Analysis
-
max time kernel
5s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 09:13
Behavioral task
behavioral1
Sample
1b6cece5f8a8a9e1d4478116bd7dd5aa.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
1b6cece5f8a8a9e1d4478116bd7dd5aa.exe
Resource
win10v2004-20241007-en
General
-
Target
1b6cece5f8a8a9e1d4478116bd7dd5aa.exe
-
Size
4.0MB
-
MD5
1b6cece5f8a8a9e1d4478116bd7dd5aa
-
SHA1
e7e834d4097010f9c67d56fd6b9299a6bf198174
-
SHA256
dbc19471ecdeb4ba023f2d145858e2bfe18a17af68065a035738637304af681a
-
SHA512
4377d5b2e15d39158cc9ab555ce826c1943dfe9b35e569d3b566d6dc83f7b87f743ee248d691817dfe020e265ab829b6e85cca1aba798b460d78af90bdf378de
-
SSDEEP
98304:2nsmtk2aqk02VdBXD0NYTzjv9UzvassGeR6B6q24Ro7:oLNk02Vd6YrOLbTeR6BLm7
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1b6cece5f8a8a9e1d4478116bd7dd5aa.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 3352 ._cache_1b6cece5f8a8a9e1d4478116bd7dd5aa.exe 3908 Synaptics.exe 4628 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 1b6cece5f8a8a9e1d4478116bd7dd5aa.exe -
resource yara_rule behavioral2/files/0x0008000000023ca3-5.dat upx behavioral2/memory/3352-125-0x0000000000400000-0x0000000001E0C000-memory.dmp upx behavioral2/memory/4628-191-0x0000000000400000-0x0000000001E0C000-memory.dmp upx behavioral2/memory/3352-201-0x0000000000400000-0x0000000001E0C000-memory.dmp upx behavioral2/memory/3352-221-0x0000000000400000-0x0000000001E0C000-memory.dmp upx behavioral2/memory/4628-223-0x0000000000400000-0x0000000001E0C000-memory.dmp upx behavioral2/memory/3352-263-0x0000000000400000-0x0000000001E0C000-memory.dmp upx behavioral2/memory/3352-265-0x0000000000400000-0x0000000001E0C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b6cece5f8a8a9e1d4478116bd7dd5aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_1b6cece5f8a8a9e1d4478116bd7dd5aa.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 1b6cece5f8a8a9e1d4478116bd7dd5aa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4892 wrote to memory of 3352 4892 1b6cece5f8a8a9e1d4478116bd7dd5aa.exe 83 PID 4892 wrote to memory of 3352 4892 1b6cece5f8a8a9e1d4478116bd7dd5aa.exe 83 PID 4892 wrote to memory of 3352 4892 1b6cece5f8a8a9e1d4478116bd7dd5aa.exe 83 PID 4892 wrote to memory of 3908 4892 1b6cece5f8a8a9e1d4478116bd7dd5aa.exe 84 PID 4892 wrote to memory of 3908 4892 1b6cece5f8a8a9e1d4478116bd7dd5aa.exe 84 PID 4892 wrote to memory of 3908 4892 1b6cece5f8a8a9e1d4478116bd7dd5aa.exe 84 PID 3908 wrote to memory of 4628 3908 Synaptics.exe 85 PID 3908 wrote to memory of 4628 3908 Synaptics.exe 85 PID 3908 wrote to memory of 4628 3908 Synaptics.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b6cece5f8a8a9e1d4478116bd7dd5aa.exe"C:\Users\Admin\AppData\Local\Temp\1b6cece5f8a8a9e1d4478116bd7dd5aa.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\._cache_1b6cece5f8a8a9e1d4478116bd7dd5aa.exe"C:\Users\Admin\AppData\Local\Temp\._cache_1b6cece5f8a8a9e1d4478116bd7dd5aa.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3352
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4628
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵PID:3940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD51b6cece5f8a8a9e1d4478116bd7dd5aa
SHA1e7e834d4097010f9c67d56fd6b9299a6bf198174
SHA256dbc19471ecdeb4ba023f2d145858e2bfe18a17af68065a035738637304af681a
SHA5124377d5b2e15d39158cc9ab555ce826c1943dfe9b35e569d3b566d6dc83f7b87f743ee248d691817dfe020e265ab829b6e85cca1aba798b460d78af90bdf378de
-
Filesize
3.3MB
MD56dd2033d8b555023c7bf1e0e67e89899
SHA1f435ff19418964a7e279ee9c7992e0ae98f12085
SHA256095d6b8102f8268117adb281f10efced652a0b42236419271ce375dd3b4f8c25
SHA512ee5a677ffeed4477987fe0916456b071cd8e31684f8256dc05bdad4c7e2e7f4801d5be34f9ac13115ab1d7164f91efe9bf62573f5f0d2d800e19ec4ef008d3bf
-
Filesize
23KB
MD5bf3596809c3f0614a52b91d817c88758
SHA138679caac954ef66c67c9694d4475c53d7535267
SHA256ecea10967190a6149a420746ad8d25345530d532a819e6dfdc85632e46218f02
SHA512b805c3cda468a9526df82ee83b595c7663ee6952a36c76c6ce4944f75fb57ecd513a742fbc9fe02002f61d9ca78b8d0ea55e76601a9667c064898741cc60e6ff
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04