Analysis
-
max time kernel
111s -
max time network
107s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 01:44
Behavioral task
behavioral1
Sample
d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe
Resource
win10v2004-20241007-en
General
-
Target
d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe
-
Size
5.0MB
-
MD5
692d1308fbbc9177cbf6668c5504861b
-
SHA1
fd5b3a8dd90c6321a9d35a0605750830d078fbb5
-
SHA256
d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb
-
SHA512
74e1f759aa40395459c4f3d99cf02d5e53e6a531f78dcfe7c232fc986d11e1e836635dfa767cfb14a8ee5ca971904516f084f652b876b610dce99bdbf8ba963a
-
SSDEEP
98304:Pnsmtk2aGkLUHCga1aeKv+NrdW54qbtx/5CPDhGNAzxa8XK6FIPyr:fLqUH/aE6nW54qpxk7hGCwZ6ye
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 5 IoCs
pid Process 3060 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 1572 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.tmp 2936 Synaptics.exe 1652 ._cache_Synaptics.exe 2612 ._cache_Synaptics.tmp -
Loads dropped DLL 7 IoCs
pid Process 2512 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 3060 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 2512 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 2512 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 2936 Synaptics.exe 2936 Synaptics.exe 1652 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
System Time Discovery 1 TTPs 2 IoCs
Adversary may gather the system time and/or time zone settings from a local or remote system.
pid Process 2084 cmd.exe 1636 cmd.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1220 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1220 EXCEL.EXE -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2512 wrote to memory of 3060 2512 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 31 PID 2512 wrote to memory of 3060 2512 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 31 PID 2512 wrote to memory of 3060 2512 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 31 PID 2512 wrote to memory of 3060 2512 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 31 PID 2512 wrote to memory of 3060 2512 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 31 PID 2512 wrote to memory of 3060 2512 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 31 PID 2512 wrote to memory of 3060 2512 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 31 PID 3060 wrote to memory of 1572 3060 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 32 PID 3060 wrote to memory of 1572 3060 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 32 PID 3060 wrote to memory of 1572 3060 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 32 PID 3060 wrote to memory of 1572 3060 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 32 PID 3060 wrote to memory of 1572 3060 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 32 PID 3060 wrote to memory of 1572 3060 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 32 PID 3060 wrote to memory of 1572 3060 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 32 PID 2512 wrote to memory of 2936 2512 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 33 PID 2512 wrote to memory of 2936 2512 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 33 PID 2512 wrote to memory of 2936 2512 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 33 PID 2512 wrote to memory of 2936 2512 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 33 PID 2936 wrote to memory of 1652 2936 Synaptics.exe 34 PID 2936 wrote to memory of 1652 2936 Synaptics.exe 34 PID 2936 wrote to memory of 1652 2936 Synaptics.exe 34 PID 2936 wrote to memory of 1652 2936 Synaptics.exe 34 PID 2936 wrote to memory of 1652 2936 Synaptics.exe 34 PID 2936 wrote to memory of 1652 2936 Synaptics.exe 34 PID 2936 wrote to memory of 1652 2936 Synaptics.exe 34 PID 1652 wrote to memory of 2612 1652 ._cache_Synaptics.exe 35 PID 1652 wrote to memory of 2612 1652 ._cache_Synaptics.exe 