Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 22:51
Behavioral task
behavioral1
Sample
4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe
Resource
win10v2004-20241007-en
General
-
Target
4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe
-
Size
818KB
-
MD5
b212a6752e64c5dce4d2b35ea72242dc
-
SHA1
538d54dde9b2ba48c6880dc35519339ef53e4d9d
-
SHA256
4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9
-
SHA512
fde02b04ed648603e1704693d61ab5a79f7c7c48ef2c57623f2cb395861c846d87be4445e36bc157538172ea9db33e34efff03f430ba6e15add1df7bde3eace5
-
SSDEEP
12288:oavC6Lyjsb0eOzkv4R7QnvUUilQ35+6G75V9buk/1OUetDgu:oavLyjbJkQFMhmC+6GD9buu1OUi
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe -
Executes dropped EXE 6 IoCs
pid Process 1516 svchost.exe 2960 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 2768 svchost.exe 2324 ._cache_4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 1936 Synaptics.exe 1100 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe -
Drops file in Program Files directory 51 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe svchost.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe svchost.exe File opened for modification C:\Program Files\dotnet\dotnet.exe svchost.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\notification_helper.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe svchost.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE svchost.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\chrome_pwa_launcher.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\svchost.exe 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4892 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2324 ._cache_4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 1100 ._cache_Synaptics.exe 4892 EXCEL.EXE 4892 EXCEL.EXE 4892 EXCEL.EXE 4892 EXCEL.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1104 wrote to memory of 1516 1104 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 82 PID 1104 wrote to memory of 1516 1104 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 82 PID 1104 wrote to memory of 1516 1104 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 82 PID 1516 wrote to memory of 2960 1516 svchost.exe 83 PID 1516 wrote to memory of 2960 1516 svchost.exe 83 PID 1516 wrote to memory of 2960 1516 svchost.exe 83 PID 2960 wrote to memory of 2324 2960 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 85 PID 2960 wrote to memory of 2324 2960 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 85 PID 2960 wrote to memory of 2324 2960 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 85 PID 2960 wrote to memory of 1936 2960 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 86 PID 2960 wrote to memory of 1936 2960 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 86 PID 2960 wrote to memory of 1936 2960 4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe 86 PID 1936 wrote to memory of 1100 1936 Synaptics.exe 87 PID 1936 wrote to memory of 1100 1936 Synaptics.exe 87 PID 1936 wrote to memory of 1100 1936 Synaptics.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe"C:\Users\Admin\AppData\Local\Temp\4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe"C:\Users\Admin\AppData\Local\Temp\4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\._cache_4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe"C:\Users\Admin\AppData\Local\Temp\._cache_4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2324
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1100
-
-
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2768
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\._cache_4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe
Filesize28KB
MD5d64426c77296e981f5b28709196be972
SHA1760345d09c1c1c1b433f3c8618f48d38f6050be9
SHA256d574df8293a26f5f73a7bb2973f864dd978eebb9717e3a475cf6299d17afd047
SHA512b385ccc6eed46769f197d0f4f6bf8840ffb2928d5dd87ee5a0c9cb793d055e962747a4868dc0762a87d07c7c60457bdd4db258db67a21d95805c1ad5fa5a91e0
-
C:\Users\Admin\AppData\Local\Temp\4b5c2a957c24169b658ab3a62944553736f7051f41efd1e1b76d9d3a12cb0dd9.exe
Filesize782KB
MD5883404164351e4c62fc0a82efa757071
SHA14a40df49092fd7d802c72e2fba3c31f28946dc3c
SHA256688af93adfa085afe0768e03a5d0bf5bc2caf49c3681f1a7317f68b499ef6b66
SHA5123849c3c51532fec154b58961cfda26daad6cee20bb2c8a60dcdb69e5f2ba6de54804bfd355af52dbe32329efc4403db6aaf257b151e5ca7e233daf2ec8d31cd1
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b