Analysis
-
max time kernel
146s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 01:47
Behavioral task
behavioral1
Sample
d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe
Resource
win10v2004-20241007-en
General
-
Target
d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe
-
Size
5.0MB
-
MD5
692d1308fbbc9177cbf6668c5504861b
-
SHA1
fd5b3a8dd90c6321a9d35a0605750830d078fbb5
-
SHA256
d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb
-
SHA512
74e1f759aa40395459c4f3d99cf02d5e53e6a531f78dcfe7c232fc986d11e1e836635dfa767cfb14a8ee5ca971904516f084f652b876b610dce99bdbf8ba963a
-
SSDEEP
98304:Pnsmtk2aGkLUHCga1aeKv+NrdW54qbtx/5CPDhGNAzxa8XK6FIPyr:fLqUH/aE6nW54qpxk7hGCwZ6ye
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 5 IoCs
pid Process 1088 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 3656 Synaptics.exe 4512 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.tmp 4036 ._cache_Synaptics.exe 372 ._cache_Synaptics.tmp -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
System Time Discovery 1 TTPs 4 IoCs
Adversary may gather the system time and/or time zone settings from a local or remote system.
pid Process 4552 dotnet.exe 4236 dotnet.exe 3612 cmd.exe 948 cmd.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5116 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 5116 EXCEL.EXE 5116 EXCEL.EXE 5116 EXCEL.EXE 5116 EXCEL.EXE 5116 EXCEL.EXE 5116 EXCEL.EXE 5116 EXCEL.EXE 5116 EXCEL.EXE -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2512 wrote to memory of 1088 2512 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 82 PID 2512 wrote to memory of 1088 2512 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 82 PID 2512 wrote to memory of 1088 2512 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 82 PID 2512 wrote to memory of 3656 2512 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 83 PID 2512 wrote to memory of 3656 2512 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 83 PID 2512 wrote to memory of 3656 2512 d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 83 PID 1088 wrote to memory of 4512 1088 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 84 PID 1088 wrote to memory of 4512 1088 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 84 PID 1088 wrote to memory of 4512 1088 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe 84 PID 3656 wrote to memory of 4036 3656 Synaptics.exe 85 PID 3656 wrote to memory of 4036 3656 Synaptics.exe 85 PID 3656 wrote to memory of 4036 3656 Synaptics.exe 85 PID 4036 wrote to memory of 372 4036 ._cache_Synaptics.exe 86 PID 4036 wrote to memory of 372 4036 ._cache_Synaptics.exe 86 PID 4036 wrote to memory of 372 4036 ._cache_Synaptics.exe 86 PID 372 wrote to memory of 948 372 ._cache_Synaptics.tmp 91 PID 372 wrote to memory of 948 372 ._cache_Synaptics.tmp 91 PID 372 wrote to memory of 948 372 ._cache_Synaptics.tmp 91 PID 4512 wrote to memory of 3612 4512 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.tmp 92 PID 4512 wrote to memory of 3612 4512 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.tmp 92 PID 4512 wrote to memory of 3612 4512 ._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.tmp 92 PID 3612 wrote to memory of 4552 3612 cmd.exe 97 PID 3612 wrote to memory of 4552 3612 cmd.exe 97 PID 948 wrote to memory of 4236 948 cmd.exe 96 PID 948 wrote to memory of 4236 948 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe"C:\Users\Admin\AppData\Local\Temp\d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe"C:\Users\Admin\AppData\Local\Temp\._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\is-0RKJF.tmp\._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.tmp"C:\Users\Admin\AppData\Local\Temp\is-0RKJF.tmp\._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.tmp" /SL5="$80058,3559565,799744,C:\Users\Admin\AppData\Local\Temp\._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C dotnet --list-runtimes > "C:\Users\Admin\AppData\Local\Temp\is-1M19J.tmp\dotnet.txt" 2>&14⤵
- System Location Discovery: System Language Discovery
- System Time Discovery
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Program Files\dotnet\dotnet.exedotnet --list-runtimes5⤵
- System Time Discovery
PID:4552
-
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\is-95VLD.tmp\._cache_Synaptics.tmp"C:\Users\Admin\AppData\Local\Temp\is-95VLD.tmp\._cache_Synaptics.tmp" /SL5="$701D6,3559565,799744,C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C dotnet --list-runtimes > "C:\Users\Admin\AppData\Local\Temp\is-FQJ17.tmp\dotnet.txt" 2>&15⤵
- System Location Discovery: System Language Discovery
- System Time Discovery
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Program Files\dotnet\dotnet.exedotnet --list-runtimes6⤵
- System Time Discovery
PID:4236
-
-
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.0MB
MD5692d1308fbbc9177cbf6668c5504861b
SHA1fd5b3a8dd90c6321a9d35a0605750830d078fbb5
SHA256d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb
SHA51274e1f759aa40395459c4f3d99cf02d5e53e6a531f78dcfe7c232fc986d11e1e836635dfa767cfb14a8ee5ca971904516f084f652b876b610dce99bdbf8ba963a
-
C:\Users\Admin\AppData\Local\Temp\._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.exe
Filesize4.2MB
MD583968d5c91c9632cd0a90f8ca044be70
SHA13606603762ee75ad42f2b0f168c84cb8ef532494
SHA256fe95201b04461886b9381a243189a26d4150e1a64e61cb74635b681f4d6f99cd
SHA51230c2068df0f60eb6a388b6da58dd61081d578f5e017e4c12bd0f78d2865a12e00073835ae4cb4b12de3e1f97dc5edcc3332c549b4d7ac34dcac2d45a7be4932c
-
Filesize
22KB
MD5804eb6f059d21ee9d8d215a69e5b849e
SHA105fe8196da99a3f41168ce1bf95cc1feac0f5afc
SHA2560ff8cd735ceef75e1a5a87c64ec6e21beec83a31098ec8ff887c7aedff24f7ae
SHA512c0e425cc7bac8249b4fd7ba68426efd3fee77511b63df0316eba4f4314978ad0d70ff065a7bd5060b5c4fcae5c404c0e323656b1c33f3730d2e11ba923ca55de
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
C:\Users\Admin\AppData\Local\Temp\is-0RKJF.tmp\._cache_d2742c8cb1a0c6ba3972c391ee7d64a25e0fb82007696a2ac357bf593c2a02cb.tmp
Filesize3.0MB
MD5f0ad1df08f394c8ca8db69873abb3ae3
SHA15d8ce330635abd828f408bef523d4a249798d14e
SHA25624f249cccff2d5ec19df2187767f1c7c6b1171efcc9b40420b643683eaedb9ca
SHA512d7852d631bdecfda8dab7ef86606ad40c5bc0e0344d3f3d7e1658300789251a81a1c36ace9e2a36849dabaf2a676090d1e2fa99831efee3a50048eaa8eb920f9
-
Filesize
550B
MD57c0ca124b478c82d12bc7b31098573a7
SHA16bd2dad140dc7f2baee34804ebf66868b0a20728
SHA2568d3fb6137fbe6c91f31cd9c01795736adfce7d0535c65dfa77160c85dc60e82f
SHA512b6fd96ee24b7d9f24dbb33c06b7f68fa14859f119280c1df45ee86f959dd3c4a4d8e1a544b645f0b6993a2679478ec3d00ef1a559cb8c19df7cf45b324f8812a