Analysis
-
max time kernel
981s -
max time network
951s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
23-11-2024 18:47
Behavioral task
behavioral1
Sample
Monoxidex86.harmless.exe
Resource
win11-20241007-en
General
-
Target
Monoxidex86.harmless.exe
-
Size
884KB
-
MD5
189957c510f529fc2021b84ae99f5757
-
SHA1
29f73b40e866f0ddea48e2744a0f9287c30fce02
-
SHA256
753a3eecee5ee27eaf31051bfae24f8c16c91ac83ae128190ef2e13cf2d69c01
-
SHA512
8a328298834bd6dce71c76baf77f6e2660ebb8038a930982e46d84e86b2078981ad095d44644c38650fdc2a29e18fa8ebc12da703a52314f7ad7030df6168fcb
-
SSDEEP
12288:8MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9op2BKwORo/Ej:8nsJ39LyjbJkQFMhmC+6GD9C2BKwcoc
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 276 ._cache_Monoxidex86.harmless.exe 5000 Synaptics.exe 5104 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" Monoxidex86.harmless.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Monoxidex86.harmless.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Monoxidex86.harmless.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Monoxidex86.harmless.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2304 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3024 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3024 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2304 EXCEL.EXE 2304 EXCEL.EXE 2304 EXCEL.EXE 2304 EXCEL.EXE 2304 EXCEL.EXE 2304 EXCEL.EXE 2304 EXCEL.EXE 2304 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1900 wrote to memory of 276 1900 Monoxidex86.harmless.exe 77 PID 1900 wrote to memory of 276 1900 Monoxidex86.harmless.exe 77 PID 1900 wrote to memory of 276 1900 Monoxidex86.harmless.exe 77 PID 1900 wrote to memory of 5000 1900 Monoxidex86.harmless.exe 78 PID 1900 wrote to memory of 5000 1900 Monoxidex86.harmless.exe 78 PID 1900 wrote to memory of 5000 1900 Monoxidex86.harmless.exe 78 PID 5000 wrote to memory of 5104 5000 Synaptics.exe 79 PID 5000 wrote to memory of 5104 5000 Synaptics.exe 79 PID 5000 wrote to memory of 5104 5000 Synaptics.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\Monoxidex86.harmless.exe"C:\Users\Admin\AppData\Local\Temp\Monoxidex86.harmless.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\._cache_Monoxidex86.harmless.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Monoxidex86.harmless.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:276
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5104
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004D8 0x00000000000004DC1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
884KB
MD5189957c510f529fc2021b84ae99f5757
SHA129f73b40e866f0ddea48e2744a0f9287c30fce02
SHA256753a3eecee5ee27eaf31051bfae24f8c16c91ac83ae128190ef2e13cf2d69c01
SHA5128a328298834bd6dce71c76baf77f6e2660ebb8038a930982e46d84e86b2078981ad095d44644c38650fdc2a29e18fa8ebc12da703a52314f7ad7030df6168fcb
-
Filesize
131KB
MD5bd65d387482def1fe00b50406f731763
SHA1d06a2ba2e29228f443f97d1dd3a8da5dd7df5903
SHA2561ab7375550516d7445c47fd9b551ed864f227401a14ff3f1ff0d70caca3bd997
SHA512351ecd109c4d49bc822e8ade73a9516c4a531ebcda63546c155e677dcff19708068dc588b2fcf30cad086238e8b206fc5f349d37dda02d3c3a8d9b570d92e4d9
-
Filesize
20KB
MD5f81c490c171cedd360eb634c179343fd
SHA158582417010b723de5a4cd692cae0a3d997d167e
SHA25641bafcb9aa515b402d6e30f56e0b4ce68758e16be452e5ac9dfe102ede33a6ec
SHA5126309b7b30bcb5f483e3681bbac2cce44a2c796e23a3e5de60f5b7f1944d96ada26866e93ec6e3471f41e852ffcdff3d4a4cfbf780130cfa085d4f6f5b3682396
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04