Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/11/2024, 19:15
Behavioral task
behavioral1
Sample
67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe
Resource
win10v2004-20241007-en
General
-
Target
67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe
-
Size
1.2MB
-
MD5
b01019338cf3b3f4cf0649714f1ce510
-
SHA1
fd14d401700f0cd2605b2fa737be6ed3be18bb90
-
SHA256
67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1ed
-
SHA512
587f3fbe215e454bceb6c5e1e6a36fb3db7b46c718eccfa4cb10b697496600fd9ff85915ffdcd9b1618c95184d58e583114c76662a313cb826e781dbbba809ae
-
SSDEEP
12288:LMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9L6XH02xXd4F2xXd4f2xXP:LnsJ39LyjbJkQFMhmC+6GD924O4YP1
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
resource behavioral1/files/0x0006000000019cca-95.dat behavioral1/files/0x0006000000019d8e-108.dat -
Executes dropped EXE 3 IoCs
pid Process 2804 ._cache_67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe 1720 Synaptics.exe 2564 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 1884 67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe 1884 67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe 1884 67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe 1884 67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe 1720 Synaptics.exe 1720 Synaptics.exe 1720 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1212 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1212 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1884 wrote to memory of 2804 1884 67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe 30 PID 1884 wrote to memory of 2804 1884 67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe 30 PID 1884 wrote to memory of 2804 1884 67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe 30 PID 1884 wrote to memory of 2804 1884 67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe 30 PID 1884 wrote to memory of 1720 1884 67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe 31 PID 1884 wrote to memory of 1720 1884 67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe 31 PID 1884 wrote to memory of 1720 1884 67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe 31 PID 1884 wrote to memory of 1720 1884 67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe 31 PID 1720 wrote to memory of 2564 1720 Synaptics.exe 32 PID 1720 wrote to memory of 2564 1720 Synaptics.exe 32 PID 1720 wrote to memory of 2564 1720 Synaptics.exe 32 PID 1720 wrote to memory of 2564 1720 Synaptics.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe"C:\Users\Admin\AppData\Local\Temp\67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\._cache_67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe"C:\Users\Admin\AppData\Local\Temp\._cache_67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe"2⤵
- Executes dropped EXE
PID:2804
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2564
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5b01019338cf3b3f4cf0649714f1ce510
SHA1fd14d401700f0cd2605b2fa737be6ed3be18bb90
SHA25667f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1ed
SHA512587f3fbe215e454bceb6c5e1e6a36fb3db7b46c718eccfa4cb10b697496600fd9ff85915ffdcd9b1618c95184d58e583114c76662a313cb826e781dbbba809ae
-
Filesize
23KB
MD53396e99d5282b47f354fd2c39019eaaf
SHA10282d7ee213f25103ca4f113bb3579d475d0f1ef
SHA256013396adfc7161bfbc0c8599199a7219bae329b421238d8c5403abfbd9bb7ed8
SHA5122104725a82937f83991c1c4ac9d5d3e96e99f30a11eb46ff1a62a4dbb81312045e8896957120a66c29b9f275c8759aec17df22a1cc10ce22e61e01fe06d693cf
-
Filesize
28KB
MD5e0f829efc249434374791f526a0f5d03
SHA14a5aa60b10d0cccea43b70bdb52f71ddef6ddbc4
SHA256bdd2a80a6893a23f0d4d60669ba34b10b35498f891be194b0a6f386c651861b9
SHA512c61dcbd545d1030e49885f53a41a4ce48402b1d7d49192a9c60449ea49349f5300cbf1df9978e9e03ab3a528e19262dd33bd6c00532b2e71073c3c0c93a781c4
-
Filesize
24KB
MD5215ed4a57365b7df864971144d79bbf5
SHA18def99279b2d25ddbe6cc142344c7f4e2ea829bc
SHA2563ee38d30cf7bfa9a10ccfc960fb7bb67d0e52a23b64f4634614ddf58ccd17eea
SHA5123dfd5910d248ef85e774cd6b4bc92f1cf33f0733ff5034421d9ae8e5b03d31ca26b22847c774ef462dc5f9514309379e8cabb162d446d0439648b2ebc1ddde80
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
28KB
MD5d380f853096c86fe3f30145abc33e7a0
SHA140d78223efaac680b0144e63841b3f0c07da3636
SHA256f851787ad0351d52ffbf748635daf4a13557c18d00f6dc88bd3409ce2c83d5cb
SHA5122d2537d0f38f865501ec4a2cfd86d38dc99847a5d4a6f0655e686232769b2c6d424d285738f3bc6206daf84244ae1bcc12ffc9e3c59a0438a9f33b8222cb0b0f
-
Filesize
156B
MD5fe085b3458dd3a7d99893b02bd50a774
SHA1335dda65691d5c47a627c9a43436ffb1c40e2e52
SHA256e21c7eeca30f927c6701cefd93528cba4e8bc3efd4a2ae5422a40e48ebcca62b
SHA512f21bbb03271c70ae6c2c9b880368fc4f9389939a5e1c575a1b0d5f81803b2df84774f5d13a0877d4a9f622355969040f5afaada00f6b3c1d33bb438ed301a658
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
\Users\Admin\AppData\Local\Temp\._cache_67f9319df91221722d1f4ba0e2bebecc87a00dbbc13703d9fa728e58abe7e1edN.exe
Filesize495KB
MD51060abe43d8543e6e0054809a66df602
SHA14ac3cf1e994d25c44d0f8a40e6e5d02bbda21390
SHA256d94396429f54d074cd866f634381810935c4026b86a09fdfc9b7a8806de3cd5b
SHA512a95b511f2b4fd6afaaeac7cbe9e423bbe086afb48922ae30c6e5a0401f6702f6f7ccea999569a7f5436beb6a53eb533d26973e2ee2c8bd73520dd061b2231ccf