Analysis
-
max time kernel
110s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 10:28
Behavioral task
behavioral1
Sample
13035542f738b4cd7b8600e9772bf22abd239926c5594ed3d06ad4729156af77.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
13035542f738b4cd7b8600e9772bf22abd239926c5594ed3d06ad4729156af77.exe
Resource
win10v2004-20241007-en
General
-
Target
13035542f738b4cd7b8600e9772bf22abd239926c5594ed3d06ad4729156af77.exe
-
Size
865KB
-
MD5
fcfc40a5f40e6ca042f9c99e632c7789
-
SHA1
d820cf6057094a4799afdbde375cda236d26666c
-
SHA256
13035542f738b4cd7b8600e9772bf22abd239926c5594ed3d06ad4729156af77
-
SHA512
8759847a5b4b4632efd4149fd8ba77a3d2c82d4a22995bbd7dd8e8ed795c3c76fd3da9d6af0826526ade540bd54f64ecab28558272a5eeaface4a2bbce3ec479
-
SSDEEP
12288:JMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V92qNz:JnsJ39LyjbJkQFMhmC+6GD9z
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Processes:
resource behavioral1/files/0x0006000000017487-102.dat -
Executes dropped EXE 3 IoCs
Processes:
._cache_13035542f738b4cd7b8600e9772bf22abd239926c5594ed3d06ad4729156af77.exeSynaptics.exe._cache_Synaptics.exepid Process 2964 ._cache_13035542f738b4cd7b8600e9772bf22abd239926c5594ed3d06ad4729156af77.exe 2288 Synaptics.exe 2712 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
Processes:
13035542f738b4cd7b8600e9772bf22abd239926c5594ed3d06ad4729156af77.exeSynaptics.exepid Process 2916 13035542f738b4cd7b8600e9772bf22abd239926c5594ed3d06ad4729156af77.exe 2916 13035542f738b4cd7b8600e9772bf22abd239926c5594ed3d06ad4729156af77.exe 2916 13035542f738b4cd7b8600e9772bf22abd239926c5594ed3d06ad4729156af77.exe 2916 13035542f738b4cd7b8600e9772bf22abd239926c5594ed3d06ad4729156af77.exe 2288 Synaptics.exe 2288 Synaptics.exe 2288 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
13035542f738b4cd7b8600e9772bf22abd239926c5594ed3d06ad4729156af77.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 13035542f738b4cd7b8600e9772bf22abd239926c5594ed3d06ad4729156af77.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
13035542f738b4cd7b8600e9772bf22abd239926c5594ed3d06ad4729156af77.exeSynaptics.exeEXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13035542f738b4cd7b8600e9772bf22abd239926c5594ed3d06ad4729156af77.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 2772 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
EXCEL.EXEpid Process 2772 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
13035542f738b4cd7b8600e9772bf22abd239926c5594ed3d06ad4729156af77.exeSynaptics.exedescription pid Process procid_target PID 2916 wrote to memory of 2964 2916 13035542f738b4cd7b8600e9772bf22abd239926c5594ed3d06ad4729156af77.exe 30 PID 2916 wrote to memory of 2964 2916 13035542f738b4cd7b8600e9772bf22abd239926c5594ed3d06ad4729156af77.exe 30 PID 2916 wrote to memory of 2964 2916 13035542f738b4cd7b8600e9772bf22abd239926c5594ed3d06ad4729156af77.exe 30 PID 2916 wrote to memory of 2964 2916 13035542f738b4cd7b8600e9772bf22abd239926c5594ed3d06ad4729156af77.exe 