Analysis
-
max time kernel
141s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 04:47
Behavioral task
behavioral1
Sample
e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe
Resource
win10v2004-20241007-en
General
-
Target
e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe
-
Size
2.3MB
-
MD5
80891bf92a90f03a779aaca44b832723
-
SHA1
45ae96961d82606e993064bb761a5c01bf437fd4
-
SHA256
e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337
-
SHA512
08adbacde131f22198920104e185d9fce34c2895c4beb6832359ae0e48d009bd70d8a59ab2af519bbac347f1e09d8bee5752b4cd170780c13ac31a77f171da94
-
SSDEEP
49152:5nsHyjtk2MYC5GDsAmLRP/d6IxNIKnL5mO8ofTrbFWu:5nsmtk2aGw3CKL5mOlQu
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
resource behavioral1/files/0x0007000000016d27-99.dat -
Executes dropped EXE 8 IoCs
pid Process 2528 ._cache_e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe 3064 svchost.exe 688 Synaptics.exe 2800 ._cache_e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe 2724 svchost.exe 2876 ._cache_Synaptics.exe 2616 svchost.exe 904 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 2384 e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe 2384 e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe 2384 e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe 3064 svchost.exe 688 Synaptics.exe 688 Synaptics.exe 2616 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svchost.exe ._cache_e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe File created C:\Windows\svchost.exe ._cache_Synaptics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2552 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2552 EXCEL.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2528 2384 e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe 30 PID 2384 wrote to memory of 2528 2384 e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe 30 PID 2384 wrote to memory of 2528 2384 e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe 30 PID 2384 wrote to memory of 2528 2384 e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe 30 PID 2528 wrote to memory of 3064 2528 ._cache_e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe 31 PID 2528 wrote to memory of 3064 2528 ._cache_e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe 31 PID 2528 wrote to memory of 3064 2528 ._cache_e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe 31 PID 2528 wrote to memory of 3064 2528 ._cache_e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe 31 PID 2384 wrote to memory of 688 2384 e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe 32 PID 2384 wrote to memory of 688 2384 e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe 32 PID 2384 wrote to memory of 688 2384 e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe 32 PID 2384 wrote to memory of 688 2384 e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe 32 PID 3064 wrote to memory of 2800 3064 svchost.exe 33 PID 3064 wrote to memory of 2800 3064 svchost.exe 33 PID 3064 wrote to memory of 2800 3064 svchost.exe 33 PID 3064 wrote to memory of 2800 3064 svchost.exe 33 PID 688 wrote to memory of 2876 688 Synaptics.exe 35 PID 688 wrote to memory of 2876 688 Synaptics.exe 35 PID 688 wrote to memory of 2876 688 Synaptics.exe 35 PID 688 wrote to memory of 2876 688 Synaptics.exe 35 PID 2876 wrote to memory of 2616 2876 ._cache_Synaptics.exe 36 PID 2876 wrote to memory of 2616 2876 ._cache_Synaptics.exe 36 PID 2876 wrote to memory of 2616 2876 ._cache_Synaptics.exe 36 PID 2876 wrote to memory of 2616 2876 ._cache_Synaptics.exe 36 PID 2616 wrote to memory of 904 2616 svchost.exe 38 PID 2616 wrote to memory of 904 2616 svchost.exe 38 PID 2616 wrote to memory of 904 2616 svchost.exe 38 PID 2616 wrote to memory of 904 2616 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe"C:\Users\Admin\AppData\Local\Temp\e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\._cache_e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe"C:\Users\Admin\AppData\Local\Temp\._cache_e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\._cache_e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\._cache_e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe"C:\Users\Admin\AppData\Local\Temp\._cache_e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe"4⤵
- Executes dropped EXE
PID:2800
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate5⤵
- Executes dropped EXE
PID:904
-
-
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2724
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD580891bf92a90f03a779aaca44b832723
SHA145ae96961d82606e993064bb761a5c01bf437fd4
SHA256e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337
SHA51208adbacde131f22198920104e185d9fce34c2895c4beb6832359ae0e48d009bd70d8a59ab2af519bbac347f1e09d8bee5752b4cd170780c13ac31a77f171da94
-
Filesize
23KB
MD5dc5c1361737d0491081ee74384e7b409
SHA1ffd246a6ae034862c60afba3af7666460cb52165
SHA2562c12d8c2edee112cb02fe4efdc84254700b710cf194b36f19ab2ae34fdd1b287
SHA512517ab3e02b9d454fa0abc50c2069886126c01e028724a980f342be56028042551b4cd8dba275c0746d80964c8c36cccd493c792b04f1941a9f553fca428937f7
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b
-
\Users\Admin\AppData\Local\Temp\._cache_e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe
Filesize1.5MB
MD59ebc7dd20fa66f5deabfd8873a4ed8c6
SHA1cf1b1da0e5215738a8e972077be5804cb326b8ed
SHA256487bd28f3d0b43ed9827ba519d6d113c4f31059bd62b4492da586c7bc82a9474
SHA5125d0a052edec070ee573bc43ed9eb7eb92c0460efe60a5abc31d1200e092937b91eafce5492cd945d46645f9029f0f80a37907fe6292639d37f15f58dae377271
-
\Users\Admin\AppData\Local\Temp\._cache_e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe
Filesize1.6MB
MD5830647aade3007eeb933a6cafa306800
SHA1ed8b9ad7aa1ec0b07d6db09071053e55daa8eb3a
SHA256bf0b029fc7b4baf19deaec3ca8a5d03b30f830116cef4f59bbc528ceb7a66e56
SHA5125178762b8f5ac821361ffeae8279af49e4d076b1fb21de94f3253f3763d28f8615a16924eba8fa9cfd4f2db757efd1aa09435b9937be783f4996b2b0ecda0eee