Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 22:47
Behavioral task
behavioral1
Sample
4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe
Resource
win10v2004-20241007-en
General
-
Target
4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe
-
Size
818KB
-
MD5
b212a6752e64c5dce4d2b35ea72242dc
-
SHA1
538d54dde9b2ba48c6880dc35519339ef53e4d9d
-
SHA256
4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9
-
SHA512
fde02b04ed648603e1704693d61ab5a79f7c7c48ef2c57623f2cb395861c846d87be4445e36bc157538172ea9db33e34efff03f430ba6e15add1df7bde3eace5
-
SSDEEP
12288:oavC6Lyjsb0eOzkv4R7QnvUUilQ35+6G75V9buk/1OUetDgu:oavLyjbJkQFMhmC+6GD9buu1OUi
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 6 IoCs
pid Process 3588 svchost.exe 4916 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 4268 svchost.exe 5112 ._cache_4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 1280 Synaptics.exe 4496 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe -
Drops file in Program Files directory 38 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE svchost.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\chrome_pwa_launcher.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe svchost.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe svchost.exe File opened for modification C:\Program Files\dotnet\dotnet.exe svchost.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\notification_helper.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\svchost.exe 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5112 ._cache_4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 4496 ._cache_Synaptics.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 620 wrote to memory of 3588 620 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 82 PID 620 wrote to memory of 3588 620 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 82 PID 620 wrote to memory of 3588 620 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 82 PID 3588 wrote to memory of 4916 3588 svchost.exe 83 PID 3588 wrote to memory of 4916 3588 svchost.exe 83 PID 3588 wrote to memory of 4916 3588 svchost.exe 83 PID 4916 wrote to memory of 5112 4916 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 85 PID 4916 wrote to memory of 5112 4916 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 85 PID 4916 wrote to memory of 5112 4916 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 85 PID 4916 wrote to memory of 1280 4916 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 86 PID 4916 wrote to memory of 1280 4916 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 86 PID 4916 wrote to memory of 1280 4916 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 86 PID 1280 wrote to memory of 4496 1280 Synaptics.exe 87 PID 1280 wrote to memory of 4496 1280 Synaptics.exe 87 PID 1280 wrote to memory of 4496 1280 Synaptics.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe"C:\Users\Admin\AppData\Local\Temp\4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe"C:\Users\Admin\AppData\Local\Temp\4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\._cache_4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe"C:\Users\Admin\AppData\Local\Temp\._cache_4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5112
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4496
-
-
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\._cache_4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe
Filesize28KB
MD5d64426c77296e981f5b28709196be972
SHA1760345d09c1c1c1b433f3c8618f48d38f6050be9
SHA256d574df8293a26f5f73a7bb2973f864dd978eebb9717e3a475cf6299d17afd047
SHA512b385ccc6eed46769f197d0f4f6bf8840ffb2928d5dd87ee5a0c9cb793d055e962747a4868dc0762a87d07c7c60457bdd4db258db67a21d95805c1ad5fa5a91e0
-
C:\Users\Admin\AppData\Local\Temp\4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe
Filesize782KB
MD5883404164351e4c62fc0a82efa757071
SHA14a40df49092fd7d802c72e2fba3c31f28946dc3c
SHA256688af93adfa085afe0768e03a5d0bf5bc2caf49c3681f1a7317f68b499ef6b66
SHA5123849c3c51532fec154b58961cfda26daad6cee20bb2c8a60dcdb69e5f2ba6de54804bfd355af52dbe32329efc4403db6aaf257b151e5ca7e233daf2ec8d31cd1
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b