Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 09:28
Behavioral task
behavioral1
Sample
a06e6256221e14f584d88a7593c62e1c0bb3ae9df83e93326ea242a303e6532f.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a06e6256221e14f584d88a7593c62e1c0bb3ae9df83e93326ea242a303e6532f.exe
Resource
win10v2004-20241007-en
General
-
Target
a06e6256221e14f584d88a7593c62e1c0bb3ae9df83e93326ea242a303e6532f.exe
-
Size
4.8MB
-
MD5
f7c623ad74078ffd82447806577acf96
-
SHA1
c8e03d7169e3031610b6fcccc4603201ad8eda07
-
SHA256
a06e6256221e14f584d88a7593c62e1c0bb3ae9df83e93326ea242a303e6532f
-
SHA512
a04bde8210ac4a0c7a8627c345439d10749c4964467ad3735554f7f881497fd208c6003001650f962de78bbf93af292d43ca33605a67181f6b361ca7408268aa
-
SSDEEP
98304:ansmtk2aQzI+VNHtad8rAiCQDE+KOzG5En1QIonPrW29hKXj:ULV1HtadtPQDEfEn1QIbMc
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
Processes:
._cache_a06e6256221e14f584d88a7593c62e1c0bb3ae9df83e93326ea242a303e6532f.exeSynaptics.exe._cache_Synaptics.exepid Process 2956 ._cache_a06e6256221e14f584d88a7593c62e1c0bb3ae9df83e93326ea242a303e6532f.exe 2668 Synaptics.exe 876 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
Processes:
a06e6256221e14f584d88a7593c62e1c0bb3ae9df83e93326ea242a303e6532f.exeSynaptics.exepid Process 2884 a06e6256221e14f584d88a7593c62e1c0bb3ae9df83e93326ea242a303e6532f.exe 2884 a06e6256221e14f584d88a7593c62e1c0bb3ae9df83e93326ea242a303e6532f.exe 2884 a06e6256221e14f584d88a7593c62e1c0bb3ae9df83e93326ea242a303e6532f.exe 2884 a06e6256221e14f584d88a7593c62e1c0bb3ae9df83e93326ea242a303e6532f.exe 2668 Synaptics.exe 2668 Synaptics.exe 2668 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
a06e6256221e14f584d88a7593c62e1c0bb3ae9df83e93326ea242a303e6532f.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" a06e6256221e14f584d88a7593c62e1c0bb3ae9df83e93326ea242a303e6532f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a06e6256221e14f584d88a7593c62e1c0bb3ae9df83e93326ea242a303e6532f.exeSynaptics.exeEXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a06e6256221e14f584d88a7593c62e1c0bb3ae9df83e93326ea242a303e6532f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 1060 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
EXCEL.EXEpid Process 1060 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
a06e6256221e14f584d88a7593c62e1c0bb3ae9df83e93326ea242a303e6532f.exeSynaptics.exedescription pid Process procid_target PID 2884 wrote to memory of 2956 2884 a06e6256221e14f584d88a7593c62e1c0bb3ae9df83e93326ea242a303e6532f.exe 30 PID 2884 wrote to memory of 2956 2884 a06e6256221e14f584d88a7593c62e1c0bb3ae9df83e93326ea242a303e6532f.exe 30 PID 2884 wrote to memory of 2956 2884 a06e6256221e14f584d88a7593c62e1c0bb3ae9df83e93326ea242a303e6532f.exe 30 PID 2884 wrote to memory of 2956 2884 a06e6256221e14f584d88a7593c62e1c0bb3ae9df83e93326ea242a303e6532f.exe 30 PID 2884 wrote to memory of 2668 2884 a06e6256221e14f584d88a7593c62e1c0bb3ae9df83e93326ea242a303e6532f.exe 32 PID 2884 wrote to memory of 2668 2884 a06e6256221e14f584d88a7593c62e1c0bb3ae9df83e93326ea242a303e6532f.exe 32 PID 2884 wrote to memory of 2668 2884 a06e6256221e14f584d88a7593c62e1c0bb3ae9df83e93326ea242a303e6532f.exe 32 PID 2884 wrote to memory of 2668 2884 a06e6256221e14f584d88a7593c62e1c0bb3ae9df83e93326ea242a303e6532f.exe 32 PID 2668 wrote to memory of 876 2668 Synaptics.exe 33 PID 2668 wrote to memory of 876 2668 Synaptics.exe 33 PID 2668 wrote to memory of 876 2668 Synaptics.exe 33 PID 2668 wrote to memory of 876 2668 Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\a06e6256221e14f584d88a7593c62e1c0bb3ae9df83e93326ea242a303e6532f.exe"C:\Users\Admin\AppData\Local\Temp\a06e6256221e14f584d88a7593c62e1c0bb3ae9df83e93326ea242a303e6532f.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\._cache_a06e6256221e14f584d88a7593c62e1c0bb3ae9df83e93326ea242a303e6532f.exe"C:\Users\Admin\AppData\Local\Temp\._cache_a06e6256221e14f584d88a7593c62e1c0bb3ae9df83e93326ea242a303e6532f.exe"2⤵
- Executes dropped EXE
PID:2956
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:876
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.8MB
MD5f7c623ad74078ffd82447806577acf96
SHA1c8e03d7169e3031610b6fcccc4603201ad8eda07
SHA256a06e6256221e14f584d88a7593c62e1c0bb3ae9df83e93326ea242a303e6532f
SHA512a04bde8210ac4a0c7a8627c345439d10749c4964467ad3735554f7f881497fd208c6003001650f962de78bbf93af292d43ca33605a67181f6b361ca7408268aa
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
29KB
MD5d4b7f9efe295ae2af1aefd40a7ee7496
SHA1094be0e28599258e00a4c44ede687868a959a52d
SHA25670fce0beac9f081164edfff47624b573ef3f7c969466de613a30b05dcd98fa58
SHA512e2e32a9ca27dcffa254cfe859080d3a4350a709aba77935edd49cdcb1685201e41280eddc62da085f9f112396242c4914f113690aead7307938f45d9426fefca
-
Filesize
23KB
MD59106e52d1a88753a2ee7db208bcd79e1
SHA17c98320375ccaaba58034b6a4777e8d6cc24b36e
SHA256960a016a08c6056d1e4aee674f7ef8c3da5451ec2350d9346a2071b63a84ea9c
SHA512241bbc360fd24c41bc83189e2fda2e4c9866f8fc08ef69ca8c9abf4e2bd5fe58c388a91382e4fba4d151767e19303d4fb1ed269094b4ca0a7a8147c4ae44dbfe
-
\Users\Admin\AppData\Local\Temp\._cache_a06e6256221e14f584d88a7593c62e1c0bb3ae9df83e93326ea242a303e6532f.exe
Filesize4.0MB
MD507244a2c002ffdf1986b454429eace0b
SHA1d7cd121caac2f5989aa68a052f638f82d4566328
SHA256e9522e6912a0124c0a8c9ff9bb3712b474971376a4eb4ca614bb1664a2b4abcf
SHA5124a09db85202723a73703c5926921fef60c3dddae21528a01936987306c5e7937463f94a2f4a922811de1f76621def2a8a597a8b38a719dd24e6ff3d4e07492ca