Analysis
-
max time kernel
113s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 23:18
Behavioral task
behavioral1
Sample
4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe
Resource
win10v2004-20241007-en
General
-
Target
4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe
-
Size
904KB
-
MD5
5fe2fecb6e55c8680fd94af60a8d3f00
-
SHA1
7b326e5ff71f09cdd2350cbf00db8a3b15a0c3d5
-
SHA256
4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7
-
SHA512
1ecebb50796f06c16dfc9b6108e460f1068ef1c5ba62298aa83145e6412667e50ae160b83a2604c070d0df93354cab8a25702407f89472b567afa1adcf023a75
-
SSDEEP
12288:yaZqRO9vbnTrjP7HzfLXDvnTr3jP7HzfLXDvbnT/rjI3iK5eOzkv4R7QnvUUilQS:yasRSGJkQFMhmC+6GD9kuu1OUjezCY
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 6 IoCs
pid Process 3288 svchost.exe 2836 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe 2032 svchost.exe 876 ._cache_4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe 4452 Synaptics.exe 3592 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\ktab.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmic.exe svchost.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstack.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\policytool.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\keytool.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe svchost.exe File opened for modification C:\Program Files\dotnet\dotnet.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\notification_helper.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe svchost.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe svchost.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe svchost.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\orbd.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\chrome_pwa_launcher.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\klist.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\svchost.exe 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4960 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4960 EXCEL.EXE 4960 EXCEL.EXE 4960 EXCEL.EXE 4960 EXCEL.EXE 4960 EXCEL.EXE 4960 EXCEL.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2228 wrote to memory of 3288 2228 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe 82 PID 2228 wrote to memory of 3288 2228 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe 82 PID 2228 wrote to memory of 3288 2228 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe 82 PID 3288 wrote to memory of 2836 3288 svchost.exe 83 PID 3288 wrote to memory of 2836 3288 svchost.exe 83 PID 3288 wrote to memory of 2836 3288 svchost.exe 83 PID 2836 wrote to memory of 876 2836 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe 85 PID 2836 wrote to memory of 876 2836 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe 85 PID 2836 wrote to memory of 876 2836 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe 85 PID 2836 wrote to memory of 4452 2836 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe 87 PID 2836 wrote to memory of 4452 2836 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe 87 PID 2836 wrote to memory of 4452 2836 4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe 87 PID 4452 wrote to memory of 3592 4452 Synaptics.exe 88 PID 4452 wrote to memory of 3592 4452 Synaptics.exe 88 PID 4452 wrote to memory of 3592 4452 Synaptics.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe"C:\Users\Admin\AppData\Local\Temp\4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe"C:\Users\Admin\AppData\Local\Temp\4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\._cache_4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:876
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3592
-
-
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2032
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\._cache_4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe
Filesize115KB
MD5b0a36acb6d3675f3d89f82dce0ce6703
SHA1901b6f330e141c664f95613543fc7535c6766875
SHA2566a79d7b9fde2441f0dfcef5aba1e65798b46a40cdb1fa847f00efcf70ff1a43b
SHA512e6555003849ae1aa7242d10af5b8433194bc9cd8e79f4b4dd9cb95061e76a4061400e2371e9ec7690f71333c711f67b515aed9879b13ef64a39037cd63285f67
-
C:\Users\Admin\AppData\Local\Temp\4f8134f1ba854c326c52d8d74261c427609ef3857e1041e84d300be1845341a7N.exe
Filesize868KB
MD5fb1381b561cbb497f598f47b45672d36
SHA1181c33b25085354b4c5b96c844819fbf525a5030
SHA256df2278d8108784f652dd42a1ba0061d2ad74492a8d767f28376665973c5df1a8
SHA5127423fe22f5f932b92f40e0b0dcebae35169eaa0d629389e65fbe35ac76ee05d8d29eaf97bd1634870970af90f798f6634bdb19545d25a7be3d586b6fd8f442b6
-
Filesize
23KB
MD5748aad3672a4d96606b9c8ac39dad346
SHA112d8fea8846cf1cfc0d4eb63a9dc4870b71ddb9c
SHA2566a97561677aa3a40faa4cd91da558f5f04745929ec6cd88486ee6e3741de51ed
SHA512d06006027dcefee334c0773ab4e06738260aaa9465f9e84368cc7da598de74e04ce913d55b2d5521b708f937e775d26c78073f044ebd334bf86eb7ff562200a6
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b