Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 17:09
Behavioral task
behavioral1
Sample
6e3aa1962a45655b1a18ec7f46b8b57cafe7e99854b145ba3c81c0d0a1155d00.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6e3aa1962a45655b1a18ec7f46b8b57cafe7e99854b145ba3c81c0d0a1155d00.exe
Resource
win10v2004-20241007-en
General
-
Target
6e3aa1962a45655b1a18ec7f46b8b57cafe7e99854b145ba3c81c0d0a1155d00.exe
-
Size
754KB
-
MD5
4268c9bea46642640128e7bd2f47c1b2
-
SHA1
a729a31aeff746e177c92464f41add813ce3cf64
-
SHA256
6e3aa1962a45655b1a18ec7f46b8b57cafe7e99854b145ba3c81c0d0a1155d00
-
SHA512
caf785b0f6d875fd0e57bd0c402c70100962067cbf2ac53863f72e67459fdc44f428029e692a41e6865ab39c25d431cb797ffc3a919064211ba3c0fd5afbdf34
-
SSDEEP
12288:KMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V95HBy:KnsJ39LyjbJkQFMhmC+6GD96
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 1 IoCs
pid Process 2008 Synaptics.exe -
Loads dropped DLL 2 IoCs
pid Process 2144 6e3aa1962a45655b1a18ec7f46b8b57cafe7e99854b145ba3c81c0d0a1155d00.exe 2144 6e3aa1962a45655b1a18ec7f46b8b57cafe7e99854b145ba3c81c0d0a1155d00.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 6e3aa1962a45655b1a18ec7f46b8b57cafe7e99854b145ba3c81c0d0a1155d00.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6e3aa1962a45655b1a18ec7f46b8b57cafe7e99854b145ba3c81c0d0a1155d00.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2584 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2584 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2144 wrote to memory of 2008 2144 6e3aa1962a45655b1a18ec7f46b8b57cafe7e99854b145ba3c81c0d0a1155d00.exe 30 PID 2144 wrote to memory of 2008 2144 6e3aa1962a45655b1a18ec7f46b8b57cafe7e99854b145ba3c81c0d0a1155d00.exe 30 PID 2144 wrote to memory of 2008 2144 6e3aa1962a45655b1a18ec7f46b8b57cafe7e99854b145ba3c81c0d0a1155d00.exe 30 PID 2144 wrote to memory of 2008 2144 6e3aa1962a45655b1a18ec7f46b8b57cafe7e99854b145ba3c81c0d0a1155d00.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e3aa1962a45655b1a18ec7f46b8b57cafe7e99854b145ba3c81c0d0a1155d00.exe"C:\Users\Admin\AppData\Local\Temp\6e3aa1962a45655b1a18ec7f46b8b57cafe7e99854b145ba3c81c0d0a1155d00.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2008
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
754KB
MD54268c9bea46642640128e7bd2f47c1b2
SHA1a729a31aeff746e177c92464f41add813ce3cf64
SHA2566e3aa1962a45655b1a18ec7f46b8b57cafe7e99854b145ba3c81c0d0a1155d00
SHA512caf785b0f6d875fd0e57bd0c402c70100962067cbf2ac53863f72e67459fdc44f428029e692a41e6865ab39c25d431cb797ffc3a919064211ba3c0fd5afbdf34
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
22KB
MD51cf7227b230c0b66c879cc9dded5956a
SHA100be7434c8792d66c14eb9e65437d8bdbe545071
SHA256fa7460c4e8b6ae99f5b79e1c74a7571b0e0f2c7019e2876c244aee5242f625e1
SHA5123067d2e6ce5410aef8b254e7ec1c5d1937074f15e5c9150c5755efe8e51eb5b3edd2a3c47fb5d8984366e8a097b9fc97b791b329e6b3a7798874fc182b36cb60
-
Filesize
20KB
MD5da284d83408d5d6621088e127fe1247a
SHA13ae5df24f0d6e074af1d126b0b5d0027133168ee
SHA2562a65ce435e41d654ed19fada9cfdc36b102fad64310811edb9f56a2dea8d43e8
SHA512529743b47a875cf8ecfd6f6f7b22451bf1c7afc2b501d061151f3a16dbb2ba4439ce4757408acbd85a99b5cfee6691f696ce4e1a33dd23d22f2599a8c4508ef5
-
Filesize
26KB
MD5991915e4c3ecb745e88e5a2a0ce58e3a
SHA1ca741f5ce518472d1e8a27b330a83bbeef804425
SHA256d3f85b8015055d2e10c8b2ff906cc4cb417cf41d4215acc7c4787348745e4c1e
SHA512e9575ad48f51a569f06ec69cc2a21fcd81208318bb4387d150d8b256927ba2e29004c38e05cfb865027be5fbb6fdfd78e9145406924373cca8da47c422e82d84
-
Filesize
26KB
MD5152c0e1710a3e5be0ce16b0e5e5f693e
SHA197f331398aa4b8bce78ab0fba28635136aeb9266
SHA256237a1c94376749b0bce41e1689f4ba02ebb1ed712beae025271cd9223b53eadb
SHA51236b1aa2540d583e2f434a49732f32dd9d087424369667fa7eb8a7b92edcabf4cf106a60db713528ef2930fbebae6b47e14a192e194cd0325534f678db8873ce1
-
Filesize
25KB
MD59d967759e00427388bfe2d844083e1e1
SHA1f36cfec00c67085ee32709e8f9572823dba77a2b
SHA256f4cf71c72640fbc61b7fa2a8a6557e0ab6c14f5e19e89a5dbc209aac22c784da
SHA512fac3978371d204974c6dd9adf2eca54c90e3239abc7079bbe507dc7f42381fe4395687f739d30187c63bf9e4af78acc60caaf72815ed80e39094e12589343bc1
-
Filesize
23KB
MD5ff888d618ee9efc5704c01f962791315
SHA1023a47560b026aeea30c9631c32093815ed68981
SHA256fda43b5e7726e3334bb22423eddefff39524fd2f57fe51f4dd2e8e19c50f1ab5
SHA5124f3faf451326e334d4d400402656b0b4530fec647d5c1d4def474e1ceda5efe32af043afde5d45d50c7f047f5e317ff21a1626e44dd79276a568828d41cca4e8
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882