Analysis
-
max time kernel
111s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 16:53
Behavioral task
behavioral1
Sample
9865de372f9f02c9831491f519111439c008b76e49beccf507c4a03777eff68bN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9865de372f9f02c9831491f519111439c008b76e49beccf507c4a03777eff68bN.exe
Resource
win10v2004-20241007-en
General
-
Target
9865de372f9f02c9831491f519111439c008b76e49beccf507c4a03777eff68bN.exe
-
Size
2.6MB
-
MD5
f4ce74f4aa7fc557cbfdc901b44b93e0
-
SHA1
3bec2bafe4a3d712f0edf931d2a859b07322018c
-
SHA256
9865de372f9f02c9831491f519111439c008b76e49beccf507c4a03777eff68b
-
SHA512
b72de7872ed5fed188b995f95a9c3ff929531dd3d67f3f82f793de9a4d6ce3ba3babeaf72a2f0ecfce133510d71784aa1ec35645659eb2b552a14324d95db237
-
SSDEEP
49152:FnsHyjtk2MYC5GDV0mbtroVy1ysy6RpWn/:Fnsmtk2ae0mJok1Ny6k
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2880 ._cache_9865de372f9f02c9831491f519111439c008b76e49beccf507c4a03777eff68bN.exe 2612 Synaptics.exe 2576 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 3004 9865de372f9f02c9831491f519111439c008b76e49beccf507c4a03777eff68bN.exe 3004 9865de372f9f02c9831491f519111439c008b76e49beccf507c4a03777eff68bN.exe 3004 9865de372f9f02c9831491f519111439c008b76e49beccf507c4a03777eff68bN.exe 3004 9865de372f9f02c9831491f519111439c008b76e49beccf507c4a03777eff68bN.exe 2612 Synaptics.exe 2612 Synaptics.exe 2612 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 9865de372f9f02c9831491f519111439c008b76e49beccf507c4a03777eff68bN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_9865de372f9f02c9831491f519111439c008b76e49beccf507c4a03777eff68bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9865de372f9f02c9831491f519111439c008b76e49beccf507c4a03777eff68bN.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2880 ._cache_9865de372f9f02c9831491f519111439c008b76e49beccf507c4a03777eff68bN.exe Token: SeDebugPrivilege 2576 ._cache_Synaptics.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2880 ._cache_9865de372f9f02c9831491f519111439c008b76e49beccf507c4a03777eff68bN.exe 2880 ._cache_9865de372f9f02c9831491f519111439c008b76e49beccf507c4a03777eff68bN.exe 2880 ._cache_9865de372f9f02c9831491f519111439c008b76e49beccf507c4a03777eff68bN.exe 2576 ._cache_Synaptics.exe 2576 ._cache_Synaptics.exe 2576 ._cache_Synaptics.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 2880 ._cache_9865de372f9f02c9831491f519111439c008b76e49beccf507c4a03777eff68bN.exe 2880 ._cache_9865de372f9f02c9831491f519111439c008b76e49beccf507c4a03777eff68bN.exe 2880 ._cache_9865de372f9f02c9831491f519111439c008b76e49beccf507c4a03777eff68bN.exe 2576 ._cache_Synaptics.exe 2576 ._cache_Synaptics.exe 2576 ._cache_Synaptics.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2880 3004 9865de372f9f02c9831491f519111439c008b76e49beccf507c4a03777eff68bN.exe 30 PID 3004 wrote to memory of 2880 3004 9865de372f9f02c9831491f519111439c008b76e49beccf507c4a03777eff68bN.exe 30 PID 3004 wrote to memory of 2880 3004 9865de372f9f02c9831491f519111439c008b76e49beccf507c4a03777eff68bN.exe 30 PID 3004 wrote to memory of 2880 3004 9865de372f9f02c9831491f519111439c008b76e49beccf507c4a03777eff68bN.exe 30 PID 3004 wrote to memory of 2612 3004 9865de372f9f02c9831491f519111439c008b76e49beccf507c4a03777eff68bN.exe 31 PID 3004 wrote to memory of 2612 3004 9865de372f9f02c9831491f519111439c008b76e49beccf507c4a03777eff68bN.exe 31 PID 3004 wrote to memory of 2612 3004 9865de372f9f02c9831491f519111439c008b76e49beccf507c4a03777eff68bN.exe 31 PID 3004 wrote to memory of 2612 3004 9865de372f9f02c9831491f519111439c008b76e49beccf507c4a03777eff68bN.exe 31 PID 2612 wrote to memory of 2576 2612 Synaptics.exe 32 PID 2612 wrote to memory of 2576 2612 Synaptics.exe 32 PID 2612 wrote to memory of 2576 2612 Synaptics.exe 32 PID 2612 wrote to memory of 2576 2612 Synaptics.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\9865de372f9f02c9831491f519111439c008b76e49beccf507c4a03777eff68bN.exe"C:\Users\Admin\AppData\Local\Temp\9865de372f9f02c9831491f519111439c008b76e49beccf507c4a03777eff68bN.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\._cache_9865de372f9f02c9831491f519111439c008b76e49beccf507c4a03777eff68bN.exe"C:\Users\Admin\AppData\Local\Temp\._cache_9865de372f9f02c9831491f519111439c008b76e49beccf507c4a03777eff68bN.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2880
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2576
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5f4ce74f4aa7fc557cbfdc901b44b93e0
SHA13bec2bafe4a3d712f0edf931d2a859b07322018c
SHA2569865de372f9f02c9831491f519111439c008b76e49beccf507c4a03777eff68b
SHA512b72de7872ed5fed188b995f95a9c3ff929531dd3d67f3f82f793de9a4d6ce3ba3babeaf72a2f0ecfce133510d71784aa1ec35645659eb2b552a14324d95db237
-
Filesize
154KB
MD552564edf9c4db20c769ca39c2802a421
SHA1491c985064f2446b32325008e273753a11385e77
SHA256e6b98cbad6b8add57fdfd3e8ddfa87146791d9c9df374b32935245269532bad1
SHA5124f6abcce3f02080bb5a753d5e4e205874db0c8462f870ab1c8f31cbb9b973d5a636251c81677c4319046ef47571bdbc170ed64eb46c7e8430a9294f34d60a3e4
-
\Users\Admin\AppData\Local\Temp\._cache_9865de372f9f02c9831491f519111439c008b76e49beccf507c4a03777eff68bN.exe
Filesize1.8MB
MD5cc25dc128174d09d59cbcfc5d2807cff
SHA14dead10b6acb13ec2da43ca8b85571ee903cf9e3
SHA25630746772f0c66b1b580babf37f625cfb0338fe72ec12ec03bfe4b84a5e8b0299
SHA51204eae72a522d10be99e71fa762466d8daf8a6e0635df2747d161253deb858ba30f86a1dad727541a645ea16034d89f5b2125af60d3d657dbcfd1a0eef296ca20