE Token: SeDebugPrivilege 924 rundll32.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2968 EXCEL.EXE 2968 EXCEL.EXE 2968 EXCEL.EXE 2968 EXCEL.EXE 2968 EXCEL.EXE 2968 EXCEL.EXE 2968 EXCEL.EXE 2968 EXCEL.EXE -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 4956 wrote to memory of 5100 4956 74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe 91 PID 4956 wrote to memory of 5100 4956 74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe 91 PID 4956 wrote to memory of 5100 4956 74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe 91 PID 4956 wrote to memory of 5036 4956 74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe 92 PID 4956 wrote to memory of 5036 4956 74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe 92 PID 4956 wrote to memory of 5036 4956 74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe 92 PID 4956 wrote to memory of 5036 4956 74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe 92 PID 4956 wrote to memory of 5036 4956 74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe 92 PID 4956 wrote to memory of 5036 4956 74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe 92 PID 4956 wrote to memory of 5036 4956 74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe 92 PID 4956 wrote to memory of 5036 4956 74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe 92 PID 4956 wrote to memory of 5036 4956 74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe 92 PID 4956 wrote to memory of 5036 4956 74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe 92 PID 4956 wrote to memory of 5036 4956 74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe 92 PID 5036 wrote to memory of 1952 5036 74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe 93 PID 5036 wrote to memory of 1952 5036 74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe 93 PID 5036 wrote to memory of 1952 5036 74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe 93 PID 5036 wrote to memory of 4472 5036 74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe 94 PID 5036 wrote to memory of 4472 5036 74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe 94 PID 5036 wrote to memory of 4472 5036 74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe 94 PID 4472 wrote to memory of 3252 4472 Synaptics.exe 95 PID 4472 wrote to memory of 3252 4472 Synaptics.exe 95 PID 4472 wrote to memory of 3252 4472 Synaptics.exe 95 PID 4472 wrote to memory of 4220 4472 Synaptics.exe 96 PID 4472 wrote to memory of 4220 4472 Synaptics.exe 96 PID 4472 wrote to memory of 4220 4472 Synaptics.exe 96 PID 4472 wrote to memory of 4220 4472 Synaptics.exe 96 PID 4472 wrote to memory of 4220 4472 Synaptics.exe 96 PID 4472 wrote to memory of 4220 4472 Synaptics.exe 96 PID 4472 wrote to memory of 4220 4472 Synaptics.exe 96 PID 4472 wrote to memory of 4220 4472 Synaptics.exe 96 PID 4472 wrote to memory of 4220 4472 Synaptics.exe 96 PID 4472 wrote to memory of 4220 4472 Synaptics.exe 96 PID 4472 wrote to memory of 4220 4472 Synaptics.exe 96 PID 4220 wrote to memory of 3132 4220 Synaptics.exe 97 PID 4220 wrote to memory of 3132 4220 Synaptics.exe 97 PID 4220 wrote to memory of 3132 4220 Synaptics.exe 97 PID 3424 wrote to memory of 924 3424 Explorer.EXE 99 PID 3424 wrote to memory of 924 3424 Explorer.EXE 99 PID 3424 wrote to memory of 924 3424 Explorer.EXE 99 PID 924 wrote to memory of 4856 924 rundll32.exe 103 PID 924 wrote to memory of 4856 924 rundll32.exe 103 PID 924 wrote to memory of 4856 924 rundll32.exe 103
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe"C:\Users\Admin\AppData\Local\Temp\74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe"C:\Users\Admin\AppData\Local\Temp\74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe"3⤵PID:5100
-
-
C:\Users\Admin\AppData\Local\Temp\74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe"C:\Users\Admin\AppData\Local\Temp\74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe"3⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\._cache_74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe"C:\Users\Admin\AppData\Local\Temp\._cache_74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1952
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"5⤵
- Executes dropped EXE
PID:3252
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3132
-
-
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4856
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD551f1f9633fda9697a21cfe3803505300
SHA1f2c28c2fadfa10fbe41789736ef044fcccac9325
SHA25674037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c
SHA51205c2b63e193f34f188dc226013a3366481302302b37c4ac6b2dfebe9b8986dfcc9329f1f528b4c300ac5c83a5d9390ca39f1132ae716f8411880ce41fe711fa5
-
C:\Users\Admin\AppData\Local\Temp\._cache_74037ff6cdc98978d62b5e298fa9f59a52c93186d24e419998b33e6270b8c56c.exe
Filesize161KB
MD5ccdba7fe08b69254661fcdf739120e3f
SHA16583c4ed27d1713d7125305ea511a1dc7b92ae59
SHA2561dfe7070f57df2729baa9e0df5106db0968a18614a4496d2e28395f1fee3201b
SHA51250f12eb54bd79d1bd7e31803eb8e006fd27b10a18b4057338a93fcbffe3d5bb0f10617a483e7b48f9c82fdedaa9af157cf519eaef08a9de612776c5e98922378
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
23KB
MD53f9941e04a73751dbe69bbef280478bb
SHA1b6031328888463350152159ca040f02b50d1df8d
SHA256d2a8d8c2dc0ce5406d6f6e0b9d01a2e93f029c16e9d7bf2ed5496e1c18707d2a
SHA51298fce95acdd35d0d0edb786bf1a61bd0774bfeac74f747e1d3d73036043925cb9ebe105c18bd1b3e1a3d3f609142df3e5be131912e0db84b64a50ce75b492233