Analysis
-
max time kernel
30s -
max time network
31s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 09:17
Behavioral task
behavioral1
Sample
em.exe
Resource
win10v2004-20241007-en
General
-
Target
em.exe
-
Size
2.5MB
-
MD5
ef18fa16022ae67b86b21bb1aa145fc0
-
SHA1
90aa33fcd1407fc9c672a0b00a3c9c3c2735984f
-
SHA256
a8eea05d025c95fa51597a49564806ddfbadc635bc407c25b04059a1cdc5555a
-
SHA512
088d7924ffb0f160cccd898f9cca91c410d8b82705f1488fdc3e392437b364a5bf6b11f7c52235e40726eeaec9974eea2f5f75dd5eb17c15a17f3a0ee20fd32b
-
SSDEEP
24576:JnsJ39LyjbJkQFMhmC+6GD9jk7UHhd1IvGGC0qsu/:JnsHyjtk2MYC5GD7BkGGC0M/
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation em.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 1296 ._cache_em.exe 3580 Synaptics.exe 3260 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" em.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language em.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_em.exe -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ._cache_em.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ._cache_em.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ em.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1200 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1200 EXCEL.EXE 1200 EXCEL.EXE 1200 EXCEL.EXE 1200 EXCEL.EXE 1200 EXCEL.EXE 1200 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3716 wrote to memory of 1296 3716 em.exe 82 PID 3716 wrote to memory of 1296 3716 em.exe 82 PID 3716 wrote to memory of 1296 3716 em.exe 82 PID 3716 wrote to memory of 3580 3716 em.exe 84 PID 3716 wrote to memory of 3580 3716 em.exe 84 PID 3716 wrote to memory of 3580 3716 em.exe 84 PID 3580 wrote to memory of 3260 3580 Synaptics.exe 85 PID 3580 wrote to memory of 3260 3580 Synaptics.exe 85 PID 3580 wrote to memory of 3260 3580 Synaptics.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\em.exe"C:\Users\Admin\AppData\Local\Temp\em.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\._cache_em.exe"C:\Users\Admin\AppData\Local\Temp\._cache_em.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1296
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3260
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5ef18fa16022ae67b86b21bb1aa145fc0
SHA190aa33fcd1407fc9c672a0b00a3c9c3c2735984f
SHA256a8eea05d025c95fa51597a49564806ddfbadc635bc407c25b04059a1cdc5555a
SHA512088d7924ffb0f160cccd898f9cca91c410d8b82705f1488fdc3e392437b364a5bf6b11f7c52235e40726eeaec9974eea2f5f75dd5eb17c15a17f3a0ee20fd32b
-
Filesize
579KB
MD59487c902c64afe58ebeea571d0694ed8
SHA1aceb11e91652315ecc1db2a38a21b95e4eb9247a
SHA256421d3a7ffd9e76717b98ff9bcf78983b0caac67489058d08acd9960e43af414f
SHA512d51d51e48c93dbefb9f7017e6582d1e2aeb1aaae8abb14c471cc61e02df3f4c3353c9752fd1e3d418400cb2de42420f17f233115fa57041b1e50af0ecb6b21a7
-
Filesize
23KB
MD5559cbc9b7fc2527b29a6cd0afae4b7c7
SHA1dde0f516850761d0fd2114f45384372fceeb5324
SHA2561347ae00e370328a8a21a18caa68963576b050a49e514f908359253fb24e8c4b
SHA51262c73013e2e1dfbc90d780821f82b7fa72d111755e96ace2cbe00a5e81155e7c34c3b1b6a2c16723369127d9b2f75a66f08b6fd2c085443aca192033d0de74a3
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
3KB
MD56b3ce7f511fe02c8f1271c1d0f9cf13f
SHA1d4bd48f676a4becd4127352751086902286fdb64
SHA256dead09dc38100764c4a4a8dda1eb9583b61ae078bbddccb16ec024d357b22fc4
SHA51229825d213b969232b79fe478940c4567257c8bcc7b9df6176b9ffcd57b2fa14a2b5386c63382ede7e2413ce9c5fabdb0e8c84190315aa2cdc0c56c4e0a6881a0