Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 19:15
Behavioral task
behavioral1
Sample
67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe
Resource
win10v2004-20241007-en
General
-
Target
67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe
-
Size
1.2MB
-
MD5
b01019338cf3b3f4cf0649714f1ce510
-
SHA1
fd14d401700f0cd2605b2fa737be6ed3be18bb90
-
SHA256
67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1ed
-
SHA512
587f3fbe215e454bceb6c5e1e6a36fb3db7b46c718eccfa4cb10b697496600fd9ff85915ffdcd9b1618c95184d58e583114c76662a313cb826e781dbbba809ae
-
SSDEEP
12288:LMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9L6XH02xXd4F2xXd4f2xXP:LnsJ39LyjbJkQFMhmC+6GD924O4YP1
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Processes:
resource C:\Users\Admin\AppData\Local\Temp\GOmSZreS.xlsm C:\Users\Admin\AppData\Local\Temp\GOmSZreS.xlsm -
Executes dropped EXE 3 IoCs
Processes:
._cache_67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exeSynaptics.exe._cache_Synaptics.exepid process 2804 ._cache_67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe 1720 Synaptics.exe 2564 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
Processes:
67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exeSynaptics.exepid process 1884 67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe 1884 67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe 1884 67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe 1884 67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe 1720 Synaptics.exe 1720 Synaptics.exe 1720 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exeSynaptics.exeEXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1212 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
EXCEL.EXEpid process 1212 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exeSynaptics.exedescription pid process target process PID 1884 wrote to memory of 2804 1884 67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe ._cache_67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe PID 1884 wrote to memory of 2804 1884 67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe ._cache_67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe PID 1884 wrote to memory of 2804 1884 67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe ._cache_67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe PID 1884 wrote to memory of 2804 1884 67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe ._cache_67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe PID 1884 wrote to memory of 1720 1884 67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe Synaptics.exe PID 1884 wrote to memory of 1720 1884 67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe Synaptics.exe PID 1884 wrote to memory of 1720 1884 67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe Synaptics.exe PID 1884 wrote to memory of 1720 1884 67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe Synaptics.exe PID 1720 wrote to memory of 2564 1720 Synaptics.exe ._cache_Synaptics.exe PID 1720 wrote to memory of 2564 1720 Synaptics.exe ._cache_Synaptics.exe PID 1720 wrote to memory of 2564 1720 Synaptics.exe ._cache_Synaptics.exe PID 1720 wrote to memory of 2564 1720 Synaptics.exe ._cache_Synaptics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe"C:\Users\Admin\AppData\Local\Temp\67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\._cache_67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe"C:\Users\Admin\AppData\Local\Temp\._cache_67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe"2⤵
- Executes dropped EXE
PID:2804
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2564
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5b01019338cf3b3f4cf0649714f1ce510
SHA1fd14d401700f0cd2605b2fa737be6ed3be18bb90
SHA25667f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1ed
SHA512587f3fbe215e454bceb6c5e1e6a36fb3db7b46c718eccfa4cb10b697496600fd9ff85915ffdcd9b1618c95184d58e583114c76662a313cb826e781dbbba809ae
-
Filesize
23KB
MD53396e99d5282b47f354fd2c39019eaaf
SHA10282d7ee213f25103ca4f113bb3579d475d0f1ef
SHA256013396adfc7161bfbc0c8599199a7219bae329b421238d8c5403abfbd9bb7ed8
SHA5122104725a82937f83991c1c4ac9d5d3e96e99f30a11eb46ff1a62a4dbb81312045e8896957120a66c29b9f275c8759aec17df22a1cc10ce22e61e01fe06d693cf
-
Filesize
28KB
MD5e0f829efc249434374791f526a0f5d03
SHA14a5aa60b10d0cccea43b70bdb52f71ddef6ddbc4
SHA256bdd2a80a6893a23f0d4d60669ba34b10b35498f891be194b0a6f386c651861b9
SHA512c61dcbd545d1030e49885f53a41a4ce48402b1d7d49192a9c60449ea49349f5300cbf1df9978e9e03ab3a528e19262dd33bd6c00532b2e71073c3c0c93a781c4
-
Filesize
24KB
MD5215ed4a57365b7df864971144d79bbf5
SHA18def99279b2d25ddbe6cc142344c7f4e2ea829bc
SHA2563ee38d30cf7bfa9a10ccfc960fb7bb67d0e52a23b64f4634614ddf58ccd17eea
SHA5123dfd5910d248ef85e774cd6b4bc92f1cf33f0733ff5034421d9ae8e5b03d31ca26b22847c774ef462dc5f9514309379e8cabb162d446d0439648b2ebc1ddde80
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
28KB
MD5d380f853096c86fe3f30145abc33e7a0
SHA140d78223efaac680b0144e63841b3f0c07da3636
SHA256f851787ad0351d52ffbf748635daf4a13557c18d00f6dc88bd3409ce2c83d5cb
SHA5122d2537d0f38f865501ec4a2cfd86d38dc99847a5d4a6f0655e686232769b2c6d424d285738f3bc6206daf84244ae1bcc12ffc9e3c59a0438a9f33b8222cb0b0f
-
Filesize
156B
MD5fe085b3458dd3a7d99893b02bd50a774
SHA1335dda65691d5c47a627c9a43436ffb1c40e2e52
SHA256e21c7eeca30f927c6701cefd93528cba4e8bc3efd4a2ae5422a40e48ebcca62b
SHA512f21bbb03271c70ae6c2c9b880368fc4f9389939a5e1c575a1b0d5f81803b2df84774f5d13a0877d4a9f622355969040f5afaada00f6b3c1d33bb438ed301a658
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
\Users\Admin\AppData\Local\Temp\._cache_67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe
Filesize495KB
MD51060abe43d8543e6e0054809a66df602
SHA14ac3cf1e994d25c44d0f8a40e6e5d02bbda21390
SHA256d94396429f54d074cd866f634381810935c4026b86a09fdfc9b7a8806de3cd5b
SHA512a95b511f2b4fd6afaaeac7cbe9e423bbe086afb48922ae30c6e5a0401f6702f6f7ccea999569a7f5436beb6a53eb533d26973e2ee2c8bd73520dd061b2231ccf