35 PID 1652 wrote to memory of 2612 1652 ._cache_Synaptics.exe 35 PID 1652 wrote to memory of 2612 1652 ._cache_Synaptics.exe 35 PID 1652 wrote to memory of 2612 1652 ._cache_Synaptics.exe 35 PID 1652 wrote to memory of 2612 1652 ._cache_Synaptics.exe 35 PID 1652 wrote to memory of 2612 1652 ._cache_Synaptics.exe 35 PID 2612 wrote to memory of 1636 2612 ._cache_Synaptics.tmp 37 PID 2612 wrote to memory of 1636 2612 ._cache_Synaptics.tmp 37 PID 2612 wrote to memory of 1636 2612 ._cache_Synaptics.tmp 37 PID 2612 wrote to memory of 1636 2612 ._cache_Synaptics.tmp 37 PID 1572 wrote to memory of 2084 1572 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.tmp 38 PID 1572 wrote to memory of 2084 1572 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.tmp 38 PID 1572 wrote to memory of 2084 1572 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.tmp 38 PID 1572 wrote to memory of 2084 1572 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.tmp 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe"C:\Users\Admin\AppData\Local\Temp\d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe"C:\Users\Admin\AppData\Local\Temp\._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\is-GH0T8.tmp\._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.tmp"C:\Users\Admin\AppData\Local\Temp\is-GH0T8.tmp\._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.tmp" /SL5="$7015C,3559565,799744,C:\Users\Admin\AppData\Local\Temp\._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C dotnet --list-runtimes > "C:\Users\Admin\AppData\Local\Temp\is-D178S.tmp\dotnet.txt" 2>&14⤵
- System Location Discovery: System Language Discovery
- System Time Discovery
PID:2084
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\is-O4RDL.tmp\._cache_Synaptics.tmp"C:\Users\Admin\AppData\Local\Temp\is-O4RDL.tmp\._cache_Synaptics.tmp" /SL5="$30186,3559565,799744,C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C dotnet --list-runtimes > "C:\Users\Admin\AppData\Local\Temp\is-2TEJM.tmp\dotnet.txt" 2>&15⤵
- System Location Discovery: System Language Discovery
- System Time Discovery
PID:1636
-
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.0MB
MD5692d1308fbbc9177cbf6668c5504861b
SHA1fd5b3a8dd90c6321a9d35a0605750830d078fbb5
SHA256d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb
SHA51274e1f759aa40395459c4f3d99cf02d5e53e6a531f78dcfe7c232fc986d11e1e836635dfa767cfb14a8ee5ca971904516f084f652b876b610dce99bdbf8ba963a
-
Filesize
24KB
MD5100a3cb8a1ebc976dfe690fe4f38c42c
SHA15f38876750064df0b53ee78f5e617516f9e75e0c
SHA25652412d671504989fbba509bf5e6593a9396bfbfda317080ce42e2dab689f4730
SHA5122b40552487bd980479733acb3f85a2fa1bc00ee96a2b0e6d5929a754169277c71e565d4f8a14e0383091410ea8b8789edf18d74a765833427d1d488c41789f58
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
97B
MD58cd9403da9d12872be063fa9352e1005
SHA1bba18d043d149bb801b63a5850c1b0742b4d7f44
SHA2563f560f9bca24de761e8c1a5496ebb60b5070cd6c607b3a58e91405a0d5c633b3
SHA5122aa99c5f489ffec41f35b470756eaf9f3883efa1d8ad8085f9f8f8194ddf1201fe763af8a2fb3c8be65b8956a326520d0eb60a823353ec64c4c8ed1fd72f4e29
-
C:\Users\Admin\AppData\Local\Temp\is-GH0T8.tmp\._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.tmp
Filesize3.0MB
MD5f0ad1df08f394c8ca8db69873abb3ae3
SHA15d8ce330635abd828f408bef523d4a249798d14e
SHA25624f249cccff2d5ec19df2187767f1c7c6b1171efcc9b40420b643683eaedb9ca
SHA512d7852d631bdecfda8dab7ef86606ad40c5bc0e0344d3f3d7e1658300789251a81a1c36ace9e2a36849dabaf2a676090d1e2fa99831efee3a50048eaa8eb920f9
-
\Users\Admin\AppData\Local\Temp\._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe
Filesize4.2MB
MD583968d5c91c9632cd0a90f8ca044be70
SHA13606603762ee75ad42f2b0f168c84cb8ef532494
SHA256fe95201b04461886b9381a243189a26d4150e1a64e61cb74635b681f4d6f99cd
SHA51230c2068df0f60eb6a388b6da58dd61081d578f5e017e4c12bd0f78d2865a12e00073835ae4cb4b12de3e1f97dc5edcc3332c549b4d7ac34dcac2d45a7be4932c