Analysis
-
max time kernel
10s -
max time network
13s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 18:04
Static task
static1
Behavioral task
behavioral1
Sample
Fn Cheat Cracked/Driver Dump/driver.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Fn Cheat Cracked/Driver Dump/mapp.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Fn Cheat Cracked/fn (1).exe
Resource
win10v2004-20241007-en
General
-
Target
Fn Cheat Cracked/fn (1).exe
-
Size
6.1MB
-
MD5
75104ebb7b59d1cee81ee9855b0bfa0c
-
SHA1
122d4239f5e838c40a905bf8ee4270d2e7526367
-
SHA256
1cd7a63a349eacea2579932f9fdf40edf2eb57b62b76b18a92c1b7d0c82c81e0
-
SHA512
d9aebd3fc23ee26e6135b3b1607c2450c2a837aa383c24cd056ad63e1df7a5dfdc072a6f4f3654008d15d81eee339b25fb9e638a27eabf8bd314825a6c96de53
-
SSDEEP
196608:l4wCflR0SjSDiQckcU+PDF/5/ohgY/aULW:l4w86XcU+55AhgYrW
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Extracted
redline
ingles
20.47.120.249:1912
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Fn Cheat Cracked\._cache_build.exe family_redline behavioral3/memory/3168-151-0x0000000000680000-0x00000000006D2000-memory.dmp family_redline -
Redline family
-
Xred family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Synaptics.exefn (1).exebuild.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation fn (1).exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation build.exe -
Executes dropped EXE 5 IoCs
Processes:
build.exefn (1).exe._cache_build.exeSynaptics.exe._cache_Synaptics.exepid process 496 build.exe 2080 fn (1).exe 3168 ._cache_build.exe 4964 Synaptics.exe 1276 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
build.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" build.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 14 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
._cache_Synaptics.exebuild.exe._cache_build.exeSynaptics.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
Modifies registry class 2 IoCs
Processes:
Synaptics.exebuild.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ build.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 4448 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
fn (1).exepid process 4996 fn (1).exe 4996 fn (1).exe 4996 fn (1).exe 4996 fn (1).exe 4996 fn (1).exe 4996 fn (1).exe 4996 fn (1).exe 4996 fn (1).exe 4996 fn (1).exe 4996 fn (1).exe 4996 fn (1).exe 4996 fn (1).exe 4996 fn (1).exe 4996 fn (1).exe 4996 fn (1).exe 4996 fn (1).exe 4996 fn (1).exe 4996 fn (1).exe 4996 fn (1).exe 4996 fn (1).exe 4996 fn (1).exe 4996 fn (1).exe 4996 fn (1).exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
fn (1).exedescription pid process Token: SeDebugPrivilege 4996 fn (1).exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
EXCEL.EXEpid process 4448 EXCEL.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
fn (1).exebuild.exeSynaptics.exedescription pid process target process PID 4996 wrote to memory of 496 4996 fn (1).exe build.exe PID 4996 wrote to memory of 496 4996 fn (1).exe build.exe PID 4996 wrote to memory of 496 4996 fn (1).exe build.exe PID 4996 wrote to memory of 2080 4996 fn (1).exe fn (1).exe PID 4996 wrote to memory of 2080 4996 fn (1).exe fn (1).exe PID 496 wrote to memory of 3168 496 build.exe ._cache_build.exe PID 496 wrote to memory of 3168 496 build.exe ._cache_build.exe PID 496 wrote to memory of 3168 496 build.exe ._cache_build.exe PID 496 wrote to memory of 4964 496 build.exe Synaptics.exe PID 496 wrote to memory of 4964 496 build.exe Synaptics.exe PID 496 wrote to memory of 4964 496 build.exe Synaptics.exe PID 4964 wrote to memory of 1276 4964 Synaptics.exe ._cache_Synaptics.exe PID 4964 wrote to memory of 1276 4964 Synaptics.exe ._cache_Synaptics.exe PID 4964 wrote to memory of 1276 4964 Synaptics.exe ._cache_Synaptics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fn Cheat Cracked\fn (1).exe"C:\Users\Admin\AppData\Local\Temp\Fn Cheat Cracked\fn (1).exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:496 -
C:\Users\Admin\AppData\Local\Temp\Fn Cheat Cracked\._cache_build.exe"C:\Users\Admin\AppData\Local\Temp\Fn Cheat Cracked\._cache_build.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3168
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\Fn Cheat Cracked\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\Fn Cheat Cracked\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1276
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fn (1).exe"C:\Users\Admin\AppData\Local\Temp\fn (1).exe"2⤵
- Executes dropped EXE
PID:2080
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD5bbe6dadca05b03ba0cf618bb62e1ab57
SHA17209d07bdc5fe90354192747babb1a800e354ef7
SHA256598790c14eee82856b68b2216c7f347d8168d4515da5fbb971d0f45bb84afde3
SHA51258a593917442d35505db08ad046ce1075cd995a445dfde3e0d9f709f929133a71815d1a6778620b2d7d58e930589afdc9180e8e9e71205c6d5b9369b854b41e1
-
Filesize
300KB
MD51fd9c2646e5231884580f1f5db2103ee
SHA1863a8086c6b6f7aea54d1e75477b92fa8f66bdc9
SHA256b8f24a63a377011781bac73c4c9a38c750e862a10a44f28149835d7250d01037
SHA512da57d0f75d6842100a8bc10e7d25ac8afe5d136904acd1f81fa36d51f2ae87e87db61cdd673401b47a356c86df82c65d6558d2bac749f247e889ab6239d8ea16
-
Filesize
1.1MB
MD5d02039cea2b82cf96f379bbca2037ce5
SHA1dc34845f3ea828a9491e51c6d24f36a81f31fbcf
SHA256bb052e34b833b6f6cd633582c8327bcbe047ec7c6fb92c5779333e4ce64a31a2
SHA512d0f61c70267ce87961b83d08bca7c78541cea1deafed4a9f85374eba44a40e0d23c900f8124d4cd0dbfd13dd47033b234ece5c1dec0851b2f980696c186397a3
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
5.6MB
MD54c34798a036175206dd7bb6e643ac5ff
SHA1b1d3514ef4baa70ccdd570503e694c2f029502c3
SHA256cb40c1ca95c625a765998497d9ff01cbf34fa5af1fa7f382f5d91276dcf25087
SHA5121052718ecbf5312519833fcafd72e395832883ab6297eabe1bbf96d19bf03095d604fdaa178079af8ce26cb7238a6f4274e493527f4798a389690c231c6c5026