Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 22:47
Behavioral task
behavioral1
Sample
4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe
Resource
win10v2004-20241007-en
General
-
Target
4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe
-
Size
818KB
-
MD5
b212a6752e64c5dce4d2b35ea72242dc
-
SHA1
538d54dde9b2ba48c6880dc35519339ef53e4d9d
-
SHA256
4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9
-
SHA512
fde02b04ed648603e1704693d61ab5a79f7c7c48ef2c57623f2cb395861c846d87be4445e36bc157538172ea9db33e34efff03f430ba6e15add1df7bde3eace5
-
SSDEEP
12288:oavC6Lyjsb0eOzkv4R7QnvUUilQ35+6G75V9buk/1OUetDgu:oavLyjbJkQFMhmC+6GD9buu1OUi
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 6 IoCs
pid Process 2688 svchost.exe 2820 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 2148 svchost.exe 2616 ._cache_4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 1528 Synaptics.exe 2052 ._cache_Synaptics.exe -
Loads dropped DLL 10 IoCs
pid Process 2688 svchost.exe 2688 svchost.exe 2820 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 2820 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 2820 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 2820 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 2820 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 1528 Synaptics.exe 1528 Synaptics.exe 1528 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\svchost.exe 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 660 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2616 ._cache_4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 2052 ._cache_Synaptics.exe 660 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2688 2128 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 30 PID 2128 wrote to memory of 2688 2128 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 30 PID 2128 wrote to memory of 2688 2128 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 30 PID 2128 wrote to memory of 2688 2128 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 30 PID 2688 wrote to memory of 2820 2688 svchost.exe 31 PID 2688 wrote to memory of 2820 2688 svchost.exe 31 PID 2688 wrote to memory of 2820 2688 svchost.exe 31 PID 2688 wrote to memory of 2820 2688 svchost.exe 31 PID 2820 wrote to memory of 2616 2820 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 33 PID 2820 wrote to memory of 2616 2820 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 33 PID 2820 wrote to memory of 2616 2820 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 33 PID 2820 wrote to memory of 2616 2820 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 33 PID 2820 wrote to memory of 1528 2820 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 34 PID 2820 wrote to memory of 1528 2820 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 34 PID 2820 wrote to memory of 1528 2820 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 34 PID 2820 wrote to memory of 1528 2820 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 34 PID 1528 wrote to memory of 2052 1528 Synaptics.exe 35 PID 1528 wrote to memory of 2052 1528 Synaptics.exe 35 PID 1528 wrote to memory of 2052 1528 Synaptics.exe 35 PID 1528 wrote to memory of 2052 1528 Synaptics.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe"C:\Users\Admin\AppData\Local\Temp\4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe"C:\Users\Admin\AppData\Local\Temp\4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\._cache_4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe"C:\Users\Admin\AppData\Local\Temp\._cache_4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2616
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2052
-
-
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2148
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5b628b1092ca01e8b01bb6617a322f172
SHA1ceb068ba92030e0401e14f5ebc4b49c5dc42323d
SHA2566750ebc0518c6f5c30c0f9ddf2b9269997cea9997a5d0fb6fd4af1a0d3628fcb
SHA512cfadce43668c5ca081032252e205805489848a9a423143e4ac0d070fd1ab7945a1c3754422546a843fd24ca377434637b9f49c34d9bbecb6dde3f1c4fb73873e
-
Filesize
24KB
MD57d7dd351a6e83b5626f752944cd82f70
SHA1a9524c3b0ed1e9c308a9c1bcc47ea850b3c53b41
SHA2567d7198c22cfa224835bba6c70a5969d916bfddf6c5643158ebf781935613b753
SHA5120e7971938b1d5839b9caf8207b3f01c4ab59b3324eb741a07c4396a69d42bc409a23dcefc1e4b55d3206f718dba1ca5188cdd70d1d84a9e873f2e50242265268
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
26KB
MD59258157834f0028ab9692b3926bf75e1
SHA16eb84089a3d8b65a96fef4184ecdc25b7d1668aa
SHA2566c1470c9c857e647b1d8727677573641246e0e5860e795a09298f57827dd8017
SHA5121c1a7e6c23fbf6ccfebca3c8504f72f808285739d3f7a40c09b8d643dee11ea06b085bc18804d0643f3df8db7f809ac77e5103bf0c629047d6f489d200e33709
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b
-
\Users\Admin\AppData\Local\Temp\._cache_4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe
Filesize28KB
MD5d64426c77296e981f5b28709196be972
SHA1760345d09c1c1c1b433f3c8618f48d38f6050be9
SHA256d574df8293a26f5f73a7bb2973f864dd978eebb9717e3a475cf6299d17afd047
SHA512b385ccc6eed46769f197d0f4f6bf8840ffb2928d5dd87ee5a0c9cb793d055e962747a4868dc0762a87d07c7c60457bdd4db258db67a21d95805c1ad5fa5a91e0
-
\Users\Admin\AppData\Local\Temp\4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe
Filesize782KB
MD5883404164351e4c62fc0a82efa757071
SHA14a40df49092fd7d802c72e2fba3c31f28946dc3c
SHA256688af93adfa085afe0768e03a5d0bf5bc2caf49c3681f1a7317f68b499ef6b66
SHA5123849c3c51532fec154b58961cfda26daad6cee20bb2c8a60dcdb69e5f2ba6de54804bfd355af52dbe32329efc4403db6aaf257b151e5ca7e233daf2ec8d31cd1