Analysis
-
max time kernel
2s -
max time network
32s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 09:10
Behavioral task
behavioral1
Sample
1b6cece5f8a8a9e1d4478116bd7dd5aa.exe
Resource
win10v2004-20241007-en
General
-
Target
1b6cece5f8a8a9e1d4478116bd7dd5aa.exe
-
Size
4.0MB
-
MD5
1b6cece5f8a8a9e1d4478116bd7dd5aa
-
SHA1
e7e834d4097010f9c67d56fd6b9299a6bf198174
-
SHA256
dbc19471ecdeb4ba023f2d145858e2bfe18a17af68065a035738637304af681a
-
SHA512
4377d5b2e15d39158cc9ab555ce826c1943dfe9b35e569d3b566d6dc83f7b87f743ee248d691817dfe020e265ab829b6e85cca1aba798b460d78af90bdf378de
-
SSDEEP
98304:2nsmtk2aqk02VdBXD0NYTzjv9UzvassGeR6B6q24Ro7:oLNk02Vd6YrOLbTeR6BLm7
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 1b6cece5f8a8a9e1d4478116bd7dd5aa.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 2 IoCs
pid Process 2108 ._cache_1b6cece5f8a8a9e1d4478116bd7dd5aa.exe 2260 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 1b6cece5f8a8a9e1d4478116bd7dd5aa.exe -
resource yara_rule behavioral1/files/0x000c000000023b0e-5.dat upx behavioral1/memory/2108-128-0x0000000000400000-0x0000000001E0C000-memory.dmp upx behavioral1/memory/2108-219-0x0000000000400000-0x0000000001E0C000-memory.dmp upx behavioral1/memory/2108-221-0x0000000000400000-0x0000000001E0C000-memory.dmp upx behavioral1/memory/4780-222-0x0000000000400000-0x0000000001E0C000-memory.dmp upx behavioral1/memory/4780-250-0x0000000000400000-0x0000000001E0C000-memory.dmp upx behavioral1/memory/4780-255-0x0000000000400000-0x0000000001E0C000-memory.dmp upx behavioral1/memory/2108-261-0x0000000000400000-0x0000000001E0C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b6cece5f8a8a9e1d4478116bd7dd5aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_1b6cece5f8a8a9e1d4478116bd7dd5aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 1b6cece5f8a8a9e1d4478116bd7dd5aa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4796 wrote to memory of 2108 4796 1b6cece5f8a8a9e1d4478116bd7dd5aa.exe 83 PID 4796 wrote to memory of 2108 4796 1b6cece5f8a8a9e1d4478116bd7dd5aa.exe 83 PID 4796 wrote to memory of 2108 4796 1b6cece5f8a8a9e1d4478116bd7dd5aa.exe 83 PID 4796 wrote to memory of 2260 4796 1b6cece5f8a8a9e1d4478116bd7dd5aa.exe 84 PID 4796 wrote to memory of 2260 4796 1b6cece5f8a8a9e1d4478116bd7dd5aa.exe 84 PID 4796 wrote to memory of 2260 4796 1b6cece5f8a8a9e1d4478116bd7dd5aa.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b6cece5f8a8a9e1d4478116bd7dd5aa.exe"C:\Users\Admin\AppData\Local\Temp\1b6cece5f8a8a9e1d4478116bd7dd5aa.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\._cache_1b6cece5f8a8a9e1d4478116bd7dd5aa.exe"C:\Users\Admin\AppData\Local\Temp\._cache_1b6cece5f8a8a9e1d4478116bd7dd5aa.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2108
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵PID:4780
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵PID:3412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD51b6cece5f8a8a9e1d4478116bd7dd5aa
SHA1e7e834d4097010f9c67d56fd6b9299a6bf198174
SHA256dbc19471ecdeb4ba023f2d145858e2bfe18a17af68065a035738637304af681a
SHA5124377d5b2e15d39158cc9ab555ce826c1943dfe9b35e569d3b566d6dc83f7b87f743ee248d691817dfe020e265ab829b6e85cca1aba798b460d78af90bdf378de
-
Filesize
3.3MB
MD56dd2033d8b555023c7bf1e0e67e89899
SHA1f435ff19418964a7e279ee9c7992e0ae98f12085
SHA256095d6b8102f8268117adb281f10efced652a0b42236419271ce375dd3b4f8c25
SHA512ee5a677ffeed4477987fe0916456b071cd8e31684f8256dc05bdad4c7e2e7f4801d5be34f9ac13115ab1d7164f91efe9bf62573f5f0d2d800e19ec4ef008d3bf
-
Filesize
21KB
MD554acaa7d831140f8934b9e53fdbaa0c0
SHA1e6af209b5bf1e37a7f86be195d23ec0cd89952e0
SHA256a4be51f71e8f00d6ddbc30f01110e215deb298c989935db88ccddd2d32cf0eda
SHA51273c7546fd8c682d711b69a673fcd231c790b68b07c9998f37521423a6f2104a68b0e9d3ba455f949440dc9413586daadebd8e5ae80009837f9a3e00e77638eff
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04