Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
110s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03/12/2024, 17:13
Behavioral task
behavioral1
Sample
0bedb04f201880a9733e6bc99f767f03b67320cd951299a4e0393d9efbd4fb08N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0bedb04f201880a9733e6bc99f767f03b67320cd951299a4e0393d9efbd4fb08N.exe
Resource
win10v2004-20241007-en
General
-
Target
0bedb04f201880a9733e6bc99f767f03b67320cd951299a4e0393d9efbd4fb08N.exe
-
Size
853KB
-
MD5
ef8c43f06f3ac8aa1ab0704c75781ca0
-
SHA1
75248524a33180c4b934701a98914e23795df81d
-
SHA256
0bedb04f201880a9733e6bc99f767f03b67320cd951299a4e0393d9efbd4fb08
-
SHA512
aef4af564f84bfa34f885d00c1976cd31d2958c3926206e4a8a71a7de86132571b8e9afa64c561b2b3239a90f511b2ff6b196d28c2767f505492c3bc29328d8a
-
SSDEEP
24576:xnsJ39LyjbJkQFMhmC+6GD9pqra3PCvXvY:xnsHyjtk2MYC5GDkvY
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 3004 ._cache_0bedb04f201880a9733e6bc99f767f03b67320cd951299a4e0393d9efbd4fb08N.exe 2900 Synaptics.exe 2676 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 2380 0bedb04f201880a9733e6bc99f767f03b67320cd951299a4e0393d9efbd4fb08N.exe 2380 0bedb04f201880a9733e6bc99f767f03b67320cd951299a4e0393d9efbd4fb08N.exe 2380 0bedb04f201880a9733e6bc99f767f03b67320cd951299a4e0393d9efbd4fb08N.exe 2380 0bedb04f201880a9733e6bc99f767f03b67320cd951299a4e0393d9efbd4fb08N.exe 2900 Synaptics.exe 2900 Synaptics.exe 2900 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 0bedb04f201880a9733e6bc99f767f03b67320cd951299a4e0393d9efbd4fb08N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0bedb04f201880a9733e6bc99f767f03b67320cd951299a4e0393d9efbd4fb08N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2776 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2776 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2380 wrote to memory of 3004 2380 0bedb04f201880a9733e6bc99f767f03b67320cd951299a4e0393d9efbd4fb08N.exe 29 PID 2380 wrote to memory of 3004 2380 0bedb04f201880a9733e6bc99f767f03b67320cd951299a4e0393d9efbd4fb08N.exe 29 PID 2380 wrote to memory of 3004 2380 0bedb04f201880a9733e6bc99f767f03b67320cd951299a4e0393d9efbd4fb08N.exe 29 PID 2380 wrote to memory of 3004 2380 0bedb04f201880a9733e6bc99f767f03b67320cd951299a4e0393d9efbd4fb08N.exe 29 PID 2380 wrote to memory of 2900 2380 0bedb04f201880a9733e6bc99f767f03b67320cd951299a4e0393d9efbd4fb08N.exe 31 PID 2380 wrote to memory of 2900 2380 0bedb04f201880a9733e6bc99f767f03b67320cd951299a4e0393d9efbd4fb08N.exe 31 PID 2380 wrote to memory of 2900 2380 0bedb04f201880a9733e6bc99f767f03b67320cd951299a4e0393d9efbd4fb08N.exe 31 PID 2380 wrote to memory of 2900 2380 0bedb04f201880a9733e6bc99f767f03b67320cd951299a4e0393d9efbd4fb08N.exe 31 PID 2900 wrote to memory of 2676 2900 Synaptics.exe 32 PID 2900 wrote to memory of 2676 2900 Synaptics.exe 32 PID 2900 wrote to memory of 2676 2900 Synaptics.exe 32 PID 2900 wrote to memory of 2676 2900 Synaptics.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bedb04f201880a9733e6bc99f767f03b67320cd951299a4e0393d9efbd4fb08N.exe"C:\Users\Admin\AppData\Local\Temp\0bedb04f201880a9733e6bc99f767f03b67320cd951299a4e0393d9efbd4fb08N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\._cache_0bedb04f201880a9733e6bc99f767f03b67320cd951299a4e0393d9efbd4fb08N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_0bedb04f201880a9733e6bc99f767f03b67320cd951299a4e0393d9efbd4fb08N.exe"2⤵
- Executes dropped EXE
PID:3004
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2676
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
853KB
MD5ef8c43f06f3ac8aa1ab0704c75781ca0
SHA175248524a33180c4b934701a98914e23795df81d
SHA2560bedb04f201880a9733e6bc99f767f03b67320cd951299a4e0393d9efbd4fb08
SHA512aef4af564f84bfa34f885d00c1976cd31d2958c3926206e4a8a71a7de86132571b8e9afa64c561b2b3239a90f511b2ff6b196d28c2767f505492c3bc29328d8a
-
Filesize
32KB
MD516151fc612b17afcdf502de03b79723c
SHA13a90b51f91030fb17eabf4a9a4ecc38b9aaee1c4
SHA2566999419affd55c96a4ab632f7c720c7d0f52e9049ee355874ecffa32374d4f50
SHA512f958a6129962bea0da862184a1ddfeed0aa9b40d6fcf9b6144bd2b6e3e878cf87e5ea9e3ef4d8999ec0c12c7c0efb33efe27254b45d8d2f588d95b048bbc5779
-
Filesize
24KB
MD5e42729c5daef937cb795f344be59d73f
SHA1a7010653bf70faf2e2be045a93ac4d795bf2da66
SHA256a928cdc6eb09053fe1978c03c2aaa30b171e6b604bb8b6b99869729fc8cedfac
SHA512a57c4e98e5c8109d8c491bbd27e54b9f8372d70103f5ef2499eb5d1ddc4a36e5be939cfa7b9f068d1af999999e561d3e8b2dbc9bac2eb9eaeb6879ad4381750c
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
\Users\Admin\AppData\Local\Temp\._cache_0bedb04f201880a9733e6bc99f767f03b67320cd951299a4e0393d9efbd4fb08N.exe
Filesize100KB
MD506f46062e7d56457252a9a3e3a73405a
SHA194533bdd051154303d596dabb51187d146f94512
SHA2568e2bdcaee8dfefcfe42740a43a0079eb1babfc530200bcfb57b1b1a548852af1
SHA5122551f311a4eb2521a8b0c65ff87dd6a425a85cd242676b4553bc1adf807b432bbcc43144ae186dd04097f78e4ac1da979bb60f0242d07665c1125cf66bf63809