Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 04:47
Behavioral task
behavioral1
Sample
e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe
Resource
win10v2004-20241007-en
General
-
Target
e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe
-
Size
2.3MB
-
MD5
80891bf92a90f03a779aaca44b832723
-
SHA1
45ae96961d82606e993064bb761a5c01bf437fd4
-
SHA256
e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337
-
SHA512
08adbacde131f22198920104e185d9fce34c2895c4beb6832359ae0e48d009bd70d8a59ab2af519bbac347f1e09d8bee5752b4cd170780c13ac31a77f171da94
-
SSDEEP
49152:5nsHyjtk2MYC5GDsAmLRP/d6IxNIKnL5mO8ofTrbFWu:5nsmtk2aGw3CKL5mOlQu
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
resource behavioral2/files/0x000b000000023b66-254.dat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 8 IoCs
pid Process 1672 ._cache_e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe 2496 svchost.exe 2136 ._cache_e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe 4164 svchost.exe 2012 Synaptics.exe 2372 ._cache_Synaptics.exe 1940 svchost.exe 5116 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe -
Drops file in Program Files directory 25 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\chrome_pwa_launcher.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe svchost.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe svchost.exe File opened for modification C:\Program Files\dotnet\dotnet.exe svchost.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\notification_helper.exe svchost.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe svchost.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svchost.exe ._cache_e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe File created C:\Windows\svchost.exe ._cache_Synaptics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4780 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4780 EXCEL.EXE 4780 EXCEL.EXE 4780 EXCEL.EXE 4780 EXCEL.EXE 4780 EXCEL.EXE 4780 EXCEL.EXE 4780 EXCEL.EXE 4780 EXCEL.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2104 wrote to memory of 1672 2104 e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe 83 PID 2104 wrote to memory of 1672 2104 e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe 83 PID 2104 wrote to memory of 1672 2104 e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe 83 PID 1672 wrote to memory of 2496 1672 ._cache_e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe 84 PID 1672 wrote to memory of 2496 1672 ._cache_e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe 84 PID 1672 wrote to memory of 2496 1672 ._cache_e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe 84 PID 2496 wrote to memory of 2136 2496 svchost.exe 85 PID 2496 wrote to memory of 2136 2496 svchost.exe 85 PID 2496 wrote to memory of 2136 2496 svchost.exe 85 PID 2104 wrote to memory of 2012 2104 e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe 87 PID 2104 wrote to memory of 2012 2104 e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe 87 PID 2104 wrote to memory of 2012 2104 e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe 87 PID 2012 wrote to memory of 2372 2012 Synaptics.exe 88 PID 2012 wrote to memory of 2372 2012 Synaptics.exe 88 PID 2012 wrote to memory of 2372 2012 Synaptics.exe 88 PID 2372 wrote to memory of 1940 2372 ._cache_Synaptics.exe 89 PID 2372 wrote to memory of 1940 2372 ._cache_Synaptics.exe 89 PID 2372 wrote to memory of 1940 2372 ._cache_Synaptics.exe 89 PID 1940 wrote to memory of 5116 1940 svchost.exe 91 PID 1940 wrote to memory of 5116 1940 svchost.exe 91 PID 1940 wrote to memory of 5116 1940 svchost.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe"C:\Users\Admin\AppData\Local\Temp\e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\._cache_e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe"C:\Users\Admin\AppData\Local\Temp\._cache_e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\._cache_e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\._cache_e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe"C:\Users\Admin\AppData\Local\Temp\._cache_e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe"4⤵
- Executes dropped EXE
PID:2136
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate5⤵
- Executes dropped EXE
PID:5116
-
-
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4164
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD580891bf92a90f03a779aaca44b832723
SHA145ae96961d82606e993064bb761a5c01bf437fd4
SHA256e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337
SHA51208adbacde131f22198920104e185d9fce34c2895c4beb6832359ae0e48d009bd70d8a59ab2af519bbac347f1e09d8bee5752b4cd170780c13ac31a77f171da94
-
Filesize
1.5MB
MD55238f659b6127f1568222f18c238d7b6
SHA14adca550e837cf0110f7d558d9b0b0b0812b0818
SHA256c15f5085e7c2b7216384e802eae7361350a1f996ec8794f8458b20475ec18cdc
SHA5127f2098a84f6d927141a494be4dc198a0457d35b0d8aa4f4da61c3b67d5cecc049b782df29cee81b748658473c1fbde3e27ebe9059a7afe15312d4f04529158d2
-
Filesize
1.5MB
MD5cf7743709a15a98639413e31bede6feb
SHA1fad378ac147b60d27eba5fa492f612e3247dd883
SHA25633e7f334cca110bf6138ca7b48485c63754c0160d80ac1f6d89bc4a002e44ebc
SHA512257e1c1130a13fc13363a153f969407952a7b8f6b39db33eefec4adcfd40e22f6bc50185c3da13df66c1b6279a24ce076849683fa8b7a6b378a6a2fa51366450
-
C:\Users\Admin\AppData\Local\Temp\._cache_e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe
Filesize1.6MB
MD5830647aade3007eeb933a6cafa306800
SHA1ed8b9ad7aa1ec0b07d6db09071053e55daa8eb3a
SHA256bf0b029fc7b4baf19deaec3ca8a5d03b30f830116cef4f59bbc528ceb7a66e56
SHA5125178762b8f5ac821361ffeae8279af49e4d076b1fb21de94f3253f3763d28f8615a16924eba8fa9cfd4f2db757efd1aa09435b9937be783f4996b2b0ecda0eee
-
C:\Users\Admin\AppData\Local\Temp\._cache_e2649a7a7f8c5136fd028f9a12c3e7dfe57004c526391b67cf8b066a057f8337.exe
Filesize1.5MB
MD59ebc7dd20fa66f5deabfd8873a4ed8c6
SHA1cf1b1da0e5215738a8e972077be5804cb326b8ed
SHA256487bd28f3d0b43ed9827ba519d6d113c4f31059bd62b4492da586c7bc82a9474
SHA5125d0a052edec070ee573bc43ed9eb7eb92c0460efe60a5abc31d1200e092937b91eafce5492cd945d46645f9029f0f80a37907fe6292639d37f15f58dae377271
-
Filesize
21KB
MD575eafaba029b20ba0c395c59eccb1c59
SHA13bc55e76eec1beef006990fe0a14ff60d6e637ec
SHA256136b96bd459a49cc571349b3026379f78f04451a402517dc80b65e7a053efc16
SHA512e0b2ce3ff5b3e31950314ec11fae99f538fc946a5c96b821ffa37ae9803195b07011119d1333e1cd797ff01081ca24888f84b0c485fa4a6fc364d5d94185cadf
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b