Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 18:10
Static task
static1
Behavioral task
behavioral1
Sample
Fn Cheat Cracked/Driver Dump/driver.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Fn Cheat Cracked/Driver Dump/mapp.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
Fn Cheat Cracked/Driver Dump/mapp.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
Fn Cheat Cracked/fn (1).exe
Resource
win7-20241023-en
Behavioral task
behavioral5
Sample
Fn Cheat Cracked/fn (1).exe
Resource
win10v2004-20241007-en
General
-
Target
Fn Cheat Cracked/fn (1).exe
-
Size
6.1MB
-
MD5
75104ebb7b59d1cee81ee9855b0bfa0c
-
SHA1
122d4239f5e838c40a905bf8ee4270d2e7526367
-
SHA256
1cd7a63a349eacea2579932f9fdf40edf2eb57b62b76b18a92c1b7d0c82c81e0
-
SHA512
d9aebd3fc23ee26e6135b3b1607c2450c2a837aa383c24cd056ad63e1df7a5dfdc072a6f4f3654008d15d81eee339b25fb9e638a27eabf8bd314825a6c96de53
-
SSDEEP
196608:l4wCflR0SjSDiQckcU+PDF/5/ohgY/aULW:l4w86XcU+55AhgYrW
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Extracted
redline
ingles
20.47.120.249:1912
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Fn Cheat Cracked\._cache_build.exe family_redline behavioral5/memory/1884-152-0x0000000000AA0000-0x0000000000AF2000-memory.dmp family_redline -
Redline family
-
Xred family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
fn (1).exebuild.exeSynaptics.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation fn (1).exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation build.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 5 IoCs
Processes:
build.exefn (1).exe._cache_build.exeSynaptics.exe._cache_Synaptics.exepid process 3608 build.exe 436 fn (1).exe 1884 ._cache_build.exe 4908 Synaptics.exe 2984 ._cache_Synaptics.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
build.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" build.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 12 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
build.exe._cache_build.exeSynaptics.exe._cache_Synaptics.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
Processes:
build.exeSynaptics.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ build.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 2424 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 29 IoCs
Processes:
fn (1).exe._cache_build.exe._cache_Synaptics.exepid process 4328 fn (1).exe 4328 fn (1).exe 4328 fn (1).exe 4328 fn (1).exe 4328 fn (1).exe 4328 fn (1).exe 4328 fn (1).exe 4328 fn (1).exe 4328 fn (1).exe 4328 fn (1).exe 4328 fn (1).exe 4328 fn (1).exe 4328 fn (1).exe 4328 fn (1).exe 4328 fn (1).exe 4328 fn (1).exe 4328 fn (1).exe 4328 fn (1).exe 4328 fn (1).exe 4328 fn (1).exe 4328 fn (1).exe 4328 fn (1).exe 4328 fn (1).exe 1884 ._cache_build.exe 1884 ._cache_build.exe 2984 ._cache_Synaptics.exe 2984 ._cache_Synaptics.exe 1884 ._cache_build.exe 2984 ._cache_Synaptics.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
fn (1).exe._cache_build.exe._cache_Synaptics.exedescription pid process Token: SeDebugPrivilege 4328 fn (1).exe Token: SeDebugPrivilege 1884 ._cache_build.exe Token: SeDebugPrivilege 2984 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
EXCEL.EXEpid process 2424 EXCEL.EXE 2424 EXCEL.EXE 2424 EXCEL.EXE 2424 EXCEL.EXE 2424 EXCEL.EXE 2424 EXCEL.EXE 2424 EXCEL.EXE 2424 EXCEL.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
fn (1).exebuild.exeSynaptics.exedescription pid process target process PID 4328 wrote to memory of 3608 4328 fn (1).exe build.exe PID 4328 wrote to memory of 3608 4328 fn (1).exe build.exe PID 4328 wrote to memory of 3608 4328 fn (1).exe build.exe PID 4328 wrote to memory of 436 4328 fn (1).exe fn (1).exe PID 4328 wrote to memory of 436 4328 fn (1).exe fn (1).exe PID 3608 wrote to memory of 1884 3608 build.exe ._cache_build.exe PID 3608 wrote to memory of 1884 3608 build.exe ._cache_build.exe PID 3608 wrote to memory of 1884 3608 build.exe ._cache_build.exe PID 3608 wrote to memory of 4908 3608 build.exe Synaptics.exe PID 3608 wrote to memory of 4908 3608 build.exe Synaptics.exe PID 3608 wrote to memory of 4908 3608 build.exe Synaptics.exe PID 4908 wrote to memory of 2984 4908 Synaptics.exe ._cache_Synaptics.exe PID 4908 wrote to memory of 2984 4908 Synaptics.exe ._cache_Synaptics.exe PID 4908 wrote to memory of 2984 4908 Synaptics.exe ._cache_Synaptics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fn Cheat Cracked\fn (1).exe"C:\Users\Admin\AppData\Local\Temp\Fn Cheat Cracked\fn (1).exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\Fn Cheat Cracked\._cache_build.exe"C:\Users\Admin\AppData\Local\Temp\Fn Cheat Cracked\._cache_build.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1884
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\Fn Cheat Cracked\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\Fn Cheat Cracked\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2984
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fn (1).exe"C:\Users\Admin\AppData\Local\Temp\fn (1).exe"2⤵
- Executes dropped EXE
PID:436
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2424
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300KB
MD51fd9c2646e5231884580f1f5db2103ee
SHA1863a8086c6b6f7aea54d1e75477b92fa8f66bdc9
SHA256b8f24a63a377011781bac73c4c9a38c750e862a10a44f28149835d7250d01037
SHA512da57d0f75d6842100a8bc10e7d25ac8afe5d136904acd1f81fa36d51f2ae87e87db61cdd673401b47a356c86df82c65d6558d2bac749f247e889ab6239d8ea16
-
Filesize
22KB
MD57dfc6a5d12db07b8652cb1989cb91fb8
SHA1aa27e40b16c8f232114d4cd4efac6c243131a4bf
SHA2564ee06c854ed26094766a1afe7315e2f7b940715f94a4aade9bb744f9af0cbbd4
SHA5124c101b325e5074f96e2de5183d980150d21220afa425e711c0abbc4d4256011edda5ca9f284fcf729e6c48451b2fc97ca25aa8f27dfd37a288ff8f88a64ba5aa
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
1.1MB
MD5d02039cea2b82cf96f379bbca2037ce5
SHA1dc34845f3ea828a9491e51c6d24f36a81f31fbcf
SHA256bb052e34b833b6f6cd633582c8327bcbe047ec7c6fb92c5779333e4ce64a31a2
SHA512d0f61c70267ce87961b83d08bca7c78541cea1deafed4a9f85374eba44a40e0d23c900f8124d4cd0dbfd13dd47033b234ece5c1dec0851b2f980696c186397a3
-
Filesize
5.6MB
MD54c34798a036175206dd7bb6e643ac5ff
SHA1b1d3514ef4baa70ccdd570503e694c2f029502c3
SHA256cb40c1ca95c625a765998497d9ff01cbf34fa5af1fa7f382f5d91276dcf25087
SHA5121052718ecbf5312519833fcafd72e395832883ab6297eabe1bbf96d19bf03095d604fdaa178079af8ce26cb7238a6f4274e493527f4798a389690c231c6c5026