Analysis
-
max time kernel
141s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 02:55
Behavioral task
behavioral1
Sample
bf7700d0b025ef158f166015ec391ff8cb93a12c3b8644b49948caed69389057.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
bf7700d0b025ef158f166015ec391ff8cb93a12c3b8644b49948caed69389057.exe
Resource
win10v2004-20241007-en
General
-
Target
bf7700d0b025ef158f166015ec391ff8cb93a12c3b8644b49948caed69389057.exe
-
Size
4.2MB
-
MD5
6e9cae124971221351f356b3bdad7edb
-
SHA1
5c58ecaba6422ced12338191481db46148f2d2b3
-
SHA256
bf7700d0b025ef158f166015ec391ff8cb93a12c3b8644b49948caed69389057
-
SHA512
9d47d04869ccbd4ea60cbdbb9b6ae4c88442820a12c8184166a23861a346f10804c82d52bf972f6a0936f3b3a1a6d167a7be6d86723692ab14e3fa407f9906dc
-
SSDEEP
98304:jnsmtk2aCu2rd6vFGq/ZkPcdGlGW49VZBXukIWf9RZB:7L/uwd6v8q/2PCGl4DL5IwRZB
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2316 ._cache_bf7700d0b025ef158f166015ec391ff8cb93a12c3b8644b49948caed69389057.exe 884 Synaptics.exe 2964 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 3060 bf7700d0b025ef158f166015ec391ff8cb93a12c3b8644b49948caed69389057.exe 3060 bf7700d0b025ef158f166015ec391ff8cb93a12c3b8644b49948caed69389057.exe 3060 bf7700d0b025ef158f166015ec391ff8cb93a12c3b8644b49948caed69389057.exe 884 Synaptics.exe 884 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" bf7700d0b025ef158f166015ec391ff8cb93a12c3b8644b49948caed69389057.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf7700d0b025ef158f166015ec391ff8cb93a12c3b8644b49948caed69389057.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_bf7700d0b025ef158f166015ec391ff8cb93a12c3b8644b49948caed69389057.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main ._cache_bf7700d0b025ef158f166015ec391ff8cb93a12c3b8644b49948caed69389057.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main ._cache_Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2848 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2316 ._cache_bf7700d0b025ef158f166015ec391ff8cb93a12c3b8644b49948caed69389057.exe 2316 ._cache_bf7700d0b025ef158f166015ec391ff8cb93a12c3b8644b49948caed69389057.exe 2848 EXCEL.EXE 2964 ._cache_Synaptics.exe 2964 ._cache_Synaptics.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3060 wrote to memory of 2316 3060 bf7700d0b025ef158f166015ec391ff8cb93a12c3b8644b49948caed69389057.exe 30 PID 3060 wrote to memory of 2316 3060 bf7700d0b025ef158f166015ec391ff8cb93a12c3b8644b49948caed69389057.exe 30 PID 3060 wrote to memory of 2316 3060 bf7700d0b025ef158f166015ec391ff8cb93a12c3b8644b49948caed69389057.exe 30 PID 3060 wrote to memory of 2316 3060 bf7700d0b025ef158f166015ec391ff8cb93a12c3b8644b49948caed69389057.exe 30 PID 3060 wrote to memory of 884 3060 bf7700d0b025ef158f166015ec391ff8cb93a12c3b8644b49948caed69389057.exe 31 PID 3060 wrote to memory of 884 3060 bf7700d0b025ef158f166015ec391ff8cb93a12c3b8644b49948caed69389057.exe 31 PID 3060 wrote to memory of 884 3060 bf7700d0b025ef158f166015ec391ff8cb93a12c3b8644b49948caed69389057.exe 31 PID 3060 wrote to memory of 884 3060 bf7700d0b025ef158f166015ec391ff8cb93a12c3b8644b49948caed69389057.exe 31 PID 884 wrote to memory of 2964 884 Synaptics.exe 32 PID 884 wrote to memory of 2964 884 Synaptics.exe 32 PID 884 wrote to memory of 2964 884 Synaptics.exe 32 PID 884 wrote to memory of 2964 884 Synaptics.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf7700d0b025ef158f166015ec391ff8cb93a12c3b8644b49948caed69389057.exe"C:\Users\Admin\AppData\Local\Temp\bf7700d0b025ef158f166015ec391ff8cb93a12c3b8644b49948caed69389057.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\._cache_bf7700d0b025ef158f166015ec391ff8cb93a12c3b8644b49948caed69389057.exe"C:\Users\Admin\AppData\Local\Temp\._cache_bf7700d0b025ef158f166015ec391ff8cb93a12c3b8644b49948caed69389057.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2316
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2964
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD56e9cae124971221351f356b3bdad7edb
SHA15c58ecaba6422ced12338191481db46148f2d2b3
SHA256bf7700d0b025ef158f166015ec391ff8cb93a12c3b8644b49948caed69389057
SHA5129d47d04869ccbd4ea60cbdbb9b6ae4c88442820a12c8184166a23861a346f10804c82d52bf972f6a0936f3b3a1a6d167a7be6d86723692ab14e3fa407f9906dc
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
\Users\Admin\AppData\Local\Temp\._cache_bf7700d0b025ef158f166015ec391ff8cb93a12c3b8644b49948caed69389057.exe
Filesize3.5MB
MD525c22bf44d111c1660b51c892f5bdfbf
SHA1cc76535ade822b0bfeb9c778d18ebe0119a3f21c
SHA256b49c28ededd4e6b741b0ade11fd4dadb1a2852197e6364624c56501860039649
SHA51283038eb0a90b94ec150a3ef07d38528699084dd17daa9865d6e49ac8c6efca091a08fbaad67bc21b0ef7bc83a0ea1c3f72b1f1b008a7162592679c9b402d2062