Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 23:18
Behavioral task
behavioral1
Sample
4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe
Resource
win10v2004-20241007-en
General
-
Target
4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe
-
Size
904KB
-
MD5
5fe2fecb6e55c8680fd94af60a8d3f00
-
SHA1
7b326e5ff71f09cdd2350cbf00db8a3b15a0c3d5
-
SHA256
4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7
-
SHA512
1ecebb50796f06c16dfc9b6108e460f1068ef1c5ba62298aa83145e6412667e50ae160b83a2604c070d0df93354cab8a25702407f89472b567afa1adcf023a75
-
SSDEEP
12288:yaZqRO9vbnTrjP7HzfLXDvnTr3jP7HzfLXDvbnT/rjI3iK5eOzkv4R7QnvUUilQS:yasRSGJkQFMhmC+6GD9kuu1OUjezCY
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 6 IoCs
pid Process 2360 svchost.exe 3016 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe 2080 svchost.exe 2692 ._cache_4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe 2676 Synaptics.exe 2684 ._cache_Synaptics.exe -
Loads dropped DLL 8 IoCs
pid Process 2360 svchost.exe 2360 svchost.exe 3016 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe 3016 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe 3016 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe 3016 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe 2676 Synaptics.exe 2676 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe -
Drops file in Program Files directory 26 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe svchost.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\svchost.exe 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2540 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2540 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2360 2180 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe 31 PID 2180 wrote to memory of 2360 2180 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe 31 PID 2180 wrote to memory of 2360 2180 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe 31 PID 2180 wrote to memory of 2360 2180 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe 31 PID 2360 wrote to memory of 3016 2360 svchost.exe 32 PID 2360 wrote to memory of 3016 2360 svchost.exe 32 PID 2360 wrote to memory of 3016 2360 svchost.exe 32 PID 2360 wrote to memory of 3016 2360 svchost.exe 32 PID 3016 wrote to memory of 2692 3016 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe 34 PID 3016 wrote to memory of 2692 3016 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe 34 PID 3016 wrote to memory of 2692 3016 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe 34 PID 3016 wrote to memory of 2692 3016 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe 34 PID 3016 wrote to memory of 2676 3016 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe 36 PID 3016 wrote to memory of 2676 3016 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe 36 PID 3016 wrote to memory of 2676 3016 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe 36 PID 3016 wrote to memory of 2676 3016 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe 36 PID 2676 wrote to memory of 2684 2676 Synaptics.exe 37 PID 2676 wrote to memory of 2684 2676 Synaptics.exe 37 PID 2676 wrote to memory of 2684 2676 Synaptics.exe 37 PID 2676 wrote to memory of 2684 2676 Synaptics.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe"C:\Users\Admin\AppData\Local\Temp\4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe"C:\Users\Admin\AppData\Local\Temp\4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\._cache_4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe"4⤵
- Executes dropped EXE
PID:2692
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate5⤵
- Executes dropped EXE
PID:2684
-
-
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2080
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\._cache_4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe
Filesize115KB
MD5b0a36acb6d3675f3d89f82dce0ce6703
SHA1901b6f330e141c664f95613543fc7535c6766875
SHA2566a79d7b9fde2441f0dfcef5aba1e65798b46a40cdb1fa847f00efcf70ff1a43b
SHA512e6555003849ae1aa7242d10af5b8433194bc9cd8e79f4b4dd9cb95061e76a4061400e2371e9ec7690f71333c711f67b515aed9879b13ef64a39037cd63285f67
-
C:\Users\Admin\AppData\Local\Temp\4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe
Filesize868KB
MD5fb1381b561cbb497f598f47b45672d36
SHA1181c33b25085354b4c5b96c844819fbf525a5030
SHA256df2278d8108784f652dd42a1ba0061d2ad74492a8d767f28376665973c5df1a8
SHA5127423fe22f5f932b92f40e0b0dcebae35169eaa0d629389e65fbe35ac76ee05d8d29eaf97bd1634870970af90f798f6634bdb19545d25a7be3d586b6fd8f442b6
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b