Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 19:04
Behavioral task
behavioral1
Sample
Monoxidex86.harmless.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Monoxidex86.harmless.exe
Resource
win10v2004-20241007-en
General
-
Target
Monoxidex86.harmless.exe
-
Size
884KB
-
MD5
189957c510f529fc2021b84ae99f5757
-
SHA1
29f73b40e866f0ddea48e2744a0f9287c30fce02
-
SHA256
753a3eecee5ee27eaf31051bfae24f8c16c91ac83ae128190ef2e13cf2d69c01
-
SHA512
8a328298834bd6dce71c76baf77f6e2660ebb8038a930982e46d84e86b2078981ad095d44644c38650fdc2a29e18fa8ebc12da703a52314f7ad7030df6168fcb
-
SSDEEP
12288:8MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9op2BKwORo/Ej:8nsJ39LyjbJkQFMhmC+6GD9C2BKwcoc
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
Processes:
._cache_Monoxidex86.harmless.exeSynaptics.exe._cache_Synaptics.exepid process 2888 ._cache_Monoxidex86.harmless.exe 2800 Synaptics.exe 2880 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
Processes:
Monoxidex86.harmless.exeSynaptics.exepid process 1232 Monoxidex86.harmless.exe 1232 Monoxidex86.harmless.exe 1232 Monoxidex86.harmless.exe 2800 Synaptics.exe 2800 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Monoxidex86.harmless.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" Monoxidex86.harmless.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Monoxidex86.harmless.exeSynaptics.exe._cache_Monoxidex86.harmless.exeEXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Monoxidex86.harmless.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Monoxidex86.harmless.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 2532 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
EXCEL.EXEpid process 2532 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Monoxidex86.harmless.exeSynaptics.exedescription pid process target process PID 1232 wrote to memory of 2888 1232 Monoxidex86.harmless.exe ._cache_Monoxidex86.harmless.exe PID 1232 wrote to memory of 2888 1232 Monoxidex86.harmless.exe ._cache_Monoxidex86.harmless.exe PID 1232 wrote to memory of 2888 1232 Monoxidex86.harmless.exe ._cache_Monoxidex86.harmless.exe PID 1232 wrote to memory of 2888 1232 Monoxidex86.harmless.exe ._cache_Monoxidex86.harmless.exe PID 1232 wrote to memory of 2800 1232 Monoxidex86.harmless.exe Synaptics.exe PID 1232 wrote to memory of 2800 1232 Monoxidex86.harmless.exe Synaptics.exe PID 1232 wrote to memory of 2800 1232 Monoxidex86.harmless.exe Synaptics.exe PID 1232 wrote to memory of 2800 1232 Monoxidex86.harmless.exe Synaptics.exe PID 2800 wrote to memory of 2880 2800 Synaptics.exe ._cache_Synaptics.exe PID 2800 wrote to memory of 2880 2800 Synaptics.exe ._cache_Synaptics.exe PID 2800 wrote to memory of 2880 2800 Synaptics.exe ._cache_Synaptics.exe PID 2800 wrote to memory of 2880 2800 Synaptics.exe ._cache_Synaptics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Monoxidex86.harmless.exe"C:\Users\Admin\AppData\Local\Temp\Monoxidex86.harmless.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\._cache_Monoxidex86.harmless.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Monoxidex86.harmless.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2888
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2880
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
884KB
MD5189957c510f529fc2021b84ae99f5757
SHA129f73b40e866f0ddea48e2744a0f9287c30fce02
SHA256753a3eecee5ee27eaf31051bfae24f8c16c91ac83ae128190ef2e13cf2d69c01
SHA5128a328298834bd6dce71c76baf77f6e2660ebb8038a930982e46d84e86b2078981ad095d44644c38650fdc2a29e18fa8ebc12da703a52314f7ad7030df6168fcb
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
131KB
MD5bd65d387482def1fe00b50406f731763
SHA1d06a2ba2e29228f443f97d1dd3a8da5dd7df5903
SHA2561ab7375550516d7445c47fd9b551ed864f227401a14ff3f1ff0d70caca3bd997
SHA512351ecd109c4d49bc822e8ade73a9516c4a531ebcda63546c155e677dcff19708068dc588b2fcf30cad086238e8b206fc5f349d37dda02d3c3a8d9b570d92e4d9