Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
111s -
max time network
113s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
23/11/2024, 22:33
Behavioral task
behavioral1
Sample
ab1cdcf0bada426608d4bd9fb70a0509241e16189ed9fa9ec61b11f61e04c0afN.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
ab1cdcf0bada426608d4bd9fb70a0509241e16189ed9fa9ec61b11f61e04c0afN.exe
Resource
win10v2004-20241007-en
General
-
Target
ab1cdcf0bada426608d4bd9fb70a0509241e16189ed9fa9ec61b11f61e04c0afN.exe
-
Size
765KB
-
MD5
51b31921043d037ae37b4b2939cb1e90
-
SHA1
586c1c5350541c9a792f347d6bf57459c2c3ff92
-
SHA256
ab1cdcf0bada426608d4bd9fb70a0509241e16189ed9fa9ec61b11f61e04c0af
-
SHA512
21acfab2a0c19c92ecacaccaffd1ae4cbc68d6016aaaf6f9bcaccc61604b74e7a40e15febc4e7d587a9a14bd6a5a86b28a950e9856775ff29cfab8c8a2780ac7
-
SSDEEP
12288:WMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9m1KE+VIl4Pj:WnsJ39LyjbJkQFMhmC+6GD9GKE+VIl4b
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2608 ._cache_ab1cdcf0bada426608d4bd9fb70a0509241e16189ed9fa9ec61b11f61e04c0afN.exe 2284 Synaptics.exe 2904 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 1644 ab1cdcf0bada426608d4bd9fb70a0509241e16189ed9fa9ec61b11f61e04c0afN.exe 1644 ab1cdcf0bada426608d4bd9fb70a0509241e16189ed9fa9ec61b11f61e04c0afN.exe 1644 ab1cdcf0bada426608d4bd9fb70a0509241e16189ed9fa9ec61b11f61e04c0afN.exe 2284 Synaptics.exe 2284 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" ab1cdcf0bada426608d4bd9fb70a0509241e16189ed9fa9ec61b11f61e04c0afN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab1cdcf0bada426608d4bd9fb70a0509241e16189ed9fa9ec61b11f61e04c0afN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2692 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2692 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1644 wrote to memory of 2608 1644 ab1cdcf0bada426608d4bd9fb70a0509241e16189ed9fa9ec61b11f61e04c0afN.exe 30 PID 1644 wrote to memory of 2608 1644 ab1cdcf0bada426608d4bd9fb70a0509241e16189ed9fa9ec61b11f61e04c0afN.exe 30 PID 1644 wrote to memory of 2608 1644 ab1cdcf0bada426608d4bd9fb70a0509241e16189ed9fa9ec61b11f61e04c0afN.exe 30 PID 1644 wrote to memory of 2608 1644 ab1cdcf0bada426608d4bd9fb70a0509241e16189ed9fa9ec61b11f61e04c0afN.exe 30 PID 1644 wrote to memory of 2284 1644 ab1cdcf0bada426608d4bd9fb70a0509241e16189ed9fa9ec61b11f61e04c0afN.exe 32 PID 1644 wrote to memory of 2284 1644 ab1cdcf0bada426608d4bd9fb70a0509241e16189ed9fa9ec61b11f61e04c0afN.exe 32 PID 1644 wrote to memory of 2284 1644 ab1cdcf0bada426608d4bd9fb70a0509241e16189ed9fa9ec61b11f61e04c0afN.exe 32 PID 1644 wrote to memory of 2284 1644 ab1cdcf0bada426608d4bd9fb70a0509241e16189ed9fa9ec61b11f61e04c0afN.exe 32 PID 2284 wrote to memory of 2904 2284 Synaptics.exe 33 PID 2284 wrote to memory of 2904 2284 Synaptics.exe 33 PID 2284 wrote to memory of 2904 2284 Synaptics.exe 33 PID 2284 wrote to memory of 2904 2284 Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab1cdcf0bada426608d4bd9fb70a0509241e16189ed9fa9ec61b11f61e04c0afN.exe"C:\Users\Admin\AppData\Local\Temp\ab1cdcf0bada426608d4bd9fb70a0509241e16189ed9fa9ec61b11f61e04c0afN.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\._cache_ab1cdcf0bada426608d4bd9fb70a0509241e16189ed9fa9ec61b11f61e04c0afN.exe"C:\Users\Admin\AppData\Local\Temp\._cache_ab1cdcf0bada426608d4bd9fb70a0509241e16189ed9fa9ec61b11f61e04c0afN.exe"2⤵
- Executes dropped EXE
PID:2608
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2904
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
765KB
MD551b31921043d037ae37b4b2939cb1e90
SHA1586c1c5350541c9a792f347d6bf57459c2c3ff92
SHA256ab1cdcf0bada426608d4bd9fb70a0509241e16189ed9fa9ec61b11f61e04c0af
SHA51221acfab2a0c19c92ecacaccaffd1ae4cbc68d6016aaaf6f9bcaccc61604b74e7a40e15febc4e7d587a9a14bd6a5a86b28a950e9856775ff29cfab8c8a2780ac7
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
24KB
MD589d59725cc742856ad9a459e8486e9ca
SHA10a81745609a315d578e2e85c20c73af56b27aeda
SHA2560c8e05e7d30f13290b4c9595abcc44b00024d88e4261075c7bfa53eb9127d513
SHA512ef0c6602b10aa88c6703350b3560a9e31532d2b89e6b3bb5159bff90fe7631f4a90c1b3991d8c41201cd8786ed2c74eee685f0017a51619d9c6c1baef10bafda
-
\Users\Admin\AppData\Local\Temp\._cache_ab1cdcf0bada426608d4bd9fb70a0509241e16189ed9fa9ec61b11f61e04c0afN.exe
Filesize12KB
MD5a4cde91d4fa8f459306ed07b5349eed5
SHA1094eb0f807647e51ebc740f16b546be4a36e964e
SHA256ebc4263dea5a956e25c40b586d13fead65e55f209af0ff484faf909f4cdc621d
SHA512618d2aedc9dd3ab6d12e09f638c3f401ce877de5d17ffd09acf04cbba140b6a2fe571ae561e7933d54fc6bbbf79109648b6cc52bf5e4c581449c0736ca44588a