Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 04:00
Behavioral task
behavioral1
Sample
a6e59077ffa757ff9a90d9c51126fda2307549d9c7f163a17dd8d04df84530f0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a6e59077ffa757ff9a90d9c51126fda2307549d9c7f163a17dd8d04df84530f0.exe
Resource
win10v2004-20241007-en
General
-
Target
a6e59077ffa757ff9a90d9c51126fda2307549d9c7f163a17dd8d04df84530f0.exe
-
Size
3.8MB
-
MD5
547f8c53a7ed1b2a9860fc3fb4050392
-
SHA1
1cb64c2fdf78e1d1d2475489bb9e5583704dce04
-
SHA256
a6e59077ffa757ff9a90d9c51126fda2307549d9c7f163a17dd8d04df84530f0
-
SHA512
29182959f7d5c2c069d7bcbc82749904eb13b4cd3d5a1ae4cc827e3db7e718d8fda62bbd40d053385c4ada2df5285664749e013a8dcc11fb1a7a32d42f6363f1
-
SSDEEP
49152:KnsHyjtk2MYC5GDugD4UMNOYj788gbCe85TGHwHG9Xg2s1+2IU6iYuCoh0ueLij:Knsmtk2aT396Cfp4Xg2t+FCI
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2780 ._cache_a6e59077ffa757ff9a90d9c51126fda2307549d9c7f163a17dd8d04df84530f0.exe 2712 Synaptics.exe 3024 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 2384 a6e59077ffa757ff9a90d9c51126fda2307549d9c7f163a17dd8d04df84530f0.exe 2384 a6e59077ffa757ff9a90d9c51126fda2307549d9c7f163a17dd8d04df84530f0.exe 2384 a6e59077ffa757ff9a90d9c51126fda2307549d9c7f163a17dd8d04df84530f0.exe 2384 a6e59077ffa757ff9a90d9c51126fda2307549d9c7f163a17dd8d04df84530f0.exe 2712 Synaptics.exe 2712 Synaptics.exe 2712 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" a6e59077ffa757ff9a90d9c51126fda2307549d9c7f163a17dd8d04df84530f0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6e59077ffa757ff9a90d9c51126fda2307549d9c7f163a17dd8d04df84530f0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1204 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1204 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2780 2384 a6e59077ffa757ff9a90d9c51126fda2307549d9c7f163a17dd8d04df84530f0.exe 30 PID 2384 wrote to memory of 2780 2384 a6e59077ffa757ff9a90d9c51126fda2307549d9c7f163a17dd8d04df84530f0.exe 30 PID 2384 wrote to memory of 2780 2384 a6e59077ffa757ff9a90d9c51126fda2307549d9c7f163a17dd8d04df84530f0.exe 30 PID 2384 wrote to memory of 2780 2384 a6e59077ffa757ff9a90d9c51126fda2307549d9c7f163a17dd8d04df84530f0.exe 30 PID 2384 wrote to memory of 2712 2384 a6e59077ffa757ff9a90d9c51126fda2307549d9c7f163a17dd8d04df84530f0.exe 32 PID 2384 wrote to memory of 2712 2384 a6e59077ffa757ff9a90d9c51126fda2307549d9c7f163a17dd8d04df84530f0.exe 32 PID 2384 wrote to memory of 2712 2384 a6e59077ffa757ff9a90d9c51126fda2307549d9c7f163a17dd8d04df84530f0.exe 32 PID 2384 wrote to memory of 2712 2384 a6e59077ffa757ff9a90d9c51126fda2307549d9c7f163a17dd8d04df84530f0.exe 32 PID 2712 wrote to memory of 3024 2712 Synaptics.exe 33 PID 2712 wrote to memory of 3024 2712 Synaptics.exe 33 PID 2712 wrote to memory of 3024 2712 Synaptics.exe 33 PID 2712 wrote to memory of 3024 2712 Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6e59077ffa757ff9a90d9c51126fda2307549d9c7f163a17dd8d04df84530f0.exe"C:\Users\Admin\AppData\Local\Temp\a6e59077ffa757ff9a90d9c51126fda2307549d9c7f163a17dd8d04df84530f0.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\._cache_a6e59077ffa757ff9a90d9c51126fda2307549d9c7f163a17dd8d04df84530f0.exe"C:\Users\Admin\AppData\Local\Temp\._cache_a6e59077ffa757ff9a90d9c51126fda2307549d9c7f163a17dd8d04df84530f0.exe"2⤵
- Executes dropped EXE
PID:2780
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:3024
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD5547f8c53a7ed1b2a9860fc3fb4050392
SHA11cb64c2fdf78e1d1d2475489bb9e5583704dce04
SHA256a6e59077ffa757ff9a90d9c51126fda2307549d9c7f163a17dd8d04df84530f0
SHA51229182959f7d5c2c069d7bcbc82749904eb13b4cd3d5a1ae4cc827e3db7e718d8fda62bbd40d053385c4ada2df5285664749e013a8dcc11fb1a7a32d42f6363f1
-
Filesize
20KB
MD5767e42417e863883169a905fafa2e4e4
SHA1984d9626009dece61611fbea8f4546d969388057
SHA2564022d9ad6a23dbcd6c9f8325185385f0e05e33ab5db41dd110e97a0d8842f797
SHA51233c5506a22a813db0a21aef86483b6935e821633dfc2e4887a09df9509e4a421982c99cbc4b9176edff35eb98437f7afa0ed4357460e5427072f13aadeac874b
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
24KB
MD5be70374ab3bdfd8969c78d003cd6bf15
SHA1eaae50e157947eb593164ac75eb3651146fef88e
SHA256de1ce8b66500c60c43655a28d7b0a3c0f147a7ed61e5a7b0e8e00e70c29c410e
SHA512daadee79315e6dfc946f475314032eaf5d9383762997a417d967d68ee61ac9569124b9e3ac590a539511fff4f1c1b9495f133783f330af0cf4ca47491e947b38
-
Filesize
23KB
MD5eda896e9788063273996b348b4e41574
SHA11121bbc9ed572c1071d2c915a45a523c52df5eb9
SHA25622c00201ffbb2897d0130fb4403953f18a67b9ac0c53f008951e471cc81a51ec
SHA51207d8543ed5fdcf3a3b925793a8135cd732c93dbf4d45b82fa453f1391423d29f80cc4d323dc2c051cb68b3be6b2ef61caae737c85622f7cafe94ed5860013ac8
-
Filesize
28KB
MD57cbed78b46e37b44221e9ca87f649cde
SHA157203c49285f03daed095e59d46ef40a52b337e4
SHA256c90fbe828883561fca69c5c572012339a677dab20d975f9f4e8358ec8a73190c
SHA51239602b425f99cac9a0e942f364edb35415a3fe3e255e4571f5fd9bd50797da1ec6bc4a317338323ad0d96af66dc9c5c47b20d38c83637566a5eee2465c323d88
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
\Users\Admin\AppData\Local\Temp\._cache_a6e59077ffa757ff9a90d9c51126fda2307549d9c7f163a17dd8d04df84530f0.exe
Filesize3.0MB
MD5b97e5ecdfd825a3a31183927e23e0199
SHA1ab3d793868cc689699ce35d27e53cd0b8db76fcf
SHA256c99709759258ae4a7174e23d395801f1e709f743d12ffe3e00bc638ae59fadfb
SHA51261a8e401013d3fb04be465bab2eeb943585e11ae7249b5cfd16fcd1fdc12a433151c1e701a202c6b9a5ccbb4254d6b60b91da787e9666028c7190a2d6ced64f2