Analysis
-
max time kernel
112s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 18:22
Behavioral task
behavioral1
Sample
e2e78ea20a6a4785a7723d8671d3e3fdb48d3b8de34f07b71becfd1ac1bed601N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e2e78ea20a6a4785a7723d8671d3e3fdb48d3b8de34f07b71becfd1ac1bed601N.exe
Resource
win10v2004-20241007-en
General
-
Target
e2e78ea20a6a4785a7723d8671d3e3fdb48d3b8de34f07b71becfd1ac1bed601N.exe
-
Size
763KB
-
MD5
8b6cc1268113da1c722d64aaac6cd4d0
-
SHA1
24d876ff76af73561e489fc8a2d4cdc8170e9620
-
SHA256
e2e78ea20a6a4785a7723d8671d3e3fdb48d3b8de34f07b71becfd1ac1bed601
-
SHA512
5f671699e3981bf2d7cf41e63741f6c5202cb9bb6e87582e4f891793c8052be62465ded38424f431d26ebe444851ed517b10b9eef83ed609d211bbaec29362bc
-
SSDEEP
12288:mMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9+1KE+VIB/:mnsJ39LyjbJkQFMhmC+6GD9OKE+VIF
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
e2e78ea20a6a4785a7723d8671d3e3fdb48d3b8de34f07b71becfd1ac1bed601N.exeSynaptics.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation e2e78ea20a6a4785a7723d8671d3e3fdb48d3b8de34f07b71becfd1ac1bed601N.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
Processes:
._cache_e2e78ea20a6a4785a7723d8671d3e3fdb48d3b8de34f07b71becfd1ac1bed601N.exeSynaptics.exe._cache_Synaptics.exepid Process 4716 ._cache_e2e78ea20a6a4785a7723d8671d3e3fdb48d3b8de34f07b71becfd1ac1bed601N.exe 2904 Synaptics.exe 4384 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
e2e78ea20a6a4785a7723d8671d3e3fdb48d3b8de34f07b71becfd1ac1bed601N.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" e2e78ea20a6a4785a7723d8671d3e3fdb48d3b8de34f07b71becfd1ac1bed601N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
e2e78ea20a6a4785a7723d8671d3e3fdb48d3b8de34f07b71becfd1ac1bed601N.exeSynaptics.exe._cache_e2e78ea20a6a4785a7723d8671d3e3fdb48d3b8de34f07b71becfd1ac1bed601N.exe._cache_Synaptics.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2e78ea20a6a4785a7723d8671d3e3fdb48d3b8de34f07b71becfd1ac1bed601N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_e2e78ea20a6a4785a7723d8671d3e3fdb48d3b8de34f07b71becfd1ac1bed601N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Modifies registry class 2 IoCs
Processes:
e2e78ea20a6a4785a7723d8671d3e3fdb48d3b8de34f07b71becfd1ac1bed601N.exeSynaptics.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ e2e78ea20a6a4785a7723d8671d3e3fdb48d3b8de34f07b71becfd1ac1bed601N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
e2e78ea20a6a4785a7723d8671d3e3fdb48d3b8de34f07b71becfd1ac1bed601N.exeSynaptics.exedescription pid Process procid_target PID 3016 wrote to memory of 4716 3016 e2e78ea20a6a4785a7723d8671d3e3fdb48d3b8de34f07b71becfd1ac1bed601N.exe 83 PID 3016 wrote to memory of 4716 3016 e2e78ea20a6a4785a7723d8671d3e3fdb48d3b8de34f07b71becfd1ac1bed601N.exe 83 PID 3016 wrote to memory of 4716 3016 e2e78ea20a6a4785a7723d8671d3e3fdb48d3b8de34f07b71becfd1ac1bed601N.exe 83 PID 3016 wrote to memory of 2904 3016 e2e78ea20a6a4785a7723d8671d3e3fdb48d3b8de34f07b71becfd1ac1bed601N.exe 85 PID 3016 wrote to memory of 2904 3016 e2e78ea20a6a4785a7723d8671d3e3fdb48d3b8de34f07b71becfd1ac1bed601N.exe 85 PID 3016 wrote to memory of 2904 3016 e2e78ea20a6a4785a7723d8671d3e3fdb48d3b8de34f07b71becfd1ac1bed601N.exe 85 PID 2904 wrote to memory of 4384 2904 Synaptics.exe 86 PID 2904 wrote to memory of 4384 2904 Synaptics.exe 86 PID 2904 wrote to memory of 4384 2904 Synaptics.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2e78ea20a6a4785a7723d8671d3e3fdb48d3b8de34f07b71becfd1ac1bed601N.exe"C:\Users\Admin\AppData\Local\Temp\e2e78ea20a6a4785a7723d8671d3e3fdb48d3b8de34f07b71becfd1ac1bed601N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\._cache_e2e78ea20a6a4785a7723d8671d3e3fdb48d3b8de34f07b71becfd1ac1bed601N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_e2e78ea20a6a4785a7723d8671d3e3fdb48d3b8de34f07b71becfd1ac1bed601N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4716
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4384
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
763KB
MD58b6cc1268113da1c722d64aaac6cd4d0
SHA124d876ff76af73561e489fc8a2d4cdc8170e9620
SHA256e2e78ea20a6a4785a7723d8671d3e3fdb48d3b8de34f07b71becfd1ac1bed601
SHA5125f671699e3981bf2d7cf41e63741f6c5202cb9bb6e87582e4f891793c8052be62465ded38424f431d26ebe444851ed517b10b9eef83ed609d211bbaec29362bc
-
C:\Users\Admin\AppData\Local\Temp\._cache_e2e78ea20a6a4785a7723d8671d3e3fdb48d3b8de34f07b71becfd1ac1bed601N.exe
Filesize10KB
MD5f4ac24ba12d03fde6c392f5c8177f000
SHA1303ec6325824c7c2b096893c751ce953955e65e1
SHA25642937434f11c2ebc51f81b6accede45515f244d97c8cc25adae2f88537070608
SHA512b276f79060703a645f2193bd7ab73ccc2196e6ecfc6c5f431d9b182b3ec30f07fb6aebf35368f4995dbd42f1c65070f6dada4245d80be79d958cb2eae2edbe04