Analysis
-
max time kernel
110s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 07:00
Behavioral task
behavioral1
Sample
460cbafa67c21c251c83679cfb251dd505ee91faa1cbd7d88c1f812cb472bd52.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
460cbafa67c21c251c83679cfb251dd505ee91faa1cbd7d88c1f812cb472bd52.exe
Resource
win10v2004-20241007-en
General
-
Target
460cbafa67c21c251c83679cfb251dd505ee91faa1cbd7d88c1f812cb472bd52.exe
-
Size
821KB
-
MD5
77cce601dcb17562a0793683a73f99e8
-
SHA1
4e640f5a5be72a37ddefbfbb56dbe1515b18f805
-
SHA256
460cbafa67c21c251c83679cfb251dd505ee91faa1cbd7d88c1f812cb472bd52
-
SHA512
6d8c557ed1a87bc5a867a0366aa9b87132fe7a5c43a8a4320ae14b2dc9a3df8d3bab82cfbebcacd47b8c7ba06c5ca5943f4fd7ca9a3240cb6076b276d3cdb104
-
SSDEEP
12288:VMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9O9wroT:VnsJ39LyjbJkQFMhmC+6GD9Hu
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
resource behavioral1/files/0x00070000000193b5-72.dat -
Executes dropped EXE 3 IoCs
pid Process 2732 ._cache_460cbafa67c21c251c83679cfb251dd505ee91faa1cbd7d88c1f812cb472bd52.exe 2700 Synaptics.exe 2784 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 2188 460cbafa67c21c251c83679cfb251dd505ee91faa1cbd7d88c1f812cb472bd52.exe 2188 460cbafa67c21c251c83679cfb251dd505ee91faa1cbd7d88c1f812cb472bd52.exe 2188 460cbafa67c21c251c83679cfb251dd505ee91faa1cbd7d88c1f812cb472bd52.exe 2700 Synaptics.exe 2700 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 460cbafa67c21c251c83679cfb251dd505ee91faa1cbd7d88c1f812cb472bd52.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 460cbafa67c21c251c83679cfb251dd505ee91faa1cbd7d88c1f812cb472bd52.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1996 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1996 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2732 2188 460cbafa67c21c251c83679cfb251dd505ee91faa1cbd7d88c1f812cb472bd52.exe 30 PID 2188 wrote to memory of 2732 2188 460cbafa67c21c251c83679cfb251dd505ee91faa1cbd7d88c1f812cb472bd52.exe 30 PID 2188 wrote to memory of 2732 2188 460cbafa67c21c251c83679cfb251dd505ee91faa1cbd7d88c1f812cb472bd52.exe 30 PID 2188 wrote to memory of 2732 2188 460cbafa67c21c251c83679cfb251dd505ee91faa1cbd7d88c1f812cb472bd52.exe 30 PID 2188 wrote to memory of 2700 2188 460cbafa67c21c251c83679cfb251dd505ee91faa1cbd7d88c1f812cb472bd52.exe 32 PID 2188 wrote to memory of 2700 2188 460cbafa67c21c251c83679cfb251dd505ee91faa1cbd7d88c1f812cb472bd52.exe 32 PID 2188 wrote to memory of 2700 2188 460cbafa67c21c251c83679cfb251dd505ee91faa1cbd7d88c1f812cb472bd52.exe 32 PID 2188 wrote to memory of 2700 2188 460cbafa67c21c251c83679cfb251dd505ee91faa1cbd7d88c1f812cb472bd52.exe 32 PID 2700 wrote to memory of 2784 2700 Synaptics.exe 33 PID 2700 wrote to memory of 2784 2700 Synaptics.exe 33 PID 2700 wrote to memory of 2784 2700 Synaptics.exe 33 PID 2700 wrote to memory of 2784 2700 Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\460cbafa67c21c251c83679cfb251dd505ee91faa1cbd7d88c1f812cb472bd52.exe"C:\Users\Admin\AppData\Local\Temp\460cbafa67c21c251c83679cfb251dd505ee91faa1cbd7d88c1f812cb472bd52.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\._cache_460cbafa67c21c251c83679cfb251dd505ee91faa1cbd7d88c1f812cb472bd52.exe"C:\Users\Admin\AppData\Local\Temp\._cache_460cbafa67c21c251c83679cfb251dd505ee91faa1cbd7d88c1f812cb472bd52.exe"2⤵
- Executes dropped EXE
PID:2732
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2784
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
821KB
MD577cce601dcb17562a0793683a73f99e8
SHA14e640f5a5be72a37ddefbfbb56dbe1515b18f805
SHA256460cbafa67c21c251c83679cfb251dd505ee91faa1cbd7d88c1f812cb472bd52
SHA5126d8c557ed1a87bc5a867a0366aa9b87132fe7a5c43a8a4320ae14b2dc9a3df8d3bab82cfbebcacd47b8c7ba06c5ca5943f4fd7ca9a3240cb6076b276d3cdb104
-
C:\Users\Admin\AppData\Local\Temp\._cache_460cbafa67c21c251c83679cfb251dd505ee91faa1cbd7d88c1f812cb472bd52.exe
Filesize67KB
MD575cba417114e4da36613a30fc692fb23
SHA1b06fa3146b4feb1f6465b7c6489f4fc63e79a20c
SHA256405f451da226def25b8a6372c354a5642db81d4d9829aabaac00156d3d0dffbf
SHA5128ed3e6e47ec7406b07f2acd7662f91b22dbd1d043174acad51937e77c10b06aa04c0e4e754e69c12435c45a0c1577df14083ba5a63e50ff16e0f634713c257d1
-
Filesize
29KB
MD50f9dabc6d97d271fee5333005f413674
SHA18b1759a62c01c213e09f51e4b9d189f8fd9c4b36
SHA2562b62d419635018dc513465775bfc1891c0d32d794d0a637d15ae1f8f57b9e3b6
SHA512d7a5faf0b1902ee1ca9e01215cb9a06d4238e17834116c2168f1981715a8a5e6762b9d4914e0e66d4339c82c11b7278d26cece461ef394c9e03d2b44c679b62b
-
Filesize
24KB
MD56d5d6570f8c3b8a054603f9bbb24e055
SHA1bc481a405b6837c0e6a8de4a00c653fe01d7e0f2
SHA25656b69403636b88d3a3cae9a72c26121648ab307deccfd726782d2d0e50b03b1d
SHA51251eada99d71bee23aba1b51e061a37f939882c5d7b1b1f086cd754ccf76d942b52b2fa0bc45af91b0f6b3e96eed77ede4d8924cc87814ec742b96b47c86bd4dc
-
Filesize
30KB
MD54cfbc390b5b0b920f8dcfb60585c153c
SHA181f590fe6ad99326108730ebe63a0be1d395f214
SHA256f6e1f4be6b666f4814f2c7e2ad87681fe61f001c8574948d0273a4d2d68494f2
SHA51206c449553b248577e3f8792ef823cb71fbb76032f2f58726b746a0099117975a73739c2572dc0b2238562fe60e573f1a13068ff38f0b3c8ceba43c691c244cf4
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04