Resubmissions
29-11-2024 09:11
241129-k5pcssxkew 1029-11-2024 09:11
241129-k5kdvaslhk 1030-12-2023 12:12
231230-pdbpvaegdr 7Analysis
-
max time kernel
30s -
max time network
25s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 09:11
Behavioral task
behavioral1
Sample
winer/Winner_Free.exe
Resource
win10v2004-20241007-en
General
-
Target
winer/Winner_Free.exe
-
Size
6.3MB
-
MD5
babd90df8276efdedb7a0510d6d6e8aa
-
SHA1
9a43619fea06385a32a8bda7f125c834b7824f0a
-
SHA256
925840c7fa54b3bd5f8df5ed843d6872e30c95b423b10dedf6c6f56ec92dec7a
-
SHA512
7b703f1006f0a67184e95072eb14f5c24161e45ad134e690fc4b25640798e6ecd966d14c736f5782e5efd4d604a34bc89805257250cd80ba9bae30715df9e159
-
SSDEEP
98304:xnsmtk2aPV6s5YTnGUIcNAYDtYsvs6zqVXoQW07XlOVZ+dHXn8RXHhxBh7ZM5DBW:NLiV6s5XUxNAotvsjoQhLGQHuXrEBW
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Winner_Free.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 3228 ._cache_Winner_Free.exe 3608 Synaptics.exe 2664 ._cache_Synaptics.exe -
resource yara_rule behavioral1/files/0x0009000000023c6a-5.dat vmprotect behavioral1/memory/3228-141-0x0000000000FC0000-0x00000000018C1000-memory.dmp vmprotect behavioral1/memory/3228-143-0x0000000000FC0000-0x00000000018C1000-memory.dmp vmprotect behavioral1/memory/2664-152-0x0000000000CC0000-0x00000000015C1000-memory.dmp vmprotect behavioral1/memory/3228-179-0x0000000000FC0000-0x00000000018C1000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" Winner_Free.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3228 ._cache_Winner_Free.exe 2664 ._cache_Synaptics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Winner_Free.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Winner_Free.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Winner_Free.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings ._cache_Winner_Free.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings ._cache_Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5032 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3228 ._cache_Winner_Free.exe 3228 ._cache_Winner_Free.exe 3228 ._cache_Winner_Free.exe 3228 ._cache_Winner_Free.exe 3228 ._cache_Winner_Free.exe 3228 ._cache_Winner_Free.exe 2664 ._cache_Synaptics.exe 2664 ._cache_Synaptics.exe 2664 ._cache_Synaptics.exe 2664 ._cache_Synaptics.exe 2664 ._cache_Synaptics.exe 2664 ._cache_Synaptics.exe 3228 ._cache_Winner_Free.exe 3228 ._cache_Winner_Free.exe 2664 ._cache_Synaptics.exe 2664 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 5032 EXCEL.EXE 5032 EXCEL.EXE 5032 EXCEL.EXE 5032 EXCEL.EXE 4504 OpenWith.exe 3748 OpenWith.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1360 wrote to memory of 3228 1360 Winner_Free.exe 84 PID 1360 wrote to memory of 3228 1360 Winner_Free.exe 84 PID 1360 wrote to memory of 3228 1360 Winner_Free.exe 84 PID 1360 wrote to memory of 3608 1360 Winner_Free.exe 86 PID 1360 wrote to memory of 3608 1360 Winner_Free.exe 86 PID 1360 wrote to memory of 3608 1360 Winner_Free.exe 86 PID 3608 wrote to memory of 2664 3608 Synaptics.exe 87 PID 3608 wrote to memory of 2664 3608 Synaptics.exe 87 PID 3608 wrote to memory of 2664 3608 Synaptics.exe 87 PID 3228 wrote to memory of 2204 3228 ._cache_Winner_Free.exe 90 PID 3228 wrote to memory of 2204 3228 ._cache_Winner_Free.exe 90 PID 3228 wrote to memory of 2204 3228 ._cache_Winner_Free.exe 90 PID 2664 wrote to memory of 4888 2664 ._cache_Synaptics.exe 92 PID 2664 wrote to memory of 4888 2664 ._cache_Synaptics.exe 92 PID 2664 wrote to memory of 4888 2664 ._cache_Synaptics.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\winer\Winner_Free.exe"C:\Users\Admin\AppData\Local\Temp\winer\Winner_Free.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\winer\._cache_Winner_Free.exe"C:\Users\Admin\AppData\Local\Temp\winer\._cache_Winner_Free.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c title 4Kvt0N85tIO3Q6bTnpcxtnbUv1l11w6847FcrJfQfli9wE9Ts1l36Duur36d3⤵
- System Location Discovery: System Language Discovery
PID:2204
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\winer\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\winer\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c title seAoGV96J7xmd8YrDhRqE027JJVcp68Y11G9kA1MpyEf5C22hVHE0Z38Vs2i4⤵
- System Location Discovery: System Language Discovery
PID:4888
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5032
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4504
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:3748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.3MB
MD5babd90df8276efdedb7a0510d6d6e8aa
SHA19a43619fea06385a32a8bda7f125c834b7824f0a
SHA256925840c7fa54b3bd5f8df5ed843d6872e30c95b423b10dedf6c6f56ec92dec7a
SHA5127b703f1006f0a67184e95072eb14f5c24161e45ad134e690fc4b25640798e6ecd966d14c736f5782e5efd4d604a34bc89805257250cd80ba9bae30715df9e159
-
Filesize
1KB
MD567e486b2f148a3fca863728242b6273e
SHA1452a84c183d7ea5b7c015b597e94af8eef66d44a
SHA256facaf1c3a4bf232abce19a2d534e495b0d3adc7dbe3797d336249aa6f70adcfb
SHA512d3a37da3bb10a9736dc03e8b2b49baceef5d73c026e2077b8ebc1b786f2c9b2f807e0aa13a5866cf3b3cafd2bc506242ef139c423eaffb050bbb87773e53881e
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD5df70f9213c397bd96207b6c4f08c500d
SHA1dd8cb09e216180d26f32432ad559e911b9bc872f
SHA25606fa362d83e9cfeedb02cf887a2f030d64dab68ed187d36ab37a8b8674461aa6
SHA51230194b0e897c19e1c6b1b6713c4079e4420dd7e5e087de156eee1c2260e56afaadebafb39447b76d1d1704de250b71b04c6d838c1e8b084a5ad7753f0eadb3d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD5055aa2740d8bc5a23b3631bec458a75e
SHA1f7ca7494bb26ebbca44fa25c4cb5087edb377242
SHA256cb9468cd83f794a455f481b63c6d44c477cc90bad6d61a17e209aeb383d90497
SHA51211f31eb5e61540be22ac254d40b33aa46fcdb5121e098594642235e8ac4bc3a8806122640f0727dd69561d843862ed241442714e796ad24dac6f21aa60ed430a
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
5.6MB
MD5a8133b3fdf3ec104c0f0d503ef6a7ec7
SHA1d875876bd027a59b9157a45df00a24ccd505ed20
SHA256c3429972cc6d611fa4f940f89624658e3aadc85a681bdcd5adce9bdc6c6d3072
SHA5122734304de246490ff8d3ab0487838afc6cc2abb7cfbc0404860cbb395ba69887c33b802a08d32f8ccd2c6e341e4b5062c3aa27b3de2f4bba3c542d984e4721b1