Analysis
-
max time kernel
30s -
max time network
26s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 09:20
General
-
Target
bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe
-
Size
2.1MB
-
MD5
6ae82709d260e411f60120b958e627d3
-
SHA1
ace1d5d6e58b4fcee442d778f818f58ee0fc742f
-
SHA256
bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f
-
SHA512
eb797779373b17b05e03de050e0fcade9d77501f281e8f67b70f8493e9ab3938c4a8701212dbf5086a53594ac0b7c15fba257e2e77478d4736f7fc093fac6b61
-
SSDEEP
24576:ZYFbkIsaPiXSVnC7Yp9zkNmZG8RRlntyzFIQnsJ39LyjbJkQFMhmC+6GD9yl4ge:ZYREXSVMDi3TQnsHyjtk2MYC5GDIOge
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 3 IoCs
resource yara_rule behavioral1/memory/4092-172-0x0000000000400000-0x00000000004AD000-memory.dmp family_blackmoon behavioral1/memory/3112-173-0x0000000000400000-0x00000000004AD000-memory.dmp family_blackmoon behavioral1/memory/3112-177-0x0000000000400000-0x00000000004AD000-memory.dmp family_blackmoon -
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000a000000023b99-5.dat family_gh0strat -
Gh0strat family
-
Xred family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\svchcst\Parameters\ServiceDll = "C:\\Windows\\system32\\240623703.bat" look2.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation HD_bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 6 IoCs
pid Process 2164 look2.exe 832 HD_bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe 3112 ._cache_HD_bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe 3288 Synaptics.exe 4092 ._cache_Synaptics.exe 552 svchcst.exe -
Loads dropped DLL 3 IoCs
pid Process 2164 look2.exe 4716 svchost.exe 552 svchcst.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" HD_bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\240623703.bat look2.exe File opened for modification C:\Windows\SysWOW64\ini.ini look2.exe File created C:\Windows\SysWOW64\svchcst.exe svchost.exe File opened for modification C:\Windows\SysWOW64\svchcst.exe svchost.exe -
resource yara_rule behavioral1/files/0x000c000000023b8f-35.dat upx behavioral1/memory/3112-63-0x0000000000400000-0x00000000004AD000-memory.dmp upx behavioral1/memory/4092-172-0x0000000000400000-0x00000000004AD000-memory.dmp upx behavioral1/memory/3112-173-0x0000000000400000-0x00000000004AD000-memory.dmp upx behavioral1/memory/3112-177-0x0000000000400000-0x00000000004AD000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\gzip.dll ._cache_HD_bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language look2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_HD_bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2284 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 116 bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe 116 bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3112 ._cache_HD_bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe Token: SeDebugPrivilege 3112 ._cache_HD_bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe Token: SeDebugPrivilege 4092 ._cache_Synaptics.exe Token: SeDebugPrivilege 4092 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 116 bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe 116 bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe 2284 EXCEL.EXE 2284 EXCEL.EXE 2284 EXCEL.EXE 2284 EXCEL.EXE 2284 EXCEL.EXE 2284 EXCEL.EXE 2284 EXCEL.EXE 2284 EXCEL.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 116 wrote to memory of 2164 116 bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe 83 PID 116 wrote to memory of 2164 116 bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe 83 PID 116 wrote to memory of 2164 116 bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe 83 PID 116 wrote to memory of 832 116 bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe 86 PID 116 wrote to memory of 832 116 bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe 86 PID 116 wrote to memory of 832 116 bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe 86 PID 832 wrote to memory of 3112 832 HD_bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe 