Analysis
-
max time kernel
111s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 09:07
Behavioral task
behavioral1
Sample
2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe
Resource
win10v2004-20241007-en
General
-
Target
2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe
-
Size
7.2MB
-
MD5
17fb5a937bb4ab68d8fda97aac0df74e
-
SHA1
d9e4a969e290907a81e84006f19fb6a3beec0faf
-
SHA256
2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d
-
SHA512
ea2af535f1a1dd163656c5d3e25eaff183d0247dba919bf60dd76f24a3f3e9b57a95f3513f20ad09e4b7aacd413293f5f7f381741ef0c2e26fdce82fe4955897
-
SSDEEP
196608:qLJ1103T3hrxZULtIta6oOcScwWhBNDWR:qV03FrrU5Ita6oOc7NCR
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 5 IoCs
Processes:
._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exeSynaptics.exe._cache_Synaptics.exe._cache_Synaptics.exepid process 2396 ._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe 2984 ._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe 2996 Synaptics.exe 2832 ._cache_Synaptics.exe 2376 ._cache_Synaptics.exe -
Loads dropped DLL 19 IoCs
Processes:
2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exeSynaptics.exe._cache_Synaptics.exe._cache_Synaptics.exepid process 2392 2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe 2392 2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe 2396 ._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe 2984 ._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe 2392 2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe 2392 2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe 2984 ._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe 2984 ._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe 2984 ._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe 2984 ._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe 2996 Synaptics.exe 2996 Synaptics.exe 2996 Synaptics.exe 2832 ._cache_Synaptics.exe 2376 ._cache_Synaptics.exe 2376 ._cache_Synaptics.exe 2376 ._cache_Synaptics.exe 2376 ._cache_Synaptics.exe 2376 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
EXCEL.EXE._cache_Synaptics.exe._cache_Synaptics.exe._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exeSynaptics.execmd.execmd.exe2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 808 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
EXCEL.EXEpid process 808 EXCEL.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exeSynaptics.exe._cache_Synaptics.exe._cache_Synaptics.exedescription pid process target process PID 2392 wrote to memory of 2396 2392 2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe ._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe PID 2392 wrote to memory of 2396 2392 2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe ._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe PID 2392 wrote to memory of 2396 2392 2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe ._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe PID 2392 wrote to memory of 2396 2392 2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe ._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe PID 2396 wrote to memory of 2984 2396 ._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe ._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe PID 2396 wrote to memory of 2984 2396 ._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe ._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe PID 2396 wrote to memory of 2984 2396 ._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe ._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe PID 2396 wrote to memory of 2984 2396 ._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe ._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe PID 2392 wrote to memory of 2996 2392 2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe Synaptics.exe PID 2392 wrote to memory of 2996 2392 2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe Synaptics.exe PID 2392 wrote to memory of 2996 2392 2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe Synaptics.exe PID 2392 wrote to memory of 2996 2392 2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe Synaptics.exe PID 2984 wrote to memory of 2928 2984 ._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe cmd.exe PID 2984 wrote to memory of 2928 