30 PID 2916 wrote to memory of 2288 2916 13035542f738b4cd7b8600e9772bf22abd239926c5594ed3d06ad4729156af77.exe 31 PID 2916 wrote to memory of 2288 2916 13035542f738b4cd7b8600e9772bf22abd239926c5594ed3d06ad4729156af77.exe 31 PID 2916 wrote to memory of 2288 2916 13035542f738b4cd7b8600e9772bf22abd239926c5594ed3d06ad4729156af77.exe 31 PID 2916 wrote to memory of 2288 2916 13035542f738b4cd7b8600e9772bf22abd239926c5594ed3d06ad4729156af77.exe 31 PID 2288 wrote to memory of 2712 2288 Synaptics.exe 32 PID 2288 wrote to memory of 2712 2288 Synaptics.exe 32 PID 2288 wrote to memory of 2712 2288 Synaptics.exe 32 PID 2288 wrote to memory of 2712 2288 Synaptics.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\13035542f738b4cd7b8600e9772bf22abd239926c5594ed3d06ad4729156af77.exe"C:\Users\Admin\AppData\Local\Temp\13035542f738b4cd7b8600e9772bf22abd239926c5594ed3d06ad4729156af77.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\._cache_13035542f738b4cd7b8600e9772bf22abd239926c5594ed3d06ad4729156af77.exe"C:\Users\Admin\AppData\Local\Temp\._cache_13035542f738b4cd7b8600e9772bf22abd239926c5594ed3d06ad4729156af77.exe"2⤵
- Executes dropped EXE
PID:2964
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2712
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
865KB
MD5fcfc40a5f40e6ca042f9c99e632c7789
SHA1d820cf6057094a4799afdbde375cda236d26666c
SHA25613035542f738b4cd7b8600e9772bf22abd239926c5594ed3d06ad4729156af77
SHA5128759847a5b4b4632efd4149fd8ba77a3d2c82d4a22995bbd7dd8e8ed795c3c76fd3da9d6af0826526ade540bd54f64ecab28558272a5eeaface4a2bbce3ec479
-
Filesize
29KB
MD5b0cef7c314a2a3f4142bf885d88f201f
SHA1fea1e790d40c45457f285d00ae36e7bfd33ee438
SHA2568780f0abb64e4a145d9a3764902ae4168d128cc857f172806f2be62081f4d0b8
SHA51204f32198074b8a3b8071976fa7bf23e70e3dcd34095005b66447ae3632642b56519412ef6706f5cf5e821ee749d25152ed7ff1b432a9817361e207372dc8518f
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
25KB
MD5a0c1a1c3e76046185d18158ca2c51e21
SHA106167587c053ad9e73514d7fae2a9d2ac0307076
SHA256b11d944a3f8ca598cfc790a202bd67cea07be3b720156ce197820da96de5cae1
SHA5126037ff9f2861db40d7d84a19dc6ccf666201acf91d36ff5121604c6eb893ec6d5bd2e1af2c44a3e6522720199f400a58369c9d69cdaf4a3d13b488a37960ddf0
-
Filesize
20KB
MD5e7590f16238bf19acf2531ed57d70a5d
SHA144d2da1f0e0ac95fb042be8db54015fb57f98e06
SHA25625887deca7f1f0b976f373cab0870633596063f2d2bc532f931edf3eadf4a9f3
SHA512c1a6e9f6661cf9a0cbf700cd8354d2edc1a302b5d8bed73a7710b2fb0788b3e0ad962929542c8891d1b3c58e04d4fdaf9a1995e647a2bf12ffd32445778c8c78
-
\Users\Admin\AppData\Local\Temp\._cache_13035542f738b4cd7b8600e9772bf22abd239926c5594ed3d06ad4729156af77.exe
Filesize111KB
MD5088582ea6aa6c08125ffeca62fd2d997
SHA18b6b97bcb79ddb5b018dac5a9043f5e7e284af26
SHA256278baca497ae9ae362fcf39f27ffb55877ef8da8d25579f72bc045147fe0f34d
SHA512fa7433d2a8b7f49b6d669077e5e96d1cee512bceed507934255716b7558d3b5bf469eaf5ce72a4ae9f678b9721bee710832096af283a2eeb01798564b258dcc5