Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 21:55
Behavioral task
behavioral1
Sample
SebWettSpooferV2.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
SebWettSpooferV2.exe
Resource
win10v2004-20241007-en
General
-
Target
SebWettSpooferV2.exe
-
Size
802KB
-
MD5
56775e973dadd17093e0a14f7b674066
-
SHA1
4b3f5109f7bbafbfc8ed1ae463f22c1badac9f4f
-
SHA256
1c883b87a3301aeb34d3cc3b39f9a19be18aa404736014dd17f38ac02c254282
-
SHA512
61e6d9a4d8358446c3865eb78fe2b080306fc7b34bcfc820d79e669d868eefd455806f9f22d2da132832a531912be0757f6ae6509c2098f651389944e95ff398
-
SSDEEP
12288:2MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V93ozfV2CpsXO9uj:2nsJ39LyjbJkQFMhmC+6GD9znCK
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
resource behavioral1/files/0x0008000000019490-110.dat -
Executes dropped EXE 3 IoCs
pid Process 2640 ._cache_SebWettSpooferV2.exe 2444 Synaptics.exe 2140 ._cache_Synaptics.exe -
Loads dropped DLL 15 IoCs
pid Process 2604 SebWettSpooferV2.exe 2604 SebWettSpooferV2.exe 2604 SebWettSpooferV2.exe 2444 Synaptics.exe 2444 Synaptics.exe 2836 WerFault.exe 2980 WerFault.exe 2836 WerFault.exe 2980 WerFault.exe 2836 WerFault.exe 2980 WerFault.exe 2836 WerFault.exe 2980 WerFault.exe 2980 WerFault.exe 2836 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" SebWettSpooferV2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2980 2140 WerFault.exe 33 2836 2640 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SebWettSpooferV2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_SebWettSpooferV2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2304 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2304 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2640 2604 SebWettSpooferV2.exe 31 PID 2604 wrote to memory of 2640 2604 SebWettSpooferV2.exe 31 PID 2604 wrote to memory of 2640 2604 SebWettSpooferV2.exe 31 PID 2604 wrote to memory of 2640 2604 SebWettSpooferV2.exe 31 PID 2604 wrote to memory of 2444 2604 SebWettSpooferV2.exe 32 PID 2604 wrote to memory of 2444 2604 SebWettSpooferV2.exe 32 PID 2604 wrote to memory of 2444 2604 SebWettSpooferV2.exe 32 PID 2604 wrote to memory of 2444 2604 SebWettSpooferV2.exe 32 PID 2444 wrote to memory of 2140 2444 Synaptics.exe 33 PID 2444 wrote to memory of 2140 2444 Synaptics.exe 33 PID 2444 wrote to memory of 2140 2444 Synaptics.exe 33 PID 2444 wrote to memory of 2140 2444 Synaptics.exe 33 PID 2140 wrote to memory of 2980 2140 ._cache_Synaptics.exe 35 PID 2140 wrote to memory of 2980 2140 ._cache_Synaptics.exe 35 PID 2140 wrote to memory of 2980 2140 ._cache_Synaptics.exe 35 PID 2140 wrote to memory of 2980 2140 ._cache_Synaptics.exe 35 PID 2640 wrote to memory of 2836 2640 ._cache_SebWettSpooferV2.exe 34 PID 2640 wrote to memory of 2836 2640 ._cache_SebWettSpooferV2.exe 34 PID 2640 wrote to memory of 2836 2640 ._cache_SebWettSpooferV2.exe 34 PID 2640 wrote to memory of 2836 2640 ._cache_SebWettSpooferV2.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\SebWettSpooferV2.exe"C:\Users\Admin\AppData\Local\Temp\SebWettSpooferV2.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\._cache_SebWettSpooferV2.exe"C:\Users\Admin\AppData\Local\Temp\._cache_SebWettSpooferV2.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 6283⤵
- Loads dropped DLL
- Program crash
PID:2836
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 6244⤵
- Loads dropped DLL
- Program crash
PID:2980
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
802KB
MD556775e973dadd17093e0a14f7b674066
SHA14b3f5109f7bbafbfc8ed1ae463f22c1badac9f4f
SHA2561c883b87a3301aeb34d3cc3b39f9a19be18aa404736014dd17f38ac02c254282
SHA51261e6d9a4d8358446c3865eb78fe2b080306fc7b34bcfc820d79e669d868eefd455806f9f22d2da132832a531912be0757f6ae6509c2098f651389944e95ff398
-
Filesize
24KB
MD519215d298adfb62823d0634955ab5656
SHA144c727e30fad9faf2c0801cdea9f4cc985d5524f
SHA25602613a03be04497ea8118646fbdcaf48034fb268929d9bb14c48b5f498fda099
SHA512d69fc9233ae384abeef02c8ecb37abd92934a2412816498b8c3a7987b195e3abfad2e0bda1e25037eb7c774b2339d78a4d1796f42e607ab897c7fa31b2da3a6e
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
26KB
MD54c597fb52f2bb36874b15e1daa539fe5
SHA13a81e87fbd7dca38e4401bf03dd1bdc6b61c2af7
SHA256fbdf16b1ae280a816d85b243b4057ca87086c52cc017393d58ac2733eaf7e196
SHA5125d330fc933ca3758715697cf519c7f5bca0673131e6eb39d374582e17c0f9247f9032a42142376b997b0c496dd45ca846ff4e90bce55997c8bc47b12512870a2
-
Filesize
31KB
MD56638a07b6a7113a787e2a821e2889bd5
SHA172f65f24368d0c3303c971b5d0f5c35af4729919
SHA256ca9bccc5507be9389e22bacbc1828bf022620f2938f9b70eeae8e0cb4aba3d1a
SHA512cf882ea4266081c14ce87e38a001971f058690eae6755b96cc1b9ca4647264ed0cc30baedbeeeff88a6c7c965fc679bc686f3e31c523c223a154430bb40dd80a
-
Filesize
26KB
MD5c840e6cbc0e10aa623f2be6626f8515b
SHA1f6d5c9b69ea0a845d41894e6e3c40e4973bb21fa
SHA2568ce344353dca279f0cd1ee3a5526cda874101744454db54b8bb8b2b376090ff6
SHA5129915e2afac232754b7ead7a086324c3c7294c8163fd98f39547cf88964cf2ff097d6bc40a03367d733da20e8d639a57407d90f454dd070b6d096cf338605becf
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
Filesize
49KB
MD5715b3ee9871f3b1d80ec6091ae35c602
SHA180ee70cce8f2ba8e2840f09ee2af873aeb3edadd
SHA2562cf732d62ade4a41263a551c60573749ea6e0bedc2089342d1ad74788b9b57da
SHA512e0cc4708f4a26bd4e516dac0b19c5221f7218566c967e0a381df86cf8e5e0e41821ec8a33a15677396521a7d8490a46fe63d838189cd4c43245713f7cdf5a618