Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 00:16
Behavioral task
behavioral1
Sample
9524a1cadb215fe07b2bd4ee53f1f5492dada313e84ce1cb01b56006b1b7b6b3N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9524a1cadb215fe07b2bd4ee53f1f5492dada313e84ce1cb01b56006b1b7b6b3N.exe
Resource
win10v2004-20241007-en
General
-
Target
9524a1cadb215fe07b2bd4ee53f1f5492dada313e84ce1cb01b56006b1b7b6b3N.exe
-
Size
769KB
-
MD5
6db4320c191b06ddd85567b74efb6e70
-
SHA1
747086d62c1b6b441a10a055334de4813addff78
-
SHA256
9524a1cadb215fe07b2bd4ee53f1f5492dada313e84ce1cb01b56006b1b7b6b3
-
SHA512
3256d70188c5ff90b35b7b4f0ab00df6117ccd4c84ce9dd223118732a1b28d1eeb02bc12b74fe607585c6e55e60e38a7797e4cd83cae69ce01f2773f0108fc75
-
SSDEEP
12288:yMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V911KE+VIo1/:ynsJ39LyjbJkQFMhmC+6GD9fKE+VIop
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2948 ._cache_9524a1cadb215fe07b2bd4ee53f1f5492dada313e84ce1cb01b56006b1b7b6b3N.exe 3052 Synaptics.exe 2836 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 1736 9524a1cadb215fe07b2bd4ee53f1f5492dada313e84ce1cb01b56006b1b7b6b3N.exe 1736 9524a1cadb215fe07b2bd4ee53f1f5492dada313e84ce1cb01b56006b1b7b6b3N.exe 1736 9524a1cadb215fe07b2bd4ee53f1f5492dada313e84ce1cb01b56006b1b7b6b3N.exe 3052 Synaptics.exe 3052 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 9524a1cadb215fe07b2bd4ee53f1f5492dada313e84ce1cb01b56006b1b7b6b3N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9524a1cadb215fe07b2bd4ee53f1f5492dada313e84ce1cb01b56006b1b7b6b3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2524 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2524 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2948 1736 9524a1cadb215fe07b2bd4ee53f1f5492dada313e84ce1cb01b56006b1b7b6b3N.exe 30 PID 1736 wrote to memory of 2948 1736 9524a1cadb215fe07b2bd4ee53f1f5492dada313e84ce1cb01b56006b1b7b6b3N.exe 30 PID 1736 wrote to memory of 2948 1736 9524a1cadb215fe07b2bd4ee53f1f5492dada313e84ce1cb01b56006b1b7b6b3N.exe 30 PID 1736 wrote to memory of 2948 1736 9524a1cadb215fe07b2bd4ee53f1f5492dada313e84ce1cb01b56006b1b7b6b3N.exe 30 PID 1736 wrote to memory of 3052 1736 9524a1cadb215fe07b2bd4ee53f1f5492dada313e84ce1cb01b56006b1b7b6b3N.exe 32 PID 1736 wrote to memory of 3052 1736 9524a1cadb215fe07b2bd4ee53f1f5492dada313e84ce1cb01b56006b1b7b6b3N.exe 32 PID 1736 wrote to memory of 3052 1736 9524a1cadb215fe07b2bd4ee53f1f5492dada313e84ce1cb01b56006b1b7b6b3N.exe 32 PID 1736 wrote to memory of 3052 1736 9524a1cadb215fe07b2bd4ee53f1f5492dada313e84ce1cb01b56006b1b7b6b3N.exe 32 PID 3052 wrote to memory of 2836 3052 Synaptics.exe 33 PID 3052 wrote to memory of 2836 3052 Synaptics.exe 33 PID 3052 wrote to memory of 2836 3052 Synaptics.exe 33 PID 3052 wrote to memory of 2836 3052 Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\9524a1cadb215fe07b2bd4ee53f1f5492dada313e84ce1cb01b56006b1b7b6b3N.exe"C:\Users\Admin\AppData\Local\Temp\9524a1cadb215fe07b2bd4ee53f1f5492dada313e84ce1cb01b56006b1b7b6b3N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\._cache_9524a1cadb215fe07b2bd4ee53f1f5492dada313e84ce1cb01b56006b1b7b6b3N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_9524a1cadb215fe07b2bd4ee53f1f5492dada313e84ce1cb01b56006b1b7b6b3N.exe"2⤵
- Executes dropped EXE
PID:2948
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2836
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
769KB
MD56db4320c191b06ddd85567b74efb6e70
SHA1747086d62c1b6b441a10a055334de4813addff78
SHA2569524a1cadb215fe07b2bd4ee53f1f5492dada313e84ce1cb01b56006b1b7b6b3
SHA5123256d70188c5ff90b35b7b4f0ab00df6117ccd4c84ce9dd223118732a1b28d1eeb02bc12b74fe607585c6e55e60e38a7797e4cd83cae69ce01f2773f0108fc75
-
Filesize
24KB
MD5301bf8a8c0d95151d6c5d2ff20d7691c
SHA1c1b9811995bd6010d0de970d937451a2a1475786
SHA256dd7bc18fde6e296e2bc726ac5171d86892f14fea60a546c4bc1e24ec3a8ffd39
SHA512ed36ab1f6ce95be8bf8096b135b8e1b62593bc7b6afa1d8a4fc4f84942f0859828fe0568854f521df1d6bddd968e660236ea3fbe07d6a17cd4a34d1f0688bd79
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
\Users\Admin\AppData\Local\Temp\._cache_9524a1cadb215fe07b2bd4ee53f1f5492dada313e84ce1cb01b56006b1b7b6b3N.exe
Filesize15KB
MD5a66641f10443a02ffb730bcc6c2f630c
SHA1fc8c9ac0b0fda230c8cb47b1c98fc6daf5c6b0ed
SHA2563898114b93d5102fda924637e06c952c1cf0477223b61f0138086a6a73120a89
SHA512ead3c4825d9cdc0877f267b9853014cc408555fcf4eafdb1ae0778c6a194ca4d6352d24512429efa109b92a33f07f2cc97994f71e346e43c188256f8a9ec6c7a