Analysis
-
max time kernel
30s -
max time network
23s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 09:09
Behavioral task
behavioral1
Sample
81351025614fa49877fe720b29232748.exe
Resource
win10v2004-20241007-en
General
-
Target
81351025614fa49877fe720b29232748.exe
-
Size
1.0MB
-
MD5
81351025614fa49877fe720b29232748
-
SHA1
562d461be71f9a6174b4aa4ea6b7ea11cc7882b4
-
SHA256
7b35b77b3a955e72ffb5beadec92e06345aa719661cd2e3fe9ab283594fd5951
-
SHA512
8e4e42352ff3e07db7cfdd7b80ed428b3cbd649d756f6e6565d5bcb6a3c2d2f0b5b72280e0c6800463cb4d7b1789362b497ff5307d0af254cdba0e9ec47cad75
-
SSDEEP
12288:GMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9BL+AUbA1w/6xZZUD0X4k+:GnsJ39LyjbJkQFMhmC+6GD9ReSfZUAX8
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 81351025614fa49877fe720b29232748.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 2356 ._cache_81351025614fa49877fe720b29232748.exe 3572 Synaptics.exe 1144 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 81351025614fa49877fe720b29232748.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2800 2356 WerFault.exe 83 3888 1144 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81351025614fa49877fe720b29232748.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_81351025614fa49877fe720b29232748.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 81351025614fa49877fe720b29232748.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1104 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1104 EXCEL.EXE 1104 EXCEL.EXE 1104 EXCEL.EXE 1104 EXCEL.EXE 1104 EXCEL.EXE 1104 EXCEL.EXE 1104 EXCEL.EXE 1104 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5100 wrote to memory of 2356 5100 81351025614fa49877fe720b29232748.exe 83 PID 5100 wrote to memory of 2356 5100 81351025614fa49877fe720b29232748.exe 83 PID 5100 wrote to memory of 2356 5100 81351025614fa49877fe720b29232748.exe 83 PID 5100 wrote to memory of 3572 5100 81351025614fa49877fe720b29232748.exe 84 PID 5100 wrote to memory of 3572 5100 81351025614fa49877fe720b29232748.exe 84 PID 5100 wrote to memory of 3572 5100 81351025614fa49877fe720b29232748.exe 84 PID 3572 wrote to memory of 1144 3572 Synaptics.exe 85 PID 3572 wrote to memory of 1144 3572 Synaptics.exe 85 PID 3572 wrote to memory of 1144 3572 Synaptics.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\81351025614fa49877fe720b29232748.exe"C:\Users\Admin\AppData\Local\Temp\81351025614fa49877fe720b29232748.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\._cache_81351025614fa49877fe720b29232748.exe"C:\Users\Admin\AppData\Local\Temp\._cache_81351025614fa49877fe720b29232748.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2356 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 10883⤵
- Program crash
PID:2800
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1144 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1144 -s 9924⤵
- Program crash
PID:3888
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2356 -ip 23561⤵PID:1880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1144 -ip 11441⤵PID:216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD581351025614fa49877fe720b29232748
SHA1562d461be71f9a6174b4aa4ea6b7ea11cc7882b4
SHA2567b35b77b3a955e72ffb5beadec92e06345aa719661cd2e3fe9ab283594fd5951
SHA5128e4e42352ff3e07db7cfdd7b80ed428b3cbd649d756f6e6565d5bcb6a3c2d2f0b5b72280e0c6800463cb4d7b1789362b497ff5307d0af254cdba0e9ec47cad75
-
Filesize
301KB
MD5c8d0166f0514b28771d173bfa7f0a5b5
SHA1a665d8586b00b924159a9cada82cfd48a4dead31
SHA256132317183d6356e3d4a9d8c7f237d60ca0356587f03a18fdb7178a11e7c24de8
SHA51259d4ad9c5758d23afdad48314a2f62017eb582e2a892611fc65c2d074880c93bdfa95f38af4e21258dff4c664faa0b5943e81edcf2fbcc1278eca294688b2bb8
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
21KB
MD548b0d730e2264207c4c9670862193f8f
SHA11b837cd60835cae075cc2f209b35169e30a8c46f
SHA256e1c77312d34eb23471e7f1df4c880259108d191219a91b2940273135a52b944e
SHA512af01d20827799aaf9a46e43f1d44913023ebcd819991a32fd1b77460cfbc3e9ef52b31554b24859758bbd146f62a8848b62cf0ec6ed8bc195f01f4d993a27150