Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 02:15
Behavioral task
behavioral1
Sample
bcf974cbd26f9d1657ddb543b51d19a8481a5e0a6ec5145d5c2eb1f41eb50526.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
bcf974cbd26f9d1657ddb543b51d19a8481a5e0a6ec5145d5c2eb1f41eb50526.exe
Resource
win10v2004-20241007-en
General
-
Target
bcf974cbd26f9d1657ddb543b51d19a8481a5e0a6ec5145d5c2eb1f41eb50526.exe
-
Size
2.6MB
-
MD5
88f127c51b55843302acbc911590cbec
-
SHA1
7b7ca91a80031c091e73e84608e8e913877aee14
-
SHA256
bcf974cbd26f9d1657ddb543b51d19a8481a5e0a6ec5145d5c2eb1f41eb50526
-
SHA512
d8118e5ec3b81e64854dceea034811ef6fe391ef20efc91c487b501b15102e6857c7eb9c4319defdf3fa618deb488aca2bfc22d2e6a2b83d141612e9818f7548
-
SSDEEP
49152:InsHyjtk2MYC5GDriCX7AhOnyrSpzdAWtGHD9Fp1uAFnx/f:Insmtk2aUimAhOnQWASGHiAX
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation bcf974cbd26f9d1657ddb543b51d19a8481a5e0a6ec5145d5c2eb1f41eb50526.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 5 IoCs
pid Process 3172 ._cache_bcf974cbd26f9d1657ddb543b51d19a8481a5e0a6ec5145d5c2eb1f41eb50526.exe 4240 Synaptics.exe 4772 ._cache_bcf974cbd26f9d1657ddb543b51d19a8481a5e0a6ec5145d5c2eb1f41eb50526.tmp 3476 ._cache_Synaptics.exe 3096 ._cache_Synaptics.tmp -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" bcf974cbd26f9d1657ddb543b51d19a8481a5e0a6ec5145d5c2eb1f41eb50526.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bcf974cbd26f9d1657ddb543b51d19a8481a5e0a6ec5145d5c2eb1f41eb50526.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_bcf974cbd26f9d1657ddb543b51d19a8481a5e0a6ec5145d5c2eb1f41eb50526.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_bcf974cbd26f9d1657ddb543b51d19a8481a5e0a6ec5145d5c2eb1f41eb50526.tmp -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ bcf974cbd26f9d1657ddb543b51d19a8481a5e0a6ec5145d5c2eb1f41eb50526.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4356 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4356 EXCEL.EXE 4356 EXCEL.EXE 4356 EXCEL.EXE 4356 EXCEL.EXE 4356 EXCEL.EXE 4356 EXCEL.EXE 4356 EXCEL.EXE 4356 EXCEL.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2124 wrote to memory of 3172 2124 bcf974cbd26f9d1657ddb543b51d19a8481a5e0a6ec5145d5c2eb1f41eb50526.exe 83 PID 2124 wrote to memory of 3172 2124 bcf974cbd26f9d1657ddb543b51d19a8481a5e0a6ec5145d5c2eb1f41eb50526.exe 83 PID 2124 wrote to memory of 3172 2124 bcf974cbd26f9d1657ddb543b51d19a8481a5e0a6ec5145d5c2eb1f41eb50526.exe 83 PID 2124 wrote to memory of 4240 2124 bcf974cbd26f9d1657ddb543b51d19a8481a5e0a6ec5145d5c2eb1f41eb50526.exe 84 PID 2124 wrote to memory of 4240 2124 bcf974cbd26f9d1657ddb543b51d19a8481a5e0a6ec5145d5c2eb1f41eb50526.exe 84 PID 2124 wrote to memory of 4240 2124 bcf974cbd26f9d1657ddb543b51d19a8481a5e0a6ec5145d5c2eb1f41eb50526.exe 84 PID 3172 wrote to memory of 4772 3172 ._cache_bcf974cbd26f9d1657ddb543b51d19a8481a5e0a6ec5145d5c2eb1f41eb50526.exe 85 PID 3172 wrote to memory of 4772 3172 ._cache_bcf974cbd26f9d1657ddb543b51d19a8481a5e0a6ec5145d5c2eb1f41eb50526.exe 85 PID 3172 wrote to memory of 4772 3172 ._cache_bcf974cbd26f9d