Analysis
-
max time kernel
111s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 14:52
Behavioral task
behavioral1
Sample
5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe
Resource
win10v2004-20241007-en
General
-
Target
5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe
-
Size
1.2MB
-
MD5
919f8ddfade928dcfd5ca7d4aa90237d
-
SHA1
117ef50850e0c9afe261dafe2be9b783f4f2395a
-
SHA256
5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3
-
SHA512
698bb26b9e089bcc92eb4b93bd6a7d004f7b9740bb8d237c55324b3d8a3e184fe1d532cb046b05172296cf7d5c30ac37fd5201089d8ec9b7da25b4453c8e9501
-
SSDEEP
12288:LMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9L6XH02xXd4F2xXd4f2xX9:LnsJ39LyjbJkQFMhmC+6GD924O4YPv
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2316 ._cache_5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe 2844 Synaptics.exe 2780 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 2524 5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe 2524 5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe 2524 5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe 2524 5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe 2844 Synaptics.exe 2844 Synaptics.exe 2844 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2756 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2756 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2316 2524 5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe 29 PID 2524 wrote to memory of 2316 2524 5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe 29 PID 2524 wrote to memory of 2316 2524 5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe 29 PID 2524 wrote to memory of 2316 2524 5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe 29 PID 2524 wrote to memory of 2844 2524 5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe 30 PID 2524 wrote to memory of 2844 2524 5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe 30 PID 2524 wrote to memory of 2844 2524 5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe 30 PID 2524 wrote to memory of 2844 2524 5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe 30 PID 2844 wrote to memory of 2780 2844 Synaptics.exe 31 PID 2844 wrote to memory of 2780 2844 Synaptics.exe 31 PID 2844 wrote to memory of 2780 2844 Synaptics.exe 31 PID 2844 wrote to memory of 2780 2844 Synaptics.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe"C:\Users\Admin\AppData\Local\Temp\5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\._cache_5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe"C:\Users\Admin\AppData\Local\Temp\._cache_5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe"2⤵
- Executes dropped EXE
PID:2316
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2780
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5919f8ddfade928dcfd5ca7d4aa90237d
SHA1117ef50850e0c9afe261dafe2be9b783f4f2395a
SHA2565db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3
SHA512698bb26b9e089bcc92eb4b93bd6a7d004f7b9740bb8d237c55324b3d8a3e184fe1d532cb046b05172296cf7d5c30ac37fd5201089d8ec9b7da25b4453c8e9501
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
156B
MD5fe085b3458dd3a7d99893b02bd50a774
SHA1335dda65691d5c47a627c9a43436ffb1c40e2e52
SHA256e21c7eeca30f927c6701cefd93528cba4e8bc3efd4a2ae5422a40e48ebcca62b
SHA512f21bbb03271c70ae6c2c9b880368fc4f9389939a5e1c575a1b0d5f81803b2df84774f5d13a0877d4a9f622355969040f5afaada00f6b3c1d33bb438ed301a658
-
\Users\Admin\AppData\Local\Temp\._cache_5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe
Filesize495KB
MD51060abe43d8543e6e0054809a66df602
SHA14ac3cf1e994d25c44d0f8a40e6e5d02bbda21390
SHA256d94396429f54d074cd866f634381810935c4026b86a09fdfc9b7a8806de3cd5b
SHA512a95b511f2b4fd6afaaeac7cbe9e423bbe086afb48922ae30c6e5a0401f6702f6f7ccea999569a7f5436beb6a53eb533d26973e2ee2c8bd73520dd061b2231ccf