Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/11/2024, 05:22
Behavioral task
behavioral1
Sample
ed31a3199d97ee7af7bf68c861ff1577b853d40f1f69cb1e02827e4a34b9fce4.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ed31a3199d97ee7af7bf68c861ff1577b853d40f1f69cb1e02827e4a34b9fce4.exe
Resource
win10v2004-20241007-en
General
-
Target
ed31a3199d97ee7af7bf68c861ff1577b853d40f1f69cb1e02827e4a34b9fce4.exe
-
Size
793KB
-
MD5
fcb172acc59f3716710b8bd449a416e5
-
SHA1
bb22b0ce4fce2cca6a2a3d88b45f8bc128ad669a
-
SHA256
ed31a3199d97ee7af7bf68c861ff1577b853d40f1f69cb1e02827e4a34b9fce4
-
SHA512
8f2c83de2cd61e06594cd3ae8f273d33bdf679b45f0e9c16c4e37107c7077cf51e9318208476602e6aa409993baf0dd6a5e8aa6fa0daa012a5f800d221705fb5
-
SSDEEP
12288:mMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9Twj:mnsJ39LyjbJkQFMhmC+6GD9U
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
resource behavioral1/files/0x000600000001a4bb-87.dat behavioral1/files/0x000700000001a4b9-98.dat behavioral1/files/0x000800000001a4bb-109.dat behavioral1/files/0x000900000001a4b9-120.dat -
Executes dropped EXE 3 IoCs
pid Process 2840 ._cache_ed31a3199d97ee7af7bf68c861ff1577b853d40f1f69cb1e02827e4a34b9fce4.exe 2924 Synaptics.exe 2036 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 2300 ed31a3199d97ee7af7bf68c861ff1577b853d40f1f69cb1e02827e4a34b9fce4.exe 2300 ed31a3199d97ee7af7bf68c861ff1577b853d40f1f69cb1e02827e4a34b9fce4.exe 2300 ed31a3199d97ee7af7bf68c861ff1577b853d40f1f69cb1e02827e4a34b9fce4.exe 2924 Synaptics.exe 2924 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" ed31a3199d97ee7af7bf68c861ff1577b853d40f1f69cb1e02827e4a34b9fce4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed31a3199d97ee7af7bf68c861ff1577b853d40f1f69cb1e02827e4a34b9fce4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_ed31a3199d97ee7af7bf68c861ff1577b853d40f1f69cb1e02827e4a34b9fce4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2676 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2676 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2840 2300 ed31a3199d97ee7af7bf68c861ff1577b853d40f1f69cb1e02827e4a34b9fce4.exe 30 PID 2300 wrote to memory of 2840 2300 ed31a3199d97ee7af7bf68c861ff1577b853d40f1f69cb1e02827e4a34b9fce4.exe 30 PID 2300 wrote to memory of 2840 2300 ed31a3199d97ee7af7bf68c861ff1577b853d40f1f69cb1e02827e4a34b9fce4.exe 30 PID 2300 wrote to memory of 2840 2300 ed31a3199d97ee7af7bf68c861ff1577b853d40f1f69cb1e02827e4a34b9fce4.exe 30 PID 2300 wrote to memory of 2924 2300 ed31a3199d97ee7af7bf68c861ff1577b853d40f1f69cb1e02827e4a34b9fce4.exe 31 PID 2300 wrote to memory of 2924 2300 ed31a3199d97ee7af7bf68c861ff1577b853d40f1f69cb1e02827e4a34b9fce4.exe 31 PID 2300 wrote to memory of 2924 2300 ed31a3199d97ee7af7bf68c861ff1577b853d40f1f69cb1e02827e4a34b9fce4.exe 31 PID 2300 wrote to memory of 2924 2300 ed31a3199d97ee7af7bf68c861ff1577b853d40f1f69cb1e02827e4a34b9fce4.exe 31 PID 2924 wrote to memory of 2036 2924 Synaptics.exe 32 PID 2924 wrote to memory of 2036 2924 Synaptics.exe 32 PID 2924 wrote to memory of 2036 2924 Synaptics.exe 32 PID 2924 wrote to memory of 2036 2924 Synaptics.