Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 01:47
Behavioral task
behavioral1
Sample
d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe
Resource
win10v2004-20241007-en
General
-
Target
d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe
-
Size
5.0MB
-
MD5
692d1308fbbc9177cbf6668c5504861b
-
SHA1
fd5b3a8dd90c6321a9d35a0605750830d078fbb5
-
SHA256
d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb
-
SHA512
74e1f759aa40395459c4f3d99cf02d5e53e6a531f78dcfe7c232fc986d11e1e836635dfa767cfb14a8ee5ca971904516f084f652b876b610dce99bdbf8ba963a
-
SSDEEP
98304:Pnsmtk2aGkLUHCga1aeKv+NrdW54qbtx/5CPDhGNAzxa8XK6FIPyr:fLqUH/aE6nW54qpxk7hGCwZ6ye
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 5 IoCs
pid Process 2100 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 2768 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.tmp 2868 Synaptics.exe 2832 ._cache_Synaptics.exe 2824 ._cache_Synaptics.tmp -
Loads dropped DLL 7 IoCs
pid Process 2404 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 2100 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 2404 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 2404 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 2868 Synaptics.exe 2868 Synaptics.exe 2832 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.tmp -
System Time Discovery 1 TTPs 2 IoCs
Adversary may gather the system time and/or time zone settings from a local or remote system.
pid Process 1956 cmd.exe 2144 cmd.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1448 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1448 EXCEL.EXE -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2100 2404 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 30 PID 2404 wrote to memory of 2100 2404 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 30 PID 2404 wrote to memory of 2100 2404 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 30 PID 2404 wrote to memory of 2100 2404 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 30 PID 2404 wrote to memory of 2100 2404 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 30 PID 2404 wrote to memory of 2100 2404 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 30 PID 2404 wrote to memory of 2100 2404 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 30 PID 2100 wrote to memory of 2768 2100 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 31 PID 2100 wrote to memory of 2768 2100 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 31 PID 2100 wrote to memory of 2768 2100 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 31 PID 2100 wrote to memory of 2768 2100 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 31 PID 2100 wrote to memory of 2768 2100 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 31 PID 2100 wrote to memory of 2768 2100 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 31 PID 2100 wrote to memory of 2768 2100 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 31 PID 2404 wrote to memory of 2868 2404 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 32 PID 2404 wrote to memory of 2868 2404 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 32 PID 2404 wrote to memory of 2868 2404 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 32 PID 2404 wrote to memory of 2868 2404 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 32 PID 2868 wrote to memory of 2832 2868 Synaptics.exe 33 PID 2868 wrote to memory of 2832 2868 Synaptics.exe 33 PID 2868 wrote to memory of 2832 2868 Synaptics.exe 33 PID 2868 wrote to memory of 2832 2868 Synaptics.exe 33 PID 2868 wrote to memory of 2832 2868 Synaptics.exe 33 PID 2868 wrote to memory of 2832 2868 Synaptics.exe 33 PID 2868 wrote to memory of 2832 2868 Synaptics.exe 33 PID 2832 wrote to memory of 2824 2832 ._cache_Synaptics.exe 35 PID 2832 wrote to memory of 2824 2832 ._cache_Synaptics.exe 35 PID 2832 wrote to memory of 2824 2832 ._cache_Synaptics.exe 35 PID 2832 wrote to memory of 2824 2832 ._cache_Synaptics.exe 35 PID 2832 wrote to memory of 2824 2832 ._cache_Synaptics.exe 35 PID 2832 wrote to memory of 2824 2832 ._cache_Synaptics.exe 35 PID 2832 wrote to memory of 2824 2832 ._cache_Synaptics.exe 35 PID 2824 wrote to memory of 1956 2824 ._cache_Synaptics.tmp 38 PID 2824 wrote to memory of 1956 2824 ._cache_Synaptics.tmp 38 PID 2824 wrote to memory of 1956 2824 ._cache_Synaptics.tmp 38 PID 2824 wrote to memory of 1956 2824 ._cache_Synaptics.tmp 38 PID 2768 wrote to memory of 2144 2768 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.tmp 39 PID 2768 wrote to memory of 2144 2768 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.tmp 39 PID 2768 wrote to memory of 2144 2768 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.tmp 39 PID 2768 wrote to memory of 2144 2768 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.tmp 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe"C:\Users\Admin\AppData\Local\Temp\d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe"C:\Users\Admin\AppData\Local\Temp\._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\is-PDS9E.tmp\._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.tmp"C:\Users\Admin\AppData\Local\Temp\is-PDS9E.tmp\._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.tmp" /SL5="$8019C,3559565,799744,C:\Users\Admin\AppData\Local\Temp\._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C dotnet --list-runtimes > "C:\Users\Admin\AppData\Local\Temp\is-S9NKC.tmp\dotnet.txt" 2>&14⤵
- System Location Discovery: System Language Discovery
- System Time Discovery
PID:2144
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\is-1G76G.tmp\._cache_Synaptics.tmp"C:\Users\Admin\AppData\Local\Temp\is-1G76G.tmp\._cache_Synaptics.tmp" /SL5="$401C8,3559565,799744,C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C dotnet --list-runtimes > "C:\Users\Admin\AppData\Local\Temp\is-BUHJV.tmp\dotnet.txt" 2>&15⤵
- System Location Discovery: System Language Discovery
- System Time Discovery
PID:1956
-
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.0MB
MD5692d1308fbbc9177cbf6668c5504861b
SHA1fd5b3a8dd90c6321a9d35a0605750830d078fbb5
SHA256d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb
SHA51274e1f759aa40395459c4f3d99cf02d5e53e6a531f78dcfe7c232fc986d11e1e836635dfa767cfb14a8ee5ca971904516f084f652b876b610dce99bdbf8ba963a
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
20KB
MD5f76b0d7d44b50364f8d819f8429ff280
SHA130a9b7f99a46080e1e386ae8cb1bbaddfcc12789
SHA2562ff4d02c229561497979ca946ee5ae73575442fcf3c47721613f678c2d2c2625
SHA51280312e87f4dc88872217d0ea6c5ca0e32b9f705b1132fe0e487d0a881831fd1b3ccf2b3188b53afc3bd5016e1886702d3d2ff4db945da02848f00b49a6bd43fa
-
Filesize
28KB
MD518ebd3876446ed226d39dcf27bea1758
SHA1b700b231be3127a46c5a6cf667e7bb03f97ff2e6
SHA25690a0f5521986621625702bbd11e056ff462f9fc50a491fe8162c7543da514e36
SHA5125e2c138dd48884e38b25fd3ec42e3eac9163cce6d0e242f56606dcd3357928666e3b5ca71e49b30b65f3de2cb7e0cbb068caf6d653cf7d308a74321f0d60f197
-
Filesize
97B
MD58cd9403da9d12872be063fa9352e1005
SHA1bba18d043d149bb801b63a5850c1b0742b4d7f44
SHA2563f560f9bca24de761e8c1a5496ebb60b5070cd6c607b3a58e91405a0d5c633b3
SHA5122aa99c5f489ffec41f35b470756eaf9f3883efa1d8ad8085f9f8f8194ddf1201fe763af8a2fb3c8be65b8956a326520d0eb60a823353ec64c4c8ed1fd72f4e29
-
\Users\Admin\AppData\Local\Temp\._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe
Filesize4.2MB
MD583968d5c91c9632cd0a90f8ca044be70
SHA13606603762ee75ad42f2b0f168c84cb8ef532494
SHA256fe95201b04461886b9381a243189a26d4150e1a64e61cb74635b681f4d6f99cd
SHA51230c2068df0f60eb6a388b6da58dd61081d578f5e017e4c12bd0f78d2865a12e00073835ae4cb4b12de3e1f97dc5edcc3332c549b4d7ac34dcac2d45a7be4932c
-
\Users\Admin\AppData\Local\Temp\is-PDS9E.tmp\._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.tmp
Filesize3.0MB
MD5f0ad1df08f394c8ca8db69873abb3ae3
SHA15d8ce330635abd828f408bef523d4a249798d14e
SHA25624f249cccff2d5ec19df2187767f1c7c6b1171efcc9b40420b643683eaedb9ca
SHA512d7852d631bdecfda8dab7ef86606ad40c5bc0e0344d3f3d7e1658300789251a81a1c36ace9e2a36849dabaf2a676090d1e2fa99831efee3a50048eaa8eb920f9