Analysis
-
max time kernel
117s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 03:52
Behavioral task
behavioral1
Sample
70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe
Resource
win10v2004-20241007-en
General
-
Target
70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe
-
Size
783KB
-
MD5
f2b6b9f9c651374bf6a84b3ab4c4b010
-
SHA1
867d9c40e2fa18a865e7d1841db29f757bb7cf02
-
SHA256
70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358
-
SHA512
8362ae3d694b5ade1d47afdb04515128b5c34128bf0c916be4d6df4cb91c318d1cd14e5e997fd8b459705e0e0ae0c88e686a18bc2125d5c471d7aafbc7473075
-
SSDEEP
12288:sMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9L4/j:snsJ39LyjbJkQFMhmC+6GD90
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2288 ._cache_70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe 2412 Synaptics.exe 2720 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 2208 70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe 2208 70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe 2208 70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe 2208 70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe 2412 Synaptics.exe 2412 Synaptics.exe 2412 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2868 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2868 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2288 2208 70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe 31 PID 2208 wrote to memory of 2288 2208 70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe 31 PID 2208 wrote to memory of 2288 2208 70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe 31 PID 2208 wrote to memory of 2288 2208 70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe 31 PID 2208 wrote to memory of 2412 2208 70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe 32 PID 2208 wrote to memory of 2412 2208 70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe 32 PID 2208 wrote to memory of 2412 2208 70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe 32 PID 2208 wrote to memory of 2412 2208 70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe 32 PID 2412 wrote to memory of 2720 2412 Synaptics.exe 33 PID 2412 wrote to memory of 2720 2412 Synaptics.exe 33 PID 2412 wrote to memory of 2720 2412 Synaptics.exe 33 PID 2412 wrote to memory of 2720 2412 Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe"C:\Users\Admin\AppData\Local\Temp\70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\._cache_70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2288
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2720
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
783KB
MD5f2b6b9f9c651374bf6a84b3ab4c4b010
SHA1867d9c40e2fa18a865e7d1841db29f757bb7cf02
SHA25670a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358
SHA5128362ae3d694b5ade1d47afdb04515128b5c34128bf0c916be4d6df4cb91c318d1cd14e5e997fd8b459705e0e0ae0c88e686a18bc2125d5c471d7aafbc7473075
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
26KB
MD558612e8b6b7fa15237d63e63344f6575
SHA13e8dc57bcee660658daabc86bf6ad6a69054d8b6
SHA256a23c7c4a6810ce21962807123c7c49ad1e4fc817b771a638778028d87981b544
SHA5127c532e44f19fa62af77d07f89cca6d420d5ba9ed4a1ddfc97e8752bd341b1741fb9b03274decc2e50dfc766929dfea5bea30d41a78799cbea1d136138a707e8f
-
Filesize
28KB
MD595eae18892843ce4b22046c74f014861
SHA163f52587aa9ea617bbdd83ac1abb263b5a03bd81
SHA256eeee830f1679807edfd6f421627d4be7a7faf31b8c5176b17620341016af8377
SHA5127335cf853b6adf9c22f282e6fbe060ccc253fc9c50e95f58430884772c0f4f30e94af5e68bef35583f3a8aa7ccac9ea623583d89c5ff38667afc8a121721bb50
-
Filesize
23KB
MD5820df09e675bc91ffe005cd93b310094
SHA11e4f89ef1e14d198d1c49e3ae9f08147aca4c6af
SHA25660f83cb07c102e3599e751bccbceddc721bbd10627c3ccb57f6ebec1d3cc1d81
SHA512dde4d4870c727d566d4d7d994226be8ab52fcd144f6a2dad43141232d078447b4b4d9f31d3f13ec5ec3e7f350b55ec9dc776673bfa7c4ab13140160108bf550a
-
Filesize
26KB
MD590eced5bc5758181d95641b8f5302879
SHA17f31531cec8e5eb34fc820c3ffc6748da63d1cc7
SHA25624fea1abf4392acaa1039314ea6e3c5d12a02de18f3f595cbcd09d56d3e4c9b1
SHA51210a0ff5349ee3aba9fb2f861a9309160ee27609e72c56ec28c3a1024743622fb7852f2e03294e8fac5143a4e56ef5702209a1b9b13d279cb0d6dfa1e01d7a004
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
\Users\Admin\AppData\Local\Temp\._cache_70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe
Filesize30KB
MD57768c9f29a2d93ebced1d24d4df51650
SHA1abd491a664dd13a66ac19039683a8a60848c3ea6
SHA256ee82795ada1496176af0e99abd4c38a5e27c243ebc8c29f233fdde8450b997a7
SHA51291de6823fa7665dc89ce246105790c8ce0822ff682ba80eb14a89c6689db70c73fea838066feb7983b7673ac4275728f3c85bd1f4d1c3bd0935b96dbf878f511