Analysis
-
max time kernel
148s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 18:10
Static task
static1
Behavioral task
behavioral1
Sample
Fn Cheat Cracked/Driver Dump/driver.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Fn Cheat Cracked/Driver Dump/mapp.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
Fn Cheat Cracked/Driver Dump/mapp.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
Fn Cheat Cracked/fn (1).exe
Resource
win7-20241023-en
Behavioral task
behavioral5
Sample
Fn Cheat Cracked/fn (1).exe
Resource
win10v2004-20241007-en
General
-
Target
Fn Cheat Cracked/fn (1).exe
-
Size
6.1MB
-
MD5
75104ebb7b59d1cee81ee9855b0bfa0c
-
SHA1
122d4239f5e838c40a905bf8ee4270d2e7526367
-
SHA256
1cd7a63a349eacea2579932f9fdf40edf2eb57b62b76b18a92c1b7d0c82c81e0
-
SHA512
d9aebd3fc23ee26e6135b3b1607c2450c2a837aa383c24cd056ad63e1df7a5dfdc072a6f4f3654008d15d81eee339b25fb9e638a27eabf8bd314825a6c96de53
-
SSDEEP
196608:l4wCflR0SjSDiQckcU+PDF/5/ohgY/aULW:l4w86XcU+55AhgYrW
Malware Config
Extracted
redline
ingles
20.47.120.249:1912
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\Fn Cheat Cracked\._cache_build.exe family_redline behavioral4/memory/1784-49-0x0000000000BF0000-0x0000000000C42000-memory.dmp family_redline behavioral4/memory/2092-58-0x00000000003C0000-0x0000000000412000-memory.dmp family_redline -
Redline family
-
Xred family
-
Executes dropped EXE 5 IoCs
Processes:
build.exefn (1).exe._cache_build.exeSynaptics.exe._cache_Synaptics.exepid process 2796 build.exe 2952 fn (1).exe 1784 ._cache_build.exe 2860 Synaptics.exe 2092 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
Processes:
fn (1).exebuild.exeSynaptics.exepid process 1720 fn (1).exe 2796 build.exe 2796 build.exe 2796 build.exe 2796 build.exe 2860 Synaptics.exe 2860 Synaptics.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
build.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" build.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
build.exe._cache_build.exeSynaptics.exe._cache_Synaptics.exeEXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 924 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
fn (1).exe._cache_Synaptics.exe._cache_build.exepid process 1720 fn (1).exe 1720 fn (1).exe 1720 fn (1).exe 2092 ._cache_Synaptics.exe 1784 ._cache_build.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
fn (1).exe._cache_Synaptics.exe._cache_build.exedescription pid process Token: SeDebugPrivilege 1720 fn (1).exe Token: SeDebugPrivilege 2092 ._cache_Synaptics.exe Token: SeDebugPrivilege 1784 ._cache_build.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
EXCEL.EXEpid process 924 EXCEL.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
fn (1).exebuild.exeSynaptics.exedescription pid process target process PID 1720 wrote to memory of 2796 1720 fn (1).exe build.exe PID 1720 wrote to memory of 2796 1720 fn (1).exe build.exe PID 1720 wrote to memory of 2796 1720 fn (1).exe build.exe PID 1720 wrote to memory of 2796 1720 fn (1).exe build.exe PID 1720 wrote to memory of 2952 1720 fn (1).exe fn (1).exe PID 1720 wrote to memory of 2952 1720 fn (1).exe fn (1).exe PID 1720 wrote to memory of 2952 1720 fn (1).exe fn (1).exe PID 2796 wrote to memory of 1784 2796 build.exe ._cache_build.exe PID 2796 wrote to memory of 1784 2796 build.exe ._cache_build.exe PID 2796 wrote to memory of 1784 2796 build.exe ._cache_build.exe PID 2796 wrote to memory of 1784 2796 build.exe ._cache_build.exe PID 2796 wrote to memory of 2860 2796 build.exe Synaptics.exe PID 2796 wrote to memory of 2860 2796 build.exe Synaptics.exe PID 2796 wrote to memory of 2860 2796 build.exe Synaptics.exe PID 2796 wrote to memory of 2860 2796 build.exe Synaptics.exe PID 2860 wrote to memory of 2092 2860 Synaptics.exe ._cache_Synaptics.exe PID 2860 wrote to memory of 2092 2860 Synaptics.exe ._cache_Synaptics.exe PID 2860 wrote to memory of 2092 2860 Synaptics.exe ._cache_Synaptics.exe PID 2860 wrote to memory of 2092 2860 Synaptics.exe ._cache_Synaptics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fn Cheat Cracked\fn (1).exe"C:\Users\Admin\AppData\Local\Temp\Fn Cheat Cracked\fn (1).exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\Fn Cheat Cracked\._cache_build.exe"C:\Users\Admin\AppData\Local\Temp\Fn Cheat Cracked\._cache_build.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\Fn Cheat Cracked\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\Fn Cheat Cracked\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fn (1).exe"C:\Users\Admin\AppData\Local\Temp\fn (1).exe"2⤵
- Executes dropped EXE
PID:2952
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:924
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
24KB
MD53d31a57d0c1ba793743da691a99c9134
SHA1d91bf6e9a768dded8e126fbb5840344a5bb13412
SHA256e60f8afb97923e1a35fa28538e60aaa12fc905039b85b827bafe86d01f749512
SHA5125022a46eeba667c286e6734f2a615c4dae99fa114730d499a06fd04f746fe343b0fe847b4a24e638f260585c5ca77cd5653f2f5f1feead973d0e665413e88c9a
-
Filesize
1.1MB
MD5d02039cea2b82cf96f379bbca2037ce5
SHA1dc34845f3ea828a9491e51c6d24f36a81f31fbcf
SHA256bb052e34b833b6f6cd633582c8327bcbe047ec7c6fb92c5779333e4ce64a31a2
SHA512d0f61c70267ce87961b83d08bca7c78541cea1deafed4a9f85374eba44a40e0d23c900f8124d4cd0dbfd13dd47033b234ece5c1dec0851b2f980696c186397a3
-
Filesize
5.6MB
MD54c34798a036175206dd7bb6e643ac5ff
SHA1b1d3514ef4baa70ccdd570503e694c2f029502c3
SHA256cb40c1ca95c625a765998497d9ff01cbf34fa5af1fa7f382f5d91276dcf25087
SHA5121052718ecbf5312519833fcafd72e395832883ab6297eabe1bbf96d19bf03095d604fdaa178079af8ce26cb7238a6f4274e493527f4798a389690c231c6c5026
-
Filesize
300KB
MD51fd9c2646e5231884580f1f5db2103ee
SHA1863a8086c6b6f7aea54d1e75477b92fa8f66bdc9
SHA256b8f24a63a377011781bac73c4c9a38c750e862a10a44f28149835d7250d01037
SHA512da57d0f75d6842100a8bc10e7d25ac8afe5d136904acd1f81fa36d51f2ae87e87db61cdd673401b47a356c86df82c65d6558d2bac749f247e889ab6239d8ea16