Analysis
-
max time kernel
113s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 17:18
Behavioral task
behavioral1
Sample
8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe
Resource
win10v2004-20241007-en
General
-
Target
8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe
-
Size
7.2MB
-
MD5
ba953b5381694ed49ebe449ce9bed3f0
-
SHA1
0269af2a058fe1286ad0847e5a7de7bdb08f597f
-
SHA256
8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387
-
SHA512
27ee40ce2516422193bf5302a43820b9fa812ed0f87663f3ebdf2e52f05facdca1ef4677e5bd1db69ee8e33c3dc154c9161109f45cc6a392f37d9bda8c7e9041
-
SSDEEP
196608:qLJ1103T3hrxZULtIta6oOcScwWhBNDWD:qV03FrrU5Ita6oOc7NCD
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exeSynaptics.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 5 IoCs
Processes:
._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exeSynaptics.exe._cache_Synaptics.exe._cache_Synaptics.exepid process 1168 ._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe 4000 ._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe 4624 Synaptics.exe 2684 ._cache_Synaptics.exe 1928 ._cache_Synaptics.exe -
Loads dropped DLL 16 IoCs
Processes:
._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe._cache_Synaptics.exepid process 4000 ._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe 4000 ._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe 4000 ._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe 4000 ._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe 4000 ._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe 4000 ._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe 4000 ._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe 4000 ._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe 1928 ._cache_Synaptics.exe 1928 ._cache_Synaptics.exe 1928 ._cache_Synaptics.exe 1928 ._cache_Synaptics.exe 1928 ._cache_Synaptics.exe 1928 ._cache_Synaptics.exe 1928 ._cache_Synaptics.exe 1928 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
._cache_Synaptics.execmd.exe8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exeSynaptics.execmd.exe._cache_Synaptics.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
Processes:
8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exeSynaptics.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1640 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
EXCEL.EXEpid process 1640 EXCEL.EXE 1640 EXCEL.EXE 1640 EXCEL.EXE 1640 EXCEL.EXE 1640 EXCEL.EXE 1640 EXCEL.EXE 1640 EXCEL.EXE 1640 EXCEL.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exeSynaptics.exe._cache_Synaptics.exe._cache_Synaptics.exedescription pid process target process PID 1572 wrote to memory of 1168 1572 8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe ._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe PID 1572 wrote to memory of 1168 1572 8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe ._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe PID 1572 wrote to memory of 1168 1572 8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe ._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe PID 1168 wrote to memory of 4000 1168 ._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe ._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe PID 1168 wrote to memory of 4000 1168 ._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe ._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe PID 1168 wrote to memory of 4000 1168 ._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe ._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe PID 1572 wrote to memory of 4624 1572 8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe Synaptics.exe PID 1572 wrote to memory of 4624 1572 8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe Synaptics.exe PID 1572 wrote to memory of 4624 1572 8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe Synaptics.exe PID 4000 wrote to