Analysis
-
max time kernel
111s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 11:03
Behavioral task
behavioral1
Sample
d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe
Resource
win10v2004-20241007-en
General
-
Target
d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe
-
Size
1.2MB
-
MD5
4f2413b765036fcc61fbda99175c1f80
-
SHA1
a4cc42f91cd65a6b932c21c2d6a2583b0bad8e70
-
SHA256
d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61
-
SHA512
87060f128d73eca6db5bdcd6e6d8cce311fa05ca35357a039047cfa92edfced2b090ef9df16f18212a0c9a7b62cc6b57a16bde48dafdbf3364b22b0c59162469
-
SSDEEP
12288:7MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9APoBhY8QyIE63j:7nsJ39LyjbJkQFMhmC+6GD9HY9JBz
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 4264 ._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe 4576 Synaptics.exe 4852 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2016 4264 WerFault.exe 81 1872 4852 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4088 wrote to memory of 4264 4088 d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe 81 PID 4088 wrote to memory of 4264 4088 d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe 81 PID 4088 wrote to memory of 4264 4088 d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe 81 PID 4088 wrote to memory of 4576 4088 d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe 82 PID 4088 wrote to memory of 4576 4088 d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe 82 PID 4088 wrote to memory of 4576 4088 d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe 82 PID 4576 wrote to memory of 4852 4576 Synaptics.exe 84 PID 4576 wrote to memory of 4852 4576 Synaptics.exe 84 PID 4576 wrote to memory of 4852 4576 Synaptics.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe"C:\Users\Admin\AppData\Local\Temp\d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 10523⤵
- Program crash
PID:2016
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 10484⤵
- Program crash
PID:1872
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4264 -ip 42641⤵PID:3916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4852 -ip 48521⤵PID:1128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD54f2413b765036fcc61fbda99175c1f80
SHA1a4cc42f91cd65a6b932c21c2d6a2583b0bad8e70
SHA256d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61
SHA51287060f128d73eca6db5bdcd6e6d8cce311fa05ca35357a039047cfa92edfced2b090ef9df16f18212a0c9a7b62cc6b57a16bde48dafdbf3364b22b0c59162469
-
C:\Users\Admin\AppData\Local\Temp\._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe
Filesize443KB
MD540918b19a89cc4dcf6ec03c7f07ccd35
SHA126ec973875e0a5b4d4bb0b3eef70a701f3b86c70
SHA256f723a08340dd51b9264b6dd4b9105634b4537428bc86e1efd93af768501dd66b
SHA512ce5dbdeb674cf3daabaab3779ec749f7114177dc251e79aafaee4bc46b33b453355ee2b02dc146b93b22693540da104bcb256fe4512b8933c5f8774a34f9f31b