Analysis
-
max time kernel
111s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 10:20
Behavioral task
behavioral1
Sample
da0c088012f2dbfc715fa77b44368b9ac212dd6c7dd2507e86da1a4db679be65N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
da0c088012f2dbfc715fa77b44368b9ac212dd6c7dd2507e86da1a4db679be65N.exe
Resource
win10v2004-20241007-en
General
-
Target
da0c088012f2dbfc715fa77b44368b9ac212dd6c7dd2507e86da1a4db679be65N.exe
-
Size
3.8MB
-
MD5
63b3903c056030f3fc54eccf4db099c0
-
SHA1
1af2c200615649e72fd1d58f01e8d41895027da6
-
SHA256
da0c088012f2dbfc715fa77b44368b9ac212dd6c7dd2507e86da1a4db679be65
-
SHA512
2bf8d24a1dcc0e4ac13b337f57c07a4992952998da26f3a5c2eaadf651453a2c4df6d0fd89f5b3b626738f8e4a4e5551e3a985c285f28a861ce0f359afd5422d
-
SSDEEP
49152:KnsHyjtk2MYC5GDugD4UMNOYj788gbCe85TGHwHG9Xg2s1+2IU6iYuCoh0ueLih:Knsmtk2aT396Cfp4Xg2t+FCI
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2204 ._cache_da0c088012f2dbfc715fa77b44368b9ac212dd6c7dd2507e86da1a4db679be65N.exe 2816 Synaptics.exe 2708 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 2604 da0c088012f2dbfc715fa77b44368b9ac212dd6c7dd2507e86da1a4db679be65N.exe 2604 da0c088012f2dbfc715fa77b44368b9ac212dd6c7dd2507e86da1a4db679be65N.exe 2604 da0c088012f2dbfc715fa77b44368b9ac212dd6c7dd2507e86da1a4db679be65N.exe 2604 da0c088012f2dbfc715fa77b44368b9ac212dd6c7dd2507e86da1a4db679be65N.exe 2816 Synaptics.exe 2816 Synaptics.exe 2816 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" da0c088012f2dbfc715fa77b44368b9ac212dd6c7dd2507e86da1a4db679be65N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da0c088012f2dbfc715fa77b44368b9ac212dd6c7dd2507e86da1a4db679be65N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2724 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2724 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2204 2604 da0c088012f2dbfc715fa77b44368b9ac212dd6c7dd2507e86da1a4db679be65N.exe 29 PID 2604 wrote to memory of 2204 2604 da0c088012f2dbfc715fa77b44368b9ac212dd6c7dd2507e86da1a4db679be65N.exe 29 PID 2604 wrote to memory of 2204 2604 da0c088012f2dbfc715fa77b44368b9ac212dd6c7dd2507e86da1a4db679be65N.exe 29 PID 2604 wrote to memory of 2204 2604 da0c088012f2dbfc715fa77b44368b9ac212dd6c7dd2507e86da1a4db679be65N.exe 29 PID 2604 wrote to memory of 2816 2604 da0c088012f2dbfc715fa77b44368b9ac212dd6c7dd2507e86da1a4db679be65N.exe 31 PID 2604 wrote to memory of 2816 2604 da0c088012f2dbfc715fa77b44368b9ac212dd6c7dd2507e86da1a4db679be65N.exe 31 PID 2604 wrote to memory of 2816 2604 da0c088012f2dbfc715fa77b44368b9ac212dd6c7dd2507e86da1a4db679be65N.exe 31 PID 2604 wrote to memory of 2816 2604 da0c088012f2dbfc715fa77b44368b9ac212dd6c7dd2507e86da1a4db679be65N.exe 31 PID 2816 wrote to memory of 2708 2816 Synaptics.exe 32 PID 2816 wrote to memory of 2708 2816 Synaptics.exe 32 PID 2816 wrote to memory of 2708 2816 Synaptics.exe 32 PID 2816 wrote to memory of 2708 2816 Synaptics.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\da0c088012f2dbfc715fa77b44368b9ac212dd6c7dd2507e86da1a4db679be65N.exe"C:\Users\Admin\AppData\Local\Temp\da0c088012f2dbfc715fa77b44368b9ac212dd6c7dd2507e86da1a4db679be65N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\._cache_da0c088012f2dbfc715fa77b44368b9ac212dd6c7dd2507e86da1a4db679be65N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_da0c088012f2dbfc715fa77b44368b9ac212dd6c7dd2507e86da1a4db679be65N.exe"2⤵
- Executes dropped EXE
PID:2204
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2708
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD563b3903c056030f3fc54eccf4db099c0
SHA11af2c200615649e72fd1d58f01e8d41895027da6
SHA256da0c088012f2dbfc715fa77b44368b9ac212dd6c7dd2507e86da1a4db679be65
SHA5122bf8d24a1dcc0e4ac13b337f57c07a4992952998da26f3a5c2eaadf651453a2c4df6d0fd89f5b3b626738f8e4a4e5551e3a985c285f28a861ce0f359afd5422d
-
Filesize
22KB
MD57a3d3334271c2054e747ed669927d5dd
SHA1db0378f68872ff80df11c0c38699a4f47ca32a23
SHA2568450e28dc64246679bdb209d412386668d65f76c5ea6d78129fd3bb6305f8ad0
SHA51203326efd602cc9e814fc50843079a72d85be6e58c3753e28fc7e0f094b4e997bca6e52d3a94acd498e2c989526578f32c55076f362cb5ed8371eea2604e0d398
-
Filesize
27KB
MD5502eed4ec909e02874722f2732941cc2
SHA1bfd8c4430240d583c3756fc41483dd4c3957a411
SHA256935f0f20089cda5fe3414de2ca4935d0fb173256bbc6b9555e03587349b2e918
SHA512b0a42dd2db5b768d098fb0604267eef21459f883226d300ffb9c3705097bb5c0aa43462b8ea8b9100269799866ade699143138a47bfade397adbbecbf81cff43
-
Filesize
25KB
MD5b50b97e9d912fe00ac135cbd4a6f7d48
SHA1bd80cee41febb27c90bce114e85bba4f88d53119
SHA2564b62dd057f879cbcc400256d7e084c5061471746a49c001a63c46a334dd8568e
SHA512cb404cc99f0b508499417be1548cf5d61eefca04bb27380012d260549bf3e2be409f7c5d38ab59bd340808e9b14ee83bf3fbb3dd4633f9e964b46c631fa41b02
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
\Users\Admin\AppData\Local\Temp\._cache_da0c088012f2dbfc715fa77b44368b9ac212dd6c7dd2507e86da1a4db679be65N.exe
Filesize3.0MB
MD5b97e5ecdfd825a3a31183927e23e0199
SHA1ab3d793868cc689699ce35d27e53cd0b8db76fcf
SHA256c99709759258ae4a7174e23d395801f1e709f743d12ffe3e00bc638ae59fadfb
SHA51261a8e401013d3fb04be465bab2eeb943585e11ae7249b5cfd16fcd1fdc12a433151c1e701a202c6b9a5ccbb4254d6b60b91da787e9666028c7190a2d6ced64f2