Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01-12-2024 12:21
Behavioral task
behavioral1
Sample
a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exe
Resource
win10v2004-20241007-en
General
-
Target
a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exe
-
Size
2.0MB
-
MD5
5e02160336f5d96669815df15025ff1e
-
SHA1
5ff162fbbcc039d02a27f0b6084beef62140b889
-
SHA256
a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c
-
SHA512
30b9d03d7ad28d8d4fadceab0716c5bcb22cf64dec4af5a5a5f900b2db35ad1bd4da41041c3c0b0f722a41e8adda902437fa7881423ce16ae5ad6c59540b5fc2
-
SSDEEP
49152:1nsHyjtk2MYC5GDCTMDYr8Ar8Ar8Ar88ur84HQ:1nsmtk2ajADYrvrvrvrpurVHQ
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Processes:
resource behavioral1/files/0x0008000000016c4b-85.dat behavioral1/files/0x0006000000019214-98.dat behavioral1/files/0x000a000000016c4b-109.dat behavioral1/files/0x0008000000019214-120.dat -
Executes dropped EXE 3 IoCs
Processes:
._cache_a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exeSynaptics.exe._cache_Synaptics.exepid Process 2784 ._cache_a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exe 2744 Synaptics.exe 236 ._cache_Synaptics.exe -
Loads dropped DLL 15 IoCs
Processes:
a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exeSynaptics.exeWerFault.exeWerFault.exepid Process 2196 a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exe 2196 a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exe 2196 a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exe 2744 Synaptics.exe 2744 Synaptics.exe 1456 WerFault.exe 1456 WerFault.exe 1456 WerFault.exe 1456 WerFault.exe 1300 WerFault.exe 1300 WerFault.exe 1300 WerFault.exe 1300 WerFault.exe 1456 WerFault.exe 1300 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 1300 236 WerFault.exe 32 1456 2784 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exe._cache_a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exeSynaptics.exe._cache_Synaptics.exeEXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 2968 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
EXCEL.EXEpid Process 2968 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exeSynaptics.exe._cache_a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exe._cache_Synaptics.exedescription pid Process procid_target PID 2196 wrote to memory of 2784 2196 a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exe 30 PID 2196 wrote to memory of 2784 2196 a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exe 30 PID 2196 wrote to memory of 2784 2196 a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exe 30 PID 2196 wrote to memory of 2784 2196 a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exe 30 PID 2196 wrote to memory of 2744 2196 a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exe 31 PID 2196 wrote to memory of 2744 2196 a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exe 31 PID 2196 wrote to memory of 2744 2196 a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exe 31 PID 2196 wrote to memory of 2744 2196 a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exe 31 PID 2744 wrote to memory of 236 2744 Synaptics.exe 32 PID 2744 wrote to memory of 236 2744 Synaptics.exe 32 PID 2744 wrote to memory of 236 2744 Synaptics.exe 32 PID 2744 wrote to memory of 236 2744 Synaptics.exe 32 PID 2784 wrote to memory of 1456 2784 ._cache_a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exe 34 PID 2784 wrote to memory of 1456 2784 ._cache_a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exe 34 PID 2784 wrote to memory of 1456 2784 ._cache_a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exe 34 PID 2784 wrote to memory of 1456 2784 ._cache_a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exe 34 PID 236 wrote to memory of 1300 236 ._cache_Synaptics.exe 35 PID 236 wrote to memory of 1300 236 ._cache_Synaptics.exe 35 PID 236 wrote to memory of 1300 236 ._cache_Synaptics.exe 35 PID 236 wrote to memory of 1300 236 ._cache_Synaptics.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exe"C:\Users\Admin\AppData\Local\Temp\a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\._cache_a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exe"C:\Users\Admin\AppData\Local\Temp\._cache_a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 6243⤵
- Loads dropped DLL
- Program crash
PID:1456
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 236 -s 6284⤵
- Loads dropped DLL
- Program crash
PID:1300
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD55e02160336f5d96669815df15025ff1e
SHA15ff162fbbcc039d02a27f0b6084beef62140b889
SHA256a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c
SHA51230b9d03d7ad28d8d4fadceab0716c5bcb22cf64dec4af5a5a5f900b2db35ad1bd4da41041c3c0b0f722a41e8adda902437fa7881423ce16ae5ad6c59540b5fc2
-
Filesize
32KB
MD5168d18454016d983fe5a32f8f77f5759
SHA1468675551b32644ad6d6d38a1115bfe14d9de827
SHA2565c67a337624a1cfde938cd4094f6f3fa99fa99b55c793f4b2d642b6628c1313c
SHA512667b4cc01b39e4c28d08d73c56ee83eea4a843b07bb64227bf5697ada401f5a5788aeb3d755c86bc6ea882b49ce35951c81dd6a2bafc76b13c0f6c0a08d68c86
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
26KB
MD5e0b77af6345f5a5db4434ac07f22c700
SHA11ddcc2b2e13d4348c9efd2ab689713594d6da8e0
SHA2560d6bbcffbbdb294bf1c621661c04641ce19e40e3eff280768ccc4470f8dcce3c
SHA51255d96530647167bd72a2417b0c5500463f80a99d1c50f051f0716ed98e13398493c5fb9f48a36cdfd64cd4d9bc2598f45eb6dfba1e69042e7713c1c4596cdd12
-
Filesize
28KB
MD501a37fe7f06bc48d2bd083a91c0a0ca9
SHA1f3a65663622a5240eb3b9339988352549d4cc4a0
SHA2562fc44d1d3bd8edc5b51765a01497891cd4ecc22b58b6bc5d6150262b39f29182
SHA5126b4ab1d8f459d7b5b7c2b929d7b25a0214900133e93c764fccbf386a80dbd1aa79a80ae62da14a780ee539fe615bcf7367c56d13cfa00ec4a68347caeb509c89
-
Filesize
32KB
MD5df587ea31de0a173a46940ea5dbc8877
SHA1aec8aa9535f9e0c51473ab4d51af379afd7aa940
SHA256d1654537f425ef0787cc6409171e86263c86ffdf0807d25b12271546da984ffb
SHA512d6a6a4101bc7516eeabbd96fb085c8937507796dfe167776ca8a3258087ba3cd5d8f8b7cc0953f50aa106228af69e529a91e2c8b0bc9713ec6730548f60aefd4
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
\Users\Admin\AppData\Local\Temp\._cache_a7a1b85b10249da5b31abaabbd32aead550f33935009b811f921ad68505fd88c.exe
Filesize1.3MB
MD56c095453256d718e0744e175b028a9fb
SHA1a333051ef1e70c4a5a7279ab500641097b047b0c
SHA25641fbc7a60b7a6e41b8c86d709fd6c140ef4fb7970980c9915987417a012163ec
SHA512104db2952e611f41f624c9f4c972c110991dfbc86a46df76b3eb139f42618b60da9c8d7a39de4e8a7ea7c1695f370306b76ada0683abcdf013c58eb3195e8b79