87 PID 832 wrote to memory of 3112 832 HD_bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe 87 PID 832 wrote to memory of 3112 832 HD_bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe 87 PID 832 wrote to memory of 3288 832 HD_bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe 88 PID 832 wrote to memory of 3288 832 HD_bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe 88 PID 832 wrote to memory of 3288 832 HD_bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe 88 PID 3288 wrote to memory of 4092 3288 Synaptics.exe 89 PID 3288 wrote to memory of 4092 3288 Synaptics.exe 89 PID 3288 wrote to memory of 4092 3288 Synaptics.exe 89 PID 4716 wrote to memory of 552 4716 svchost.exe 95 PID 4716 wrote to memory of 552 4716 svchost.exe 95 PID 4716 wrote to memory of 552 4716 svchost.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe"C:\Users\Admin\AppData\Local\Temp\bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Local\Temp\look2.exeC:\Users\Admin\AppData\Local\Temp\\look2.exe2⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2164
-
-
C:\Users\Admin\AppData\Local\Temp\HD_bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exeC:\Users\Admin\AppData\Local\Temp\HD_bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\._cache_HD_bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe"C:\Users\Admin\AppData\Local\Temp\._cache_HD_bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3112
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4092
-
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchcst"1⤵PID:4020
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchcst"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\svchcst.exeC:\Windows\system32\svchcst.exe "c:\windows\system32\240623703.bat",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:552
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2284
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\._cache_HD_bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe
Filesize163KB
MD54bc56ded809159a6f2b1474d210b8b3e
SHA1756557828c0530d07aa6bc67a94fc0252210ac43
SHA2564aa550f49e4ee285bf02ad4edbc3eaf3929284f7bf23b904b35f1c80d06a3408
SHA51280f0a5616e62b6613cd7de75a9b5bf92c1611963efd74baddc49faa8dbb3f0defa60a61250e98f3c510ebf527cca5048b7dff96c9b6f00d2e7f4e8fde3a8ce60
-
Filesize
20KB
MD593358c621e8cfc3968ee1d61491f224e
SHA1bcd90703ba0ae385df6d83550024dbcbd9d5e84a
SHA256b657c34ef9c01053d39aa92a2bebc20e213a4cf7d7d43f7eb753ea521089ae1e
SHA512b8174b9c12db5f5221b6eeb7a8588ffdb7f8043183a37d0ea4ea08adbe46ee80018ab1b59e8d4f793999a4b56e5b26f299c7b50bb2d06f42885f1cd38ad1acfa
-
Filesize
1.2MB
MD56594d28676705443d5acae1e0c95b4cd
SHA135a23ca1a5ed2ee1fa5b26cd17440b4c09b09944
SHA256c7895551d086055203a9c2ba5bafe5cc56c794015e20ab8ba7da76fa9d115a16
SHA512d09fa38e9ea90b35541f6f206508b0866400356ef68893959112b38e76fad9738da7201e17fa76064903d555b8f4101ca310581dda0e29315ef3ca604a265bfa
-
C:\Users\Admin\AppData\Local\Temp\HD_bb6ee781765dbac84cf0ee6b5f0482cb3d9a3ff4ebde867eda01480e06dbca4f.exe
Filesize916KB
MD5f9ca881b043fd7fb6efe1a8b16544d4e
SHA1044b407df348dff814a0498461d80a2dee0f5160
SHA256158564b0146e9126d35327aff83924db0c2954de05df28dc43ab48279f91ffdb
SHA5126c59c33639eb2bdd94ed5c1cd0ca10ec8804cc0948bd8edf519a1b507fd27b9098318dd0621530a263b91b58a80141123b34fc4a75b3667f4c981377cdd7489d
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
337KB
MD52f3b6f16e33e28ad75f3fdaef2567807
SHA185e907340faf1edfc9210db85a04abd43d21b741
SHA25686492ebf2d6f471a5ee92977318d099b3ea86175b5b7ae522237ae01d07a4857
SHA512db17e99e2df918cfc9ccbe934adfe73f0777ce1ce9f28b57a4b24ecd821efe2e0b976a634853247b77b16627d2bb3af4ba20306059d1d25ef38ffada7da3e3a4
-
Filesize
51KB
MD56f33133f2ea896499a2e5d1767ce51aa
SHA1bef326bd74fa7aa821423aa0343ada1eccfee063
SHA256f510e1f992a72cc0d4c9c466a14567a6ef46cfd951eca74756ed0942aac7e29c
SHA5126b07c0dfa61612861ef318e4055b680e806d97b6318e318de6e367cc4bb55134e08033003f1cfe9ecd0b4167d5a70072fda9312fc25494c323b32b6b3110aa14
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641