Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 11:03
Behavioral task
behavioral1
Sample
d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe
Resource
win10v2004-20241007-en
General
-
Target
d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe
-
Size
1.2MB
-
MD5
4f2413b765036fcc61fbda99175c1f80
-
SHA1
a4cc42f91cd65a6b932c21c2d6a2583b0bad8e70
-
SHA256
d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61
-
SHA512
87060f128d73eca6db5bdcd6e6d8cce311fa05ca35357a039047cfa92edfced2b090ef9df16f18212a0c9a7b62cc6b57a16bde48dafdbf3364b22b0c59162469
-
SSDEEP
12288:7MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9APoBhY8QyIE63j:7nsJ39LyjbJkQFMhmC+6GD9HY9JBz
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2940 ._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe 2108 Synaptics.exe 2812 ._cache_Synaptics.exe -
Loads dropped DLL 15 IoCs
pid Process 2276 d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe 2276 d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe 2276 d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe 2084 WerFault.exe 2084 WerFault.exe 2084 WerFault.exe 2084 WerFault.exe 2108 Synaptics.exe 2108 Synaptics.exe 2308 WerFault.exe 2308 WerFault.exe 2308 WerFault.exe 2308 WerFault.exe 2308 WerFault.exe 2084 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2084 2940 WerFault.exe 30 2308 2812 WerFault.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3064 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3064 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2940 2276 d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe 30 PID 2276 wrote to memory of 2940 2276 d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe 30 PID 2276 wrote to memory of 2940 2276 d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe 30 PID 2276 wrote to memory of 2940 2276 d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe 30 PID 2276 wrote to memory of 2108 2276 d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe 31 PID 2276 wrote to memory of 2108 2276 d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe 31 PID 2276 wrote to memory of 2108 2276 d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe 31 PID 2276 wrote to memory of 2108 2276 d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe 31 PID 2940 wrote to memory of 2084 2940 ._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe 32 PID 2940 wrote to memory of 2084 2940 ._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe 32 PID 2940 wrote to memory of 2084 2940 ._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe 32 PID 2940 wrote to memory of 2084 2940 ._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe 32 PID 2108 wrote to memory of 2812 2108 Synaptics.exe 33 PID 2108 wrote to memory of 2812 2108 Synaptics.exe 33 PID 2108 wrote to memory of 2812 2108 Synaptics.exe 33 PID 2108 wrote to memory of 2812 2108 Synaptics.exe 33 PID 2812 wrote to memory of 2308 2812 ._cache_Synaptics.exe 34 PID 2812 wrote to memory of 2308 2812 ._cache_Synaptics.exe 34 PID 2812 wrote to memory of 2308 2812 ._cache_Synaptics.exe 34 PID 2812 wrote to memory of 2308 2812 ._cache_Synaptics.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe"C:\Users\Admin\AppData\Local\Temp\d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2940 -s 6243⤵
- Loads dropped DLL
- Program crash
PID:2084
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2812 -s 6244⤵
- Loads dropped DLL
- Program crash
PID:2308
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD54f2413b765036fcc61fbda99175c1f80
SHA1a4cc42f91cd65a6b932c21c2d6a2583b0bad8e70
SHA256d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61
SHA51287060f128d73eca6db5bdcd6e6d8cce311fa05ca35357a039047cfa92edfced2b090ef9df16f18212a0c9a7b62cc6b57a16bde48dafdbf3364b22b0c59162469
-
Filesize
28KB
MD5e64d69c00a151c8861bac4e09939e849
SHA1bbd4b7b6b1d92535a430ffb1cf61f5862a5fbbf2
SHA256e2a2e4fc179988ba38b58ce20c6f8cb54c99d682a21c1c8b63b0195f42e41616
SHA512940174400cf1a53216930bc55e206f26c7c1fca35f323242c6458b61eff310a61f2c575729f9793b7e285221e716eab2bd8fa08a9bddc1079d356f21674b893a
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
20KB
MD5c9e50c6138b6b3a442f9f156e1def0e8
SHA15698110bdd03fb33f53b039495206746f56b5496
SHA256787bf99fc4d38527ee4dfc5de1ec4c4892046aa22156913835afa0831fef8be8
SHA512d92162f2a32ac58e161acd3de2bf6696940383333a02a820b1ec2b42110c36b10931b8279355eeaac0a4bf46c31567786e7638d2583e33f8c4b90bb5fad624f8
-
Filesize
22KB
MD525a2d514566f316347f34796138ff03e
SHA1d142888a8336af619f08a17d981b7656370b127f
SHA2560000aa1007c70fa85b9e243431b8e05fa6f669a11ffd47e721ce5a6cce8b2fdc
SHA5124b5bc7cffdca3e99b807566dcbd14ede729057df1351c86d268102fb05c4f4e932e5f04f8f015fd18c8f2dfbf7e833a2311e28fbe274ca4f487e8bb3babf0f68
-
Filesize
21KB
MD5b750ad6286492c3d822ef249e301e1b3
SHA18eeb9661f44467e784f5bd1a1086726b3e66e807
SHA2562f765627ea47223451987d8a7d6774a5c93cd92b4b21ed5732c2a5aaa1c530f5
SHA51249d57ee8772e658dfbd716cd7e1322fe04f54d10a8dd39dff2e39c47abc101c999b9beba0aeb863b8af1b77cae4df10fe62084101598649cbe32f9560ec9469f
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
\Users\Admin\AppData\Local\Temp\._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe
Filesize443KB
MD540918b19a89cc4dcf6ec03c7f07ccd35
SHA126ec973875e0a5b4d4bb0b3eef70a701f3b86c70
SHA256f723a08340dd51b9264b6dd4b9105634b4537428bc86e1efd93af768501dd66b
SHA512ce5dbdeb674cf3daabaab3779ec749f7114177dc251e79aafaee4bc46b33b453355ee2b02dc146b93b22693540da104bcb256fe4512b8933c5f8774a34f9f31b