Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 22:44
Behavioral task
behavioral1
Sample
MSRX/MSRX.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
MSRX/MSRX.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
MSRX/MagAPI.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
MSRX/MagAPI.dll
Resource
win10v2004-20241007-en
General
-
Target
MSRX/MSRX.exe
-
Size
1.8MB
-
MD5
8eed22631ca6a1573f8bd6443abf9a63
-
SHA1
1dd9578345f9e5fd9837ffeb5792d64e5b5dc2f3
-
SHA256
01eaf6db3eff96a405c630ead532557d77d1f22383cf3521eb61cc041d432b9a
-
SHA512
f09acb725d9ae0ea2309e70c04dc626157fb2997ca901ebb0ec9768657fca1b521c1d4481f5873b3077b44580853bf53d5523a43904205f88c4533a134c396a2
-
SSDEEP
24576:BnsJ39LyjbJkQFMhmC+6GD9UBNMplUHK/AtanJ9jWxAbLH:BnsHyjtk2MYC5GDOMUHgZpWAn
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 1800 ._cache_MSRX.exe 2768 Synaptics.exe 2864 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 1968 MSRX.exe 1968 MSRX.exe 1968 MSRX.exe 1968 MSRX.exe 2768 Synaptics.exe 2768 Synaptics.exe 2768 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" MSRX.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSRX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_MSRX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3060 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3060 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1968 wrote to memory of 1800 1968 MSRX.exe 30 PID 1968 wrote to memory of 1800 1968 MSRX.exe 30 PID 1968 wrote to memory of 1800 1968 MSRX.exe 30 PID 1968 wrote to memory of 1800 1968 MSRX.exe 30 PID 1968 wrote to memory of 2768 1968 MSRX.exe 31 PID 1968 wrote to memory of 2768 1968 MSRX.exe 31 PID 1968 wrote to memory of 2768 1968 MSRX.exe 31 PID 1968 wrote to memory of 2768 1968 MSRX.exe 31 PID 2768 wrote to memory of 2864 2768 Synaptics.exe 32 PID 2768 wrote to memory of 2864 2768 Synaptics.exe 32 PID 2768 wrote to memory of 2864 2768 Synaptics.exe 32 PID 2768 wrote to memory of 2864 2768 Synaptics.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\MSRX\MSRX.exe"C:\Users\Admin\AppData\Local\Temp\MSRX\MSRX.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\MSRX\._cache_MSRX.exe"C:\Users\Admin\AppData\Local\Temp\MSRX\._cache_MSRX.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1800
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\MSRX\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\MSRX\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2864
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD58eed22631ca6a1573f8bd6443abf9a63
SHA11dd9578345f9e5fd9837ffeb5792d64e5b5dc2f3
SHA25601eaf6db3eff96a405c630ead532557d77d1f22383cf3521eb61cc041d432b9a
SHA512f09acb725d9ae0ea2309e70c04dc626157fb2997ca901ebb0ec9768657fca1b521c1d4481f5873b3077b44580853bf53d5523a43904205f88c4533a134c396a2
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
24KB
MD5cdd708233a158be088747d2631ad8325
SHA1c45484bb580ceb810d7223fbf944b6734a04bd96
SHA25632c57ddeb45ed18addf57a900b6070263c93cda292a345328629e458bb46e0ab
SHA5120abe4264d320547d2d96e51ff909d16288bf0a3f5f17a3500cd3daf76372d35cae363c0df2e78064baad9965e48104b886cb0a2411c5132346774f8023cdf935
-
Filesize
1.1MB
MD52fae6ed57fbf6f219991ad8d88fe463a
SHA1e10ae98dc13030fd3240e0302ff56bb533e1d4db
SHA256abea4265eacba8836e30e853543025bbca1496ab8002a4ecaa6430fe3e10d9cc
SHA51220cd9cfbc3ae868ac54db8d05e32fe527f56704ab06f00cc597c974ae17e1412b71c1d6a50b94b1107fbbf4615841a926ee2369a8b9a69bbb4b50c4c7e71427c