Analysis
-
max time kernel
117s -
max time network
96s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 07:51
Behavioral task
behavioral1
Sample
83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe
Resource
win10v2004-20241007-en
General
-
Target
83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe
-
Size
1.7MB
-
MD5
76f7ab7823b1e61312f8530793f2e140
-
SHA1
f0cc2f00a89be2b284fe10a67b8b01af7a2f0e2e
-
SHA256
83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826
-
SHA512
22c4e69008afc7064464c10ebbef850d17995a568629d3dc818f02884aa1bad0fa0388d3ed5d03ea47b532ee15db1c4251b1827ee3fdd599e404104a28a9b6c1
-
SSDEEP
24576:0nsJ39LyjbJkQFMhmC+6GD9FbhllBGViSuEqgJkqgHI+bg63tpOk:0nsHyjtk2MYC5GD9YblvgHfgo
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2528 ._cache_83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe 584 Synaptics.exe 2860 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 1688 83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe 1688 83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe 1688 83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe 584 Synaptics.exe 584 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CANtieCAR_Firmware ._cache_83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CANtieCAR_Firmware\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\._cache_83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe\" \"%1\"" ._cache_83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rfw\ = "CANtieCAR_Firmware" ._cache_Synaptics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CANtieCAR_Firmware\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\._cache_Synaptics.exe\" \"%1\"" ._cache_Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CANtieCAR_Firmware\DefaultIcon ._cache_83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rfw ._cache_Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CANtieCAR_Firmware\shell\open ._cache_83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CANtieCAR_Firmware\shell\open\command ._cache_83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rfw ._cache_83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CANtieCAR_Firmware\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\._cache_83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe\",0" ._cache_83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CANtieCAR_Firmware\shell ._cache_83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CANtieCAR_Firmware\DefaultIcon ._cache_Synaptics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CANtieCAR_Firmware\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\._cache_Synaptics.exe\",0" ._cache_Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CANtieCAR_Firmware\shell\open\command ._cache_Synaptics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rfw\ = "CANtieCAR_Firmware" ._cache_83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2068 EXCEL.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2860 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2068 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2528 1688 83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe 30 PID 1688 wrote to memory of 2528 1688 83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe 30 PID 1688 wrote to memory of 2528 1688 83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe 30 PID 1688 wrote to memory of 2528 1688 83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe 30 PID 1688 wrote to memory of 584 1688 83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe 31 PID 1688 wrote to memory of 584 1688 83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe 31 PID 1688 wrote to memory of 584 1688 83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe 31 PID 1688 wrote to memory of 584 1688 83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe 31 PID 584 wrote to memory of 2860 584 Synaptics.exe 32 PID 584 wrote to memory of 2860 584 Synaptics.exe 32 PID 584 wrote to memory of 2860 584 Synaptics.exe 32 PID 584 wrote to memory of 2860 584 Synaptics.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe"C:\Users\Admin\AppData\Local\Temp\83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\._cache_83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2528
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2860
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD576f7ab7823b1e61312f8530793f2e140
SHA1f0cc2f00a89be2b284fe10a67b8b01af7a2f0e2e
SHA25683f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826
SHA51222c4e69008afc7064464c10ebbef850d17995a568629d3dc818f02884aa1bad0fa0388d3ed5d03ea47b532ee15db1c4251b1827ee3fdd599e404104a28a9b6c1
-
Filesize
20KB
MD5f9840a820af281d5648c72ef7c49ba7f
SHA17c8779dfa301e0707b6d1a5d1455566d0dcbff3d
SHA2564ac2a9dc6d5e531ce3a847015943d6431332210759e3b072dfb3bde107e1e700
SHA5121fb5f543ad50bfbd84b0cc1eeffd3a6399957f8b4effde17e4a64a6615526b1e9cf0a2647a9ff9686e8f862a6498519e533c3fee32e8aca871cba6f1f0944c48
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
24KB
MD52734c353f7e150f3b88122146f61240c
SHA17fa77c0669ce6abdd30920b91c1968e4a70f203b
SHA256c33e3db7016f439062b40f801c3ae21db94ec032987fe5765d44a4c808c565dc
SHA512806de1957d7a4d6e874004d36b7ac8505a58d4161d65476d1f46c9126f5c438b7b6d509c538a0dc7b1db42124041fedead27d452bb99290778dbf6be12ab4ae5
-
\Users\Admin\AppData\Local\Temp\._cache_83f8b1b56c3d04c1dc54f9b61a873d0c098de15a3539dbdd2e599ed759108826N.exe
Filesize941KB
MD58fb6c5998670709c9c8ab3f1560251c4
SHA151682bfe73eb1f2a08619ac4b87c4b99d9d2da1f
SHA25696de838e2e74b377ab2b74db413891ab862c5bb5549d916452dcb4e99a6a74e3
SHA5124568f8f1688852e6427044bc4594ba28c0953708751fa8f3d43e8617cdd0ec9c9bcfba1be9ec2dd44364de0e1b2714255e4a5855b6aadb9b3a54c2866af4d6e4