2984 ._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe cmd.exe PID 2984 wrote to memory of 2928 2984 ._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe cmd.exe PID 2984 wrote to memory of 2928 2984 ._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe cmd.exe PID 2996 wrote to memory of 2832 2996 Synaptics.exe ._cache_Synaptics.exe PID 2996 wrote to memory of 2832 2996 Synaptics.exe ._cache_Synaptics.exe PID 2996 wrote to memory of 2832 2996 Synaptics.exe ._cache_Synaptics.exe PID 2996 wrote to memory of 2832 2996 Synaptics.exe ._cache_Synaptics.exe PID 2832 wrote to memory of 2376 2832 ._cache_Synaptics.exe ._cache_Synaptics.exe PID 2832 wrote to memory of 2376 2832 ._cache_Synaptics.exe ._cache_Synaptics.exe PID 2832 wrote to memory of 2376 2832 ._cache_Synaptics.exe ._cache_Synaptics.exe PID 2832 wrote to memory of 2376 2832 ._cache_Synaptics.exe ._cache_Synaptics.exe PID 2376 wrote to memory of 2164 2376 ._cache_Synaptics.exe cmd.exe PID 2376 wrote to memory of 2164 2376 ._cache_Synaptics.exe cmd.exe PID 2376 wrote to memory of 2164 2376 ._cache_Synaptics.exe cmd.exe PID 2376 wrote to memory of 2164 2376 ._cache_Synaptics.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe"C:\Users\Admin\AppData\Local\Temp\2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe"C:\Users\Admin\AppData\Local\Temp\._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe"C:\Users\Admin\AppData\Local\Temp\._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls4⤵
- System Location Discovery: System Language Discovery
PID:2928
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls5⤵
- System Location Discovery: System Language Discovery
PID:2164
-
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.2MB
MD517fb5a937bb4ab68d8fda97aac0df74e
SHA1d9e4a969e290907a81e84006f19fb6a3beec0faf
SHA2562a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d
SHA512ea2af535f1a1dd163656c5d3e25eaff183d0247dba919bf60dd76f24a3f3e9b57a95f3513f20ad09e4b7aacd413293f5f7f381741ef0c2e26fdce82fe4955897
-
Filesize
2.8MB
MD5490a41d1696f913cce54a3492f9230cc
SHA11783db8852345aee155c62080bdd0c44788bf45c
SHA256baf2f7c11a41c9a5ee6437174fdaf1753f9a1d592d0f79fc8e5d09ccac164032
SHA512df14b6eb474965ea6941315250a6cb9d22420d41123640e6d29b1a4563482db2ff89e83a47ac7c777ec85e953093b9c3ed82820770ae7a0466124e169a886252
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
24KB
MD5b2f45e49e9f5ea73a22c5f3157a7b0f6
SHA1e435e56af70ffb624fa3b579c5b7ec95c61d1c40
SHA25694a86746305a99a06209355453097938816b4b1aa5b23d28d1aa9d8ad20fffb6
SHA512dabd3ba7755f061abc7cb6a3b6f30784976cb10c1b9c6bddceb2df73db0376452ab603ff1cb671a04d684f6f1a25f07886de9ab78573d56a41e9e1c110d36af5
-
\Users\Admin\AppData\Local\Temp\._cache_2a466b380c58458cb27936e54b9320f7c6df4b960bfab2c5fdaca43916b6cb6d.exe
Filesize6.4MB
MD508f9dfe54351fbe840a1064057534b3c
SHA1778243c235a8cd0184c1d96f9066e332d26e4096
SHA25618eac1745817cc2f0fad48e37799596980321b11e16429d642d5089b59948f7d
SHA512aeb4ff6eb9601d7d7451710b3657608283048062fdaa6e9d4dbbc05324efb799a325a0ab9db9b07d461856faf10c36e5e5935f115a6eb5e5e76bc7eec655be0d
-
Filesize
2.2MB
MD5c5a254155bd7a9548a7b81ae37b46ee4
SHA1594a143cbdba14743b6d2a702ab0543fe28eba29
SHA256d46fa7be982ae654c92d5799ddfcbf91d071529f87258646a98a637fe6b650e0
SHA512b2aa525a7c88df2514e5c542ae04bd05c951ec0142580f57b2819cefb49be7d5e70b708ccf8e154e6be3541811dd7af781a72bfd47611b9a3e87e62c13d0985f
-
Filesize
278KB
MD5cf239a4ea58056f6b32e2928f64738c4
SHA1a4d2bdf399c2cc56ed1c11e3a48c7bdbcad721e8
SHA256052fee1823ad2986f7e4bab33f2fba136dcf87ec3d6acca37af72525aa1a6821
SHA5122c23652ba5e397bedc88eb1a13d4c2dce06ed5c5857d790a5205ab31f9bc5506da5e55e1f139924dad9f446cdf5ea0eae5b2eacc733e6fbdb9eec2e113581adc
-
Filesize
40KB
MD5e7e577c117bb5aa1011f841d1a10a218
SHA116558097bef92fcb61def76248823fe2d49f83c4
SHA25674ac52c9497d696c8d8eaa120899752c964573ee90e6b04dc3e6ba72ae06e0a0
SHA51282dc4594c4c6ad2cff76c54cc2caeb6751068c91f23b61deca6a1f9dba640acc4f0556df70d3812b8592c247c3259a74f5f1abd2b81fd0dfec2f194df62e1a34
-
Filesize
705KB
MD5e98a9104ee53322918e22b4d5900f695
SHA137565ff8a2ac41f97d3eea6db0b51f1d8b59c38a
SHA256e1f095371953942643b1d4d199b7b090529afeb20ab1bc26c90454716ea96ab2
SHA5125612dd1388a68e96bd30493d6ceaaecd32df4ceb7db64ae704aba52d041e1f49ad95f94bcab615c76430e250c81a68fee8bc937a43bb80ddc5493c87a7ebdaec