Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 06:02
Behavioral task
behavioral1
Sample
5a42040f74b27ca9546fedea26a987788a38395c8dc5703ee8ea906b72020588N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5a42040f74b27ca9546fedea26a987788a38395c8dc5703ee8ea906b72020588N.exe
Resource
win10v2004-20241007-en
General
-
Target
5a42040f74b27ca9546fedea26a987788a38395c8dc5703ee8ea906b72020588N.exe
-
Size
767KB
-
MD5
5155ce92308f62e4034ebb0a6a44eba0
-
SHA1
17e29545c931dd0ff2eedb84f16dc5c3aee8fb4a
-
SHA256
5a42040f74b27ca9546fedea26a987788a38395c8dc5703ee8ea906b72020588
-
SHA512
f93fd3d2c15163a4d3bf15f23a1eb0e0297d5f67df18c943015d0ac729676bb0df1e180a964ee170aae2f7d3649d309281e3af03aed33e95d94ff8b54e7960d6
-
SSDEEP
12288:yMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9g1KE+VIemF:ynsJ39LyjbJkQFMhmC+6GD9UKE+VIe4
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2340 ._cache_5a42040f74b27ca9546fedea26a987788a38395c8dc5703ee8ea906b72020588N.exe 568 Synaptics.exe 2892 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 2348 5a42040f74b27ca9546fedea26a987788a38395c8dc5703ee8ea906b72020588N.exe 2348 5a42040f74b27ca9546fedea26a987788a38395c8dc5703ee8ea906b72020588N.exe 2348 5a42040f74b27ca9546fedea26a987788a38395c8dc5703ee8ea906b72020588N.exe 2348 5a42040f74b27ca9546fedea26a987788a38395c8dc5703ee8ea906b72020588N.exe 568 Synaptics.exe 568 Synaptics.exe 568 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 5a42040f74b27ca9546fedea26a987788a38395c8dc5703ee8ea906b72020588N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a42040f74b27ca9546fedea26a987788a38395c8dc5703ee8ea906b72020588N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2812 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2812 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2340 2348 5a42040f74b27ca9546fedea26a987788a38395c8dc5703ee8ea906b72020588N.exe 30 PID 2348 wrote to memory of 2340 2348 5a42040f74b27ca9546fedea26a987788a38395c8dc5703ee8ea906b72020588N.exe 30 PID 2348 wrote to memory of 2340 2348 5a42040f74b27ca9546fedea26a987788a38395c8dc5703ee8ea906b72020588N.exe 30 PID 2348 wrote to memory of 2340 2348 5a42040f74b27ca9546fedea26a987788a38395c8dc5703ee8ea906b72020588N.exe 30 PID 2348 wrote to memory of 568 2348 5a42040f74b27ca9546fedea26a987788a38395c8dc5703ee8ea906b72020588N.exe 32 PID 2348 wrote to memory of 568 2348 5a42040f74b27ca9546fedea26a987788a38395c8dc5703ee8ea906b72020588N.exe 32 PID 2348 wrote to memory of 568 2348 5a42040f74b27ca9546fedea26a987788a38395c8dc5703ee8ea906b72020588N.exe 32 PID 2348 wrote to memory of 568 2348 5a42040f74b27ca9546fedea26a987788a38395c8dc5703ee8ea906b72020588N.exe 32 PID 568 wrote to memory of 2892 568 Synaptics.exe 33 PID 568 wrote to memory of 2892 568 Synaptics.exe 33 PID 568 wrote to memory of 2892 568 Synaptics.exe 33 PID 568 wrote to memory of 2892 568 Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a42040f74b27ca9546fedea26a987788a38395c8dc5703ee8ea906b72020588N.exe"C:\Users\Admin\AppData\Local\Temp\5a42040f74b27ca9546fedea26a987788a38395c8dc5703ee8ea906b72020588N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\._cache_5a42040f74b27ca9546fedea26a987788a38395c8dc5703ee8ea906b72020588N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_5a42040f74b27ca9546fedea26a987788a38395c8dc5703ee8ea906b72020588N.exe"2⤵
- Executes dropped EXE
PID:2340
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2892
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
767KB
MD55155ce92308f62e4034ebb0a6a44eba0
SHA117e29545c931dd0ff2eedb84f16dc5c3aee8fb4a
SHA2565a42040f74b27ca9546fedea26a987788a38395c8dc5703ee8ea906b72020588
SHA512f93fd3d2c15163a4d3bf15f23a1eb0e0297d5f67df18c943015d0ac729676bb0df1e180a964ee170aae2f7d3649d309281e3af03aed33e95d94ff8b54e7960d6
-
C:\Users\Admin\AppData\Local\Temp\._cache_5a42040f74b27ca9546fedea26a987788a38395c8dc5703ee8ea906b72020588N.exe
Filesize13KB
MD584fd44b4b30da69be28538b2a4eb3849
SHA12aca5149336162091e9bce82a122e31f92e9a13c
SHA2563d4fa2424acb9803c893b68da9691a85200305f0683abd8c4c702781ec6f5161
SHA512c819b612161edb71824fc1bbe87c48a71816166d6ab5021cf9d664e2f0820c83088cf5d37d3ee59d39b8ea43d30500ad1a3b2775c896505a3078413d585bb55c
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
22KB
MD50053e8d0d592baa01d6c63c64b4929a0
SHA1b8c862270c6540159575489327f485e5f00214d8
SHA256f3b351f78b7d12f59c4466e5b9998beadd8a5b4203225ef5994984e547b80150
SHA51200d6dabf09112373e8b2838cd3b966ae21e8f543ef175864206b48e72a7dbce60df68b00aa761c7ae14b6befaaa943a842631b9951748a6a712b3cc74339f759
-
Filesize
25KB
MD593709857a9f90ebdfdc70986a5196e28
SHA19f9f4df95cdbce1c27c0e6f4d27708c0d19d0911
SHA25672c293e7a05c2ea79ddb84630a4f215078aa802d2e338c90bf353b2241356f35
SHA5125721dfc7afe098b87187236a0bd1a78aa0978ae6e97a2c99e0e5fb3819ab562b003b0f8606a3428d8f7b9d42e9bdae3271a40e6b2268675c04d7960870cca9ef