Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 08:36
Behavioral task
behavioral1
Sample
978bf35000aec54e08e7572607d05773da746d7b98ed58447c2900f5206e2fbaN.exe
Resource
win10v2004-20241007-en
General
-
Target
978bf35000aec54e08e7572607d05773da746d7b98ed58447c2900f5206e2fbaN.exe
-
Size
1.9MB
-
MD5
c4e7360de90c311c8ee74feb603c4e40
-
SHA1
8c5eef4ba7ea32966655294a07462b366fee6c2f
-
SHA256
978bf35000aec54e08e7572607d05773da746d7b98ed58447c2900f5206e2fba
-
SHA512
8b2d2727673e284ec7b71542722ed86bdfb907b7f864d9cc840c37361142d70bd45059dd5842f036ef8160468251265fae71042c31813b0787477565a4a0ec04
-
SSDEEP
49152:wnsHyjtk2MYC5GD6/+6X/4mqCGdhaD8sLu3ChsFl2U8t:wnsmtk2a52G9D8cZsJI
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 978bf35000aec54e08e7572607d05773da746d7b98ed58447c2900f5206e2fbaN.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 3988 ._cache_978bf35000aec54e08e7572607d05773da746d7b98ed58447c2900f5206e2fbaN.exe 2304 Synaptics.exe 4596 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 3988 ._cache_978bf35000aec54e08e7572607d05773da746d7b98ed58447c2900f5206e2fbaN.exe 3988 ._cache_978bf35000aec54e08e7572607d05773da746d7b98ed58447c2900f5206e2fbaN.exe 3988 ._cache_978bf35000aec54e08e7572607d05773da746d7b98ed58447c2900f5206e2fbaN.exe 4596 ._cache_Synaptics.exe 3988 ._cache_978bf35000aec54e08e7572607d05773da746d7b98ed58447c2900f5206e2fbaN.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 978bf35000aec54e08e7572607d05773da746d7b98ed58447c2900f5206e2fbaN.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Npcap\install.log ._cache_978bf35000aec54e08e7572607d05773da746d7b98ed58447c2900f5206e2fbaN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 978bf35000aec54e08e7572607d05773da746d7b98ed58447c2900f5206e2fbaN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_978bf35000aec54e08e7572607d05773da746d7b98ed58447c2900f5206e2fbaN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 978bf35000aec54e08e7572607d05773da746d7b98ed58447c2900f5206e2fbaN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3480 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3480 EXCEL.EXE 3480 EXCEL.EXE 3480 EXCEL.EXE 3480 EXCEL.EXE 3480 EXCEL.EXE 3480 EXCEL.EXE 3480 EXCEL.EXE 3480 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1316 wrote to memory of 3988 1316 978bf35000aec54e08e7572607d05773da746d7b98ed58447c2900f5206e2fbaN.exe 83 PID 1316 wrote to memory of 3988 1316 978bf35000aec54e08e7572607d05773da746d7b98ed58447c2900f5206e2fbaN.exe 83 PID 1316 wrote to memory of 3988 1316 978bf35000aec54e08e7572607d05773da746d7b98ed58447c2900f5206e2fbaN.exe 83 PID 1316 wrote to memory of 2304 1316 978bf35000aec54e08e7572607d05773da746d7b98ed58447c2900f5206e2fbaN.exe 84 PID 1316 wrote to memory of 2304 1316 978bf35000aec54e08e7572607d05773da746d7b98ed58447c2900f5206e2fbaN.exe 84 PID 1316 wrote to memory of 2304 1316 978bf35000aec54e08e7572607d05773da746d7b98ed58447c2900f5206e2fbaN.exe 84 PID 2304 wrote to memory of 4596 2304 Synaptics.exe 85 PID 2304 wrote to memory of 4596 2304 Synaptics.exe 85 PID 2304 wrote to memory of 4596 2304 Synaptics.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\978bf35000aec54e08e7572607d05773da746d7b98ed58447c2900f5206e2fbaN.exe"C:\Users\Admin\AppData\Local\Temp\978bf35000aec54e08e7572607d05773da746d7b98ed58447c2900f5206e2fbaN.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\._cache_978bf35000aec54e08e7572607d05773da746d7b98ed58447c2900f5206e2fbaN.exe"C:\Users\Admin\AppData\Local\Temp\._cache_978bf35000aec54e08e7572607d05773da746d7b98ed58447c2900f5206e2fbaN.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3988
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4596
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5c4e7360de90c311c8ee74feb603c4e40
SHA18c5eef4ba7ea32966655294a07462b366fee6c2f
SHA256978bf35000aec54e08e7572607d05773da746d7b98ed58447c2900f5206e2fba
SHA5128b2d2727673e284ec7b71542722ed86bdfb907b7f864d9cc840c37361142d70bd45059dd5842f036ef8160468251265fae71042c31813b0787477565a4a0ec04
-
C:\Users\Admin\AppData\Local\Temp\._cache_978bf35000aec54e08e7572607d05773da746d7b98ed58447c2900f5206e2fbaN.exe
Filesize1.1MB
MD5ba04898d2ff0674cdf73164530e917a4
SHA1bbc1525419b343df6dd669104d2ea724cd428661
SHA256ac4f26d7d9f994d6f04141b2266f02682def51af63c09c96a7268552c94a6535
SHA512b1734a3c7b97c95313322bbdd3c7168da456111490e0324861b36367a027d8d5b2a46fbced8273931de16325521f6979e47becc3251daf4ef3cf328777efd65c
-
Filesize
15KB
MD5d1eefb07abc2577dfb92eb2e95a975e4
SHA10584c2b1807bc3bd10d4b60d2d23eeb0e6832ca2
SHA25689dd7d646278d8bfc41d5446bdc348b9a9afaa832abf02c1396272bb7ac7262a
SHA512eaffd9940b1df59e95e2adb79b3b6415fff5bf196ebea5fe625a6c52e552a00b44d985a36a8dd9eb33eba2425ffea4244ed07a75d87284ff51ec9f9a5e1ac65e
-
Filesize
12KB
MD5192639861e3dc2dc5c08bb8f8c7260d5
SHA158d30e460609e22fa0098bc27d928b689ef9af78
SHA25623d618a0293c78ce00f7c6e6dd8b8923621da7dd1f63a070163ef4c0ec3033d6
SHA5126e573d8b2ef6ed719e271fd0b2fd9cd451f61fc9a9459330108d6d7a65a0f64016303318cad787aa1d5334ba670d8f1c7c13074e1be550b4a316963ecc465cdc
-
Filesize
2KB
MD5a7e70015a583ae6360f817eb20a3cb30
SHA12f72ae336b7ec2594eb3c4d8ff61ba40c30874ce
SHA25693fc81eb96efab8bea3189c10ced7f1b51ff1d1755d5b6e9702e743b875f85ba
SHA512e6b6e698ab83a8549e80280fa4bf212b571e3e11b5e9d6d51cecdb5ec8249b444ec993dd2d7fcdf1de1e0e8e97c7948a2ac5bbe0ea1ac6e5be4fa78076d2639c
-
Filesize
21KB
MD587b2cae4c8ba5667d0c2b3e8124d1e8b
SHA10d08eb76fbd5867abe202e573a711ad699612f71
SHA256575642019893d204e1d7731839da4cac598cd371959c2a6ebed5bad5de635e11
SHA5126c65be12cec00c7e7fa83e139c0b1e69caad785ffa3cfe292afcc6b58f44b0611028ad229a337f768fdc746f2ac066226ea674a4d3fcba5db5d01ae33cb225ec
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04