Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 14:56
Behavioral task
behavioral1
Sample
5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe
Resource
win10v2004-20241007-en
General
-
Target
5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe
-
Size
1.2MB
-
MD5
919f8ddfade928dcfd5ca7d4aa90237d
-
SHA1
117ef50850e0c9afe261dafe2be9b783f4f2395a
-
SHA256
5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3
-
SHA512
698bb26b9e089bcc92eb4b93bd6a7d004f7b9740bb8d237c55324b3d8a3e184fe1d532cb046b05172296cf7d5c30ac37fd5201089d8ec9b7da25b4453c8e9501
-
SSDEEP
12288:LMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9L6XH02xXd4F2xXd4f2xX9:LnsJ39LyjbJkQFMhmC+6GD924O4YPv
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
resource behavioral1/files/0x00050000000195d6-78.dat behavioral1/files/0x0006000000019604-91.dat behavioral1/files/0x00070000000195d6-102.dat -
Executes dropped EXE 3 IoCs
pid Process 2756 ._cache_5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe 2740 Synaptics.exe 2548 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 2216 5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe 2216 5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe 2216 5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe 2216 5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe 2740 Synaptics.exe 2740 Synaptics.exe 2740 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1816 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1816 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2756 2216 5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe 30 PID 2216 wrote to memory of 2756 2216 5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe 30 PID 2216 wrote to memory of 2756 2216 5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe 30 PID 2216 wrote to memory of 2756 2216 5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe 30 PID 2216 wrote to memory of 2740 2216 5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe 31 PID 2216 wrote to memory of 2740 2216 5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe 31 PID 2216 wrote to memory of 2740 2216 5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe 31 PID 2216 wrote to memory of 2740 2216 5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe 31 PID 2740 wrote to memory of 2548 2740 Synaptics.exe 32 PID 2740 wrote to memory of 2548 2740 Synaptics.exe 32 PID 2740 wrote to memory of 2548 2740 Synaptics.exe 32 PID 2740 wrote to memory of 2548 2740 Synaptics.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe"C:\Users\Admin\AppData\Local\Temp\5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\._cache_5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe"C:\Users\Admin\AppData\Local\Temp\._cache_5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe"2⤵
- Executes dropped EXE
PID:2756
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2548
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5919f8ddfade928dcfd5ca7d4aa90237d
SHA1117ef50850e0c9afe261dafe2be9b783f4f2395a
SHA2565db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3
SHA512698bb26b9e089bcc92eb4b93bd6a7d004f7b9740bb8d237c55324b3d8a3e184fe1d532cb046b05172296cf7d5c30ac37fd5201089d8ec9b7da25b4453c8e9501
-
Filesize
23KB
MD578f35e914f8199e0d975fd49fc9dee21
SHA1f009c8cea04606786e4f059e2eed38e337bfd162
SHA2568a722abecbc03f22486da98577bdf25ec77bf06b1efa6d37e22827c477a81cd5
SHA51219ac857a86299729d31db1a9ca0d826285c7c4cd9450b7b0f01d9eaef6ce22aa1263ac2de4b654eb18fc74e131b78731b159fec99a037bcfa43d65725caed168
-
Filesize
26KB
MD52c68a309781dda0f56ceebf16d6bb4c4
SHA1a57a835a073b536b3be1341ee13b7b89ebd20ac6
SHA2564e13aed78273931b0be9caa25958a8cb854bf6706de68bae911e7910b1cdec92
SHA5126cee142c705ac1361b916bb940c5c977eab7c589c14183a85638dfdf2db8864d24f376714781204f5dd9c329a3b076282a6400892d60a17f153dd85395112e4d
-
Filesize
27KB
MD56031fbc17150e32ee28c991d6f18ce6e
SHA1bc4e474d9f047d05ca0ee187b90e4faa884deff2
SHA256f24d1703f57ac6d3bce04a4dc68161aff74ebe7a7bd783c6843a69d196bf3c53
SHA512f08132dbe65ad352aee81c211e7dc424b833fb82f7b2cbd39172a52e1c6c5737d181703b19341a6fe5fe6dbf65720b9a0c22332ffcf3334f69761a4d9b813164
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
\Users\Admin\AppData\Local\Temp\._cache_5db7f6741ff27a446eeecd3dae45741458ac5e3dbec8149b0352d12c02fef0f3.exe
Filesize495KB
MD51060abe43d8543e6e0054809a66df602
SHA14ac3cf1e994d25c44d0f8a40e6e5d02bbda21390
SHA256d94396429f54d074cd866f634381810935c4026b86a09fdfc9b7a8806de3cd5b
SHA512a95b511f2b4fd6afaaeac7cbe9e423bbe086afb48922ae30c6e5a0401f6702f6f7ccea999569a7f5436beb6a53eb533d26973e2ee2c8bd73520dd061b2231ccf