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed31a3199d97ee7af7bf68c861ff1577b853d40f1f69cb1e02827e4a34b9fce4.exe"C:\Users\Admin\AppData\Local\Temp\ed31a3199d97ee7af7bf68c861ff1577b853d40f1f69cb1e02827e4a34b9fce4.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\._cache_ed31a3199d97ee7af7bf68c861ff1577b853d40f1f69cb1e02827e4a34b9fce4.exe"C:\Users\Admin\AppData\Local\Temp\._cache_ed31a3199d97ee7af7bf68c861ff1577b853d40f1f69cb1e02827e4a34b9fce4.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2840
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2036
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
793KB
MD5fcb172acc59f3716710b8bd449a416e5
SHA1bb22b0ce4fce2cca6a2a3d88b45f8bc128ad669a
SHA256ed31a3199d97ee7af7bf68c861ff1577b853d40f1f69cb1e02827e4a34b9fce4
SHA5128f2c83de2cd61e06594cd3ae8f273d33bdf679b45f0e9c16c4e37107c7077cf51e9318208476602e6aa409993baf0dd6a5e8aa6fa0daa012a5f800d221705fb5
-
Filesize
23KB
MD53591ad1239b4711047510f0520eab7e7
SHA1114b4b31506f9bcfd56378ce4c0f206a095d7bd4
SHA256b3a334debfef2a528a7f5309bbc31898f8474314e11dac84035090448e346d3e
SHA512b4ae7e2af25be418c0f3f4ffa9881fcfccc2177b3999ec691ae55b7b8f195c1dd9602aa13a420df0df689e7fcad1e2f89bef1f7113c9cc9cc50512393ade41ad
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
25KB
MD5ee2e4d261c101bd4e9c0abb6ea2d4e2c
SHA131dd7737a4e92e43aa4d4cbec53dd61617612769
SHA2564b15a10b29f42e2263334fd2d2a858d4dce072f24a630a25d459c02ab9a22c8e
SHA5126b452c86175c05dbd83105846e82c29f02a767ec240b07a30ab33f56af5ec7035f983e342a79d3fe6c1a117c6c5ac516fbbfd5c50e2e430a902edf3e2858018d
-
Filesize
25KB
MD5c089c5df8788f1c55edcf56c59dc1325
SHA15c7804d382c554d60292aa1d9942f9a7913149fe
SHA2564d664b93099a53575705866c53d035a221928bd55bf51740b6993bf9af63955d
SHA5128062c364de41edfa957b994ed293482612322672f9facda735627cbc6612c8363b11468d1813139ba5365b649d388681301541275ef3edfb6445f466d330ee8a
-
Filesize
31KB
MD530f765755ae09d8f1d9b94e2c334da8b
SHA1426076822087fb22c15454f47b8363e2b55b0063
SHA25647e26e8295b2dc99f3e3283eb57fbf9fffd2f5c701b04469c1c4eb792ce2ad80
SHA512d24d1083efe604ed6c9276a68ee40051fe3d84d96a4c3aac9866c959311ba371b431b608643ba1502678dc7d81b2a8d04fd81ee5fc728f216184315fd7ad1622
-
Filesize
26KB
MD58ccde12bb7c0fd05e4da3698b2893e6a
SHA12a4f1410ccfeb69cfc13750c83c1416c7d8103bb
SHA256b1a9aa9781961f9bcea9140002419649253ff344cdad493ba0cc29ba00aebc91
SHA512809f4ca9c8e23214b8c878eefb3b35598000246bc0870514968f6eb45e1924586c27948e6956342171a80c43898af21375e1fb63e1db059bbaf88e364874b907
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
\Users\Admin\AppData\Local\Temp\._cache_ed31a3199d97ee7af7bf68c861ff1577b853d40f1f69cb1e02827e4a34b9fce4.exe
Filesize40KB
MD5350d7bd5b356e78216c8e796ecec7c6c
SHA180d5c8b74f7d4e833d09b0aa46a4169ac097646b
SHA25632937091f4a460d9b067f1853d8cbcacc6f66e2be9368e4d1bce936afaa21ef2
SHA51288c4f3edbd8eb86c6ac3dbab25dc4c44b9735d3e20fd970b7790f57c12bc8500544c6679f3c34480a77e768061416677c9fb1f85eff8cfb8ea77d81adcfaf7f5