Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
111s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2024, 03:52
Behavioral task
behavioral1
Sample
70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe
Resource
win10v2004-20241007-en
General
-
Target
70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe
-
Size
783KB
-
MD5
f2b6b9f9c651374bf6a84b3ab4c4b010
-
SHA1
867d9c40e2fa18a865e7d1841db29f757bb7cf02
-
SHA256
70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358
-
SHA512
8362ae3d694b5ade1d47afdb04515128b5c34128bf0c916be4d6df4cb91c318d1cd14e5e997fd8b459705e0e0ae0c88e686a18bc2125d5c471d7aafbc7473075
-
SSDEEP
12288:sMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9L4/j:snsJ39LyjbJkQFMhmC+6GD90
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 1772 ._cache_70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe 4860 Synaptics.exe 4292 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4768 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4768 EXCEL.EXE 4768 EXCEL.EXE 4768 EXCEL.EXE 4768 EXCEL.EXE 4768 EXCEL.EXE 4768 EXCEL.EXE 4768 EXCEL.EXE 4768 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3472 wrote to memory of 1772 3472 70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe 83 PID 3472 wrote to memory of 1772 3472 70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe 83 PID 3472 wrote to memory of 1772 3472 70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe 83 PID 3472 wrote to memory of 4860 3472 70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe 84 PID 3472 wrote to memory of 4860 3472 70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe 84 PID 3472 wrote to memory of 4860 3472 70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe 84 PID 4860 wrote to memory of 4292 4860 Synaptics.exe 85 PID 4860 wrote to memory of 4292 4860 Synaptics.exe 85 PID 4860 wrote to memory of 4292 4860 Synaptics.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe"C:\Users\Admin\AppData\Local\Temp\70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\._cache_70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1772
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4292
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
783KB
MD5f2b6b9f9c651374bf6a84b3ab4c4b010
SHA1867d9c40e2fa18a865e7d1841db29f757bb7cf02
SHA25670a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358
SHA5128362ae3d694b5ade1d47afdb04515128b5c34128bf0c916be4d6df4cb91c318d1cd14e5e997fd8b459705e0e0ae0c88e686a18bc2125d5c471d7aafbc7473075
-
C:\Users\Admin\AppData\Local\Temp\._cache_70a7f2a1ca8f35b2fa8dff1a6bf569b7031015da1ea537d363308609d8d89358N.exe
Filesize30KB
MD57768c9f29a2d93ebced1d24d4df51650
SHA1abd491a664dd13a66ac19039683a8a60848c3ea6
SHA256ee82795ada1496176af0e99abd4c38a5e27c243ebc8c29f233fdde8450b997a7
SHA51291de6823fa7665dc89ce246105790c8ce0822ff682ba80eb14a89c6689db70c73fea838066feb7983b7673ac4275728f3c85bd1f4d1c3bd0935b96dbf878f511
-
Filesize
23KB
MD515fafb9e519738c02eb96bd697791191
SHA17cae23ff63410e96ccd77cca45bc05163477b323
SHA256656fcdccb35ca5862842b92cd494495d7a6df9ad8a59f682a8d639e581e9926d
SHA5125f73a103b377dd7c24e8b6fd0bcc1c4136e26fef284ed1e1333314a94d8f71bbb324350384b4b86b76dd23ab267d34a18137a7525f02a2bb56488a9da5156a2e
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04