Analysis
-
max time kernel
30s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 22:35
Behavioral task
behavioral1
Sample
MSRX.7z
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
MSRX.7z
Resource
win10v2004-20241007-en
General
-
Target
MSRX.7z
-
Size
591KB
-
MD5
63b8469f969f26dba70a4017c8efa341
-
SHA1
fb1f0f0bae8f5c2a67ff0d650a192058dd006de0
-
SHA256
447c72c5138078fc11668200f09edaff028ceb40097e409b3ff49125fcc79c9a
-
SHA512
ddff04f1c17e6b3a53b2b1f8b9085cb1e5548f9501017123bfd3bc450789265efa9c43f9d9c4cd825ba80a7e085a2f6ac98009ca8f3ac17b1b066a88d50f2972
-
SSDEEP
12288:vlWrgFvUlZTm25tRGIxNDZCvcYqAZ+IJuxWKxo9sZBsv0r1/85Q:dWreYTj5tRGIRCvcEZ+s+9Z6cr98q
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
MSRX.exeSynaptics.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation MSRX.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 4 IoCs
Processes:
MSRX.exe._cache_MSRX.exeSynaptics.exe._cache_Synaptics.exepid Process 2956 MSRX.exe 3760 ._cache_MSRX.exe 4476 Synaptics.exe 3196 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
MSRX.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" MSRX.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
._cache_Synaptics.exeMSRX.exe._cache_MSRX.exeSynaptics.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSRX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_MSRX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
Processes:
MSRX.exeSynaptics.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ MSRX.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 3772 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
7zFM.exepid Process 3288 7zFM.exe 3288 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
7zFM.exepid Process 3288 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
7zFM.exedescription pid Process Token: SeRestorePrivilege 3288 7zFM.exe Token: 35 3288 7zFM.exe Token: SeSecurityPrivilege 3288 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
7zFM.exepid Process 3288 7zFM.exe 3288 7zFM.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
EXCEL.EXEpid Process 3772 EXCEL.EXE 3772 EXCEL.EXE 3772 EXCEL.EXE 3772 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
7zFM.exeMSRX.exeSynaptics.exedescription pid Process procid_target PID 3288 wrote to memory of 2956 3288 7zFM.exe 90 PID 3288 wrote to memory of 2956 3288 7zFM.exe 90 PID 3288 wrote to memory of 2956 3288 7zFM.exe 90 PID 2956 wrote to memory of 3760 2956 MSRX.exe 92 PID 2956 wrote to memory of 3760 2956 MSRX.exe 92 PID 2956 wrote to memory of 3760 2956 MSRX.exe 92 PID 2956 wrote to memory of 4476 2956 MSRX.exe 93 PID 2956 wrote to memory of 4476 2956 MSRX.exe 93 PID 2956 wrote to memory of 4476 2956 MSRX.exe 93 PID 4476 wrote to memory of 3196 4476 Synaptics.exe 94 PID 4476 wrote to memory of 3196 4476 Synaptics.exe 94 PID 4476 wrote to memory of 3196 4476 Synaptics.exe 94
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\MSRX.7z"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\7zO8DCBED68\MSRX.exe"C:\Users\Admin\AppData\Local\Temp\7zO8DCBED68\MSRX.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\7zO8DCBED68\._cache_MSRX.exe"C:\Users\Admin\AppData\Local\Temp\7zO8DCBED68\._cache_MSRX.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3760
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\7zO8DCBED68\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\7zO8DCBED68\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3196
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD503b05455ee18d01f8d99d4d964cc7660
SHA19e4987cf23d84c7c6c92f659ca61b84dc15bf220
SHA256ad8916cd4c64035cffcb63ff7136c4c2833490a6a511436dda8851366c1ef47c
SHA512b7b77a35272c2e8716d079dcd10c7b0b169673760dfd48f0cbffbdf5296666f56825e190e563c46ed24fb0cbbb969b22247b8a14b7c574a8998501c18dd470db
-
Filesize
1.1MB
MD52fae6ed57fbf6f219991ad8d88fe463a
SHA1e10ae98dc13030fd3240e0302ff56bb533e1d4db
SHA256abea4265eacba8836e30e853543025bbca1496ab8002a4ecaa6430fe3e10d9cc
SHA51220cd9cfbc3ae868ac54db8d05e32fe527f56704ab06f00cc597c974ae17e1412b71c1d6a50b94b1107fbbf4615841a926ee2369a8b9a69bbb4b50c4c7e71427c
-
Filesize
1.8MB
MD58eed22631ca6a1573f8bd6443abf9a63
SHA11dd9578345f9e5fd9837ffeb5792d64e5b5dc2f3
SHA25601eaf6db3eff96a405c630ead532557d77d1f22383cf3521eb61cc041d432b9a
SHA512f09acb725d9ae0ea2309e70c04dc626157fb2997ca901ebb0ec9768657fca1b521c1d4481f5873b3077b44580853bf53d5523a43904205f88c4533a134c396a2
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04