Analysis
-
max time kernel
142s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 22:51
Behavioral task
behavioral1
Sample
4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe
Resource
win10v2004-20241007-en
General
-
Target
4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe
-
Size
818KB
-
MD5
b212a6752e64c5dce4d2b35ea72242dc
-
SHA1
538d54dde9b2ba48c6880dc35519339ef53e4d9d
-
SHA256
4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9
-
SHA512
fde02b04ed648603e1704693d61ab5a79f7c7c48ef2c57623f2cb395861c846d87be4445e36bc157538172ea9db33e34efff03f430ba6e15add1df7bde3eace5
-
SSDEEP
12288:oavC6Lyjsb0eOzkv4R7QnvUUilQ35+6G75V9buk/1OUetDgu:oavLyjbJkQFMhmC+6GD9buu1OUi
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
resource behavioral1/files/0x00050000000194e6-103.dat -
Executes dropped EXE 6 IoCs
pid Process 692 svchost.exe 2060 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 2436 svchost.exe 2936 ._cache_4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 3044 Synaptics.exe 2036 ._cache_Synaptics.exe -
Loads dropped DLL 10 IoCs
pid Process 692 svchost.exe 692 svchost.exe 2060 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 2060 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 2060 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 2060 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 2060 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 3044 Synaptics.exe 3044 Synaptics.exe 3044 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\svchost.exe 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3016 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2936 ._cache_4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 2036 ._cache_Synaptics.exe 3016 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2328 wrote to memory of 692 2328 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 31 PID 2328 wrote to memory of 692 2328 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 31 PID 2328 wrote to memory of 692 2328 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 31 PID 2328 wrote to memory of 692 2328 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 31 PID 692 wrote to memory of 2060 692 svchost.exe 32 PID 692 wrote to memory of 2060 692 svchost.exe 32 PID 692 wrote to memory of 2060 692 svchost.exe 32 PID 692 wrote to memory of 2060 692 svchost.exe 32 PID 2060 wrote to memory of 2936 2060 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 34 PID 2060 wrote to memory of 2936 2060 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 34 PID 2060 wrote to memory of 2936 2060 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 34 PID 2060 wrote to memory of 2936 2060 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 34 PID 2060 wrote to memory of 3044 2060 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 35 PID 2060 wrote to memory of 3044 2060 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 35 PID 2060 wrote to memory of 3044 2060 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 35 PID 2060 wrote to memory of 3044 2060 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 35 PID 3044 wrote to memory of 2036 3044 Synaptics.exe 36 PID 3044 wrote to memory of 2036 3044 Synaptics.exe 36 PID 3044 wrote to memory of 2036 3044 Synaptics.exe 36 PID 3044 wrote to memory of 2036 3044 Synaptics.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe"C:\Users\Admin\AppData\Local\Temp\4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\AppData\Local\Temp\4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe"C:\Users\Admin\AppData\Local\Temp\4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\._cache_4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe"C:\Users\Admin\AppData\Local\Temp\._cache_4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2936
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2036
-
-
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2436
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
24KB
MD5974789c981860bd8eb0257ccd00c39ba
SHA102019f2e12752fcab55949bb2ff0565f0b4a247f
SHA256b5094e873668aff9b21dabdbd76ac46a705d956a2a298c26bd3e3782e21fe369
SHA512796988da441e17f219fb97d26bb77a5981efcad0c2f797e59f34d7e77dd1a247d8871d331223f65d02f789b91025a73916f402791fe740afa3c841dbe4997288
-
C:\Users\Admin\AppData\Local\Temp\4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe
Filesize782KB
MD5883404164351e4c62fc0a82efa757071
SHA14a40df49092fd7d802c72e2fba3c31f28946dc3c
SHA256688af93adfa085afe0768e03a5d0bf5bc2caf49c3681f1a7317f68b499ef6b66
SHA5123849c3c51532fec154b58961cfda26daad6cee20bb2c8a60dcdb69e5f2ba6de54804bfd355af52dbe32329efc4403db6aaf257b151e5ca7e233daf2ec8d31cd1
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b
-
\Users\Admin\AppData\Local\Temp\._cache_4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe
Filesize28KB
MD5d64426c77296e981f5b28709196be972
SHA1760345d09c1c1c1b433f3c8618f48d38f6050be9
SHA256d574df8293a26f5f73a7bb2973f864dd978eebb9717e3a475cf6299d17afd047
SHA512b385ccc6eed46769f197d0f4f6bf8840ffb2928d5dd87ee5a0c9cb793d055e962747a4868dc0762a87d07c7c60457bdd4db258db67a21d95805c1ad5fa5a91e0