Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 11:03
Behavioral task
behavioral1
Sample
d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe
Resource
win10v2004-20241007-en
General
-
Target
d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe
-
Size
1.2MB
-
MD5
4f2413b765036fcc61fbda99175c1f80
-
SHA1
a4cc42f91cd65a6b932c21c2d6a2583b0bad8e70
-
SHA256
d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61
-
SHA512
87060f128d73eca6db5bdcd6e6d8cce311fa05ca35357a039047cfa92edfced2b090ef9df16f18212a0c9a7b62cc6b57a16bde48dafdbf3364b22b0c59162469
-
SSDEEP
12288:7MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9APoBhY8QyIE63j:7nsJ39LyjbJkQFMhmC+6GD9HY9JBz
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
Processes:
._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exeSynaptics.exe._cache_Synaptics.exepid process 2940 ._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe 2108 Synaptics.exe 2812 ._cache_Synaptics.exe -
Loads dropped DLL 15 IoCs
Processes:
d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exeWerFault.exeSynaptics.exeWerFault.exepid process 2276 d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe 2276 d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe 2276 d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe 2084 WerFault.exe 2084 WerFault.exe 2084 WerFault.exe 2084 WerFault.exe 2108 Synaptics.exe 2108 Synaptics.exe 2308 WerFault.exe 2308 WerFault.exe 2308 WerFault.exe 2308 WerFault.exe 2308 WerFault.exe 2084 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2084 2940 WerFault.exe ._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe 2308 2812 WerFault.exe ._cache_Synaptics.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exeSynaptics.exe._cache_Synaptics.exeEXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 3064 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
EXCEL.EXEpid process 3064 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exeSynaptics.exe._cache_Synaptics.exedescription pid process target process PID 2276 wrote to memory of 2940 2276 d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe ._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe PID 2276 wrote to memory of 2940 2276 d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe ._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe PID 2276 wrote to memory of 2940 2276 d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe ._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe PID 2276 wrote to memory of 2940 2276 d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe ._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe PID 2276 wrote to memory of 2108 2276 d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe Synaptics.exe PID 2276 wrote to memory of 2108 2276 d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe Synaptics.exe PID 2276 wrote to memory of 2108 2276 d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe Synaptics.exe PID 2276 wrote to memory of 2108 2276 d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe Synaptics.exe PID 2940 wrote to memory of 2084 2940 ._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe WerFault.exe PID 2940 wrote to memory of 2084 2940 ._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe WerFault.exe PID 2940 wrote to memory of 2084 2940 ._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe WerFault.exe PID 2940 wrote to memory of 2084 2940 ._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe WerFault.exe PID 2108 wrote to memory of 2812 2108 Synaptics.exe ._cache_Synaptics.exe PID 2108 wrote to memory of 2812 2108 Synaptics.exe ._cache_Synaptics.exe PID 2108 wrote to memory of 2812 2108 Synaptics.exe ._cache_Synaptics.exe PID 2108 wrote to memory of 2812 2108 Synaptics.exe ._cache_Synaptics.exe PID 2812 wrote to memory of 2308 2812 ._cache_Synaptics.exe WerFault.exe PID 2812 wrote to memory of 2308 2812 ._cache_Synaptics.exe WerFault.exe PID 2812 wrote to memory of 2308 2812 ._cache_Synaptics.exe WerFault.exe PID 2812 wrote to memory of 2308 2812 ._cache_Synaptics.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe"C:\Users\Admin\AppData\Local\Temp\d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2940 -s 6243⤵
- Loads dropped DLL
- Program crash
PID:2084
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2812 -s 6244⤵
- Loads dropped DLL
- Program crash
PID:2308
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD54f2413b765036fcc61fbda99175c1f80
SHA1a4cc42f91cd65a6b932c21c2d6a2583b0bad8e70
SHA256d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61
SHA51287060f128d73eca6db5bdcd6e6d8cce311fa05ca35357a039047cfa92edfced2b090ef9df16f18212a0c9a7b62cc6b57a16bde48dafdbf3364b22b0c59162469
-
Filesize
28KB
MD5e64d69c00a151c8861bac4e09939e849
SHA1bbd4b7b6b1d92535a430ffb1cf61f5862a5fbbf2
SHA256e2a2e4fc179988ba38b58ce20c6f8cb54c99d682a21c1c8b63b0195f42e41616
SHA512940174400cf1a53216930bc55e206f26c7c1fca35f323242c6458b61eff310a61f2c575729f9793b7e285221e716eab2bd8fa08a9bddc1079d356f21674b893a
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
20KB
MD5c9e50c6138b6b3a442f9f156e1def0e8
SHA15698110bdd03fb33f53b039495206746f56b5496
SHA256787bf99fc4d38527ee4dfc5de1ec4c4892046aa22156913835afa0831fef8be8
SHA512d92162f2a32ac58e161acd3de2bf6696940383333a02a820b1ec2b42110c36b10931b8279355eeaac0a4bf46c31567786e7638d2583e33f8c4b90bb5fad624f8
-
Filesize
22KB
MD525a2d514566f316347f34796138ff03e
SHA1d142888a8336af619f08a17d981b7656370b127f
SHA2560000aa1007c70fa85b9e243431b8e05fa6f669a11ffd47e721ce5a6cce8b2fdc
SHA5124b5bc7cffdca3e99b807566dcbd14ede729057df1351c86d268102fb05c4f4e932e5f04f8f015fd18c8f2dfbf7e833a2311e28fbe274ca4f487e8bb3babf0f68
-
Filesize
21KB
MD5b750ad6286492c3d822ef249e301e1b3
SHA18eeb9661f44467e784f5bd1a1086726b3e66e807
SHA2562f765627ea47223451987d8a7d6774a5c93cd92b4b21ed5732c2a5aaa1c530f5
SHA51249d57ee8772e658dfbd716cd7e1322fe04f54d10a8dd39dff2e39c47abc101c999b9beba0aeb863b8af1b77cae4df10fe62084101598649cbe32f9560ec9469f
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
\Users\Admin\AppData\Local\Temp\._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe
Filesize443KB
MD540918b19a89cc4dcf6ec03c7f07ccd35
SHA126ec973875e0a5b4d4bb0b3eef70a701f3b86c70
SHA256f723a08340dd51b9264b6dd4b9105634b4537428bc86e1efd93af768501dd66b
SHA512ce5dbdeb674cf3daabaab3779ec749f7114177dc251e79aafaee4bc46b33b453355ee2b02dc146b93b22693540da104bcb256fe4512b8933c5f8774a34f9f31b