memory of 2412 4000 ._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe cmd.exe PID 4000 wrote to memory of 2412 4000 ._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe cmd.exe PID 4000 wrote to memory of 2412 4000 ._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe cmd.exe PID 4624 wrote to memory of 2684 4624 Synaptics.exe ._cache_Synaptics.exe PID 4624 wrote to memory of 2684 4624 Synaptics.exe ._cache_Synaptics.exe PID 4624 wrote to memory of 2684 4624 Synaptics.exe ._cache_Synaptics.exe PID 2684 wrote to memory of 1928 2684 ._cache_Synaptics.exe ._cache_Synaptics.exe PID 2684 wrote to memory of 1928 2684 ._cache_Synaptics.exe ._cache_Synaptics.exe PID 2684 wrote to memory of 1928 2684 ._cache_Synaptics.exe ._cache_Synaptics.exe PID 1928 wrote to memory of 1052 1928 ._cache_Synaptics.exe cmd.exe PID 1928 wrote to memory of 1052 1928 ._cache_Synaptics.exe cmd.exe PID 1928 wrote to memory of 1052 1928 ._cache_Synaptics.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe"C:\Users\Admin\AppData\Local\Temp\8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls4⤵
- System Location Discovery: System Language Discovery
PID:2412
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls5⤵
- System Location Discovery: System Language Discovery
PID:1052
-
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.2MB
MD5ba953b5381694ed49ebe449ce9bed3f0
SHA10269af2a058fe1286ad0847e5a7de7bdb08f597f
SHA2568a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387
SHA51227ee40ce2516422193bf5302a43820b9fa812ed0f87663f3ebdf2e52f05facdca1ef4677e5bd1db69ee8e33c3dc154c9161109f45cc6a392f37d9bda8c7e9041
-
C:\Users\Admin\AppData\Local\Temp\._cache_8a10fffbd68d759b73ccacaa2f2ef25f37b380ef4e5d3ec7d4d7fe9b1384a387N.exe
Filesize6.4MB
MD508f9dfe54351fbe840a1064057534b3c
SHA1778243c235a8cd0184c1d96f9066e332d26e4096
SHA25618eac1745817cc2f0fad48e37799596980321b11e16429d642d5089b59948f7d
SHA512aeb4ff6eb9601d7d7451710b3657608283048062fdaa6e9d4dbbc05324efb799a325a0ab9db9b07d461856faf10c36e5e5935f115a6eb5e5e76bc7eec655be0d
-
Filesize
22KB
MD5fb4dbc8148438723b5ff7d9911199701
SHA1df32c9ad183efac1f9d08544ac41b71a4af56652
SHA256f31f3ad90ac3285e49d21507b696b949dab734fb3c6882c24df366f00cb4193a
SHA512745666c1b0de9275e9e901ae8751bc5c39997d08f211935defef34e4953281e16815318e354c503b3470010bc55e9f782326c16de7458a451a467450966afec1
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
278KB
MD5cf239a4ea58056f6b32e2928f64738c4
SHA1a4d2bdf399c2cc56ed1c11e3a48c7bdbcad721e8
SHA256052fee1823ad2986f7e4bab33f2fba136dcf87ec3d6acca37af72525aa1a6821
SHA5122c23652ba5e397bedc88eb1a13d4c2dce06ed5c5857d790a5205ab31f9bc5506da5e55e1f139924dad9f446cdf5ea0eae5b2eacc733e6fbdb9eec2e113581adc
-
Filesize
40KB
MD5e7e577c117bb5aa1011f841d1a10a218
SHA116558097bef92fcb61def76248823fe2d49f83c4
SHA25674ac52c9497d696c8d8eaa120899752c964573ee90e6b04dc3e6ba72ae06e0a0
SHA51282dc4594c4c6ad2cff76c54cc2caeb6751068c91f23b61deca6a1f9dba640acc4f0556df70d3812b8592c247c3259a74f5f1abd2b81fd0dfec2f194df62e1a34
-
Filesize
705KB
MD5e98a9104ee53322918e22b4d5900f695
SHA137565ff8a2ac41f97d3eea6db0b51f1d8b59c38a
SHA256e1f095371953942643b1d4d199b7b090529afeb20ab1bc26c90454716ea96ab2
SHA5125612dd1388a68e96bd30493d6ceaaecd32df4ceb7db64ae704aba52d041e1f49ad95f94bcab615c76430e250c81a68fee8bc937a43bb80ddc5493c87a7ebdaec
-
Filesize
2.8MB
MD5490a41d1696f913cce54a3492f9230cc
SHA11783db8852345aee155c62080bdd0c44788bf45c
SHA256baf2f7c11a41c9a5ee6437174fdaf1753f9a1d592d0f79fc8e5d09ccac164032
SHA512df14b6eb474965ea6941315250a6cb9d22420d41123640e6d29b1a4563482db2ff89e83a47ac7c777ec85e953093b9c3ed82820770ae7a0466124e169a886252
-
Filesize
2.2MB
MD5c5a254155bd7a9548a7b81ae37b46ee4
SHA1594a143cbdba14743b6d2a702ab0543fe28eba29
SHA256d46fa7be982ae654c92d5799ddfcbf91d071529f87258646a98a637fe6b650e0
SHA512b2aa525a7c88df2514e5c542ae04bd05c951ec0142580f57b2819cefb49be7d5e70b708ccf8e154e6be3541811dd7af781a72bfd47611b9a3e87e62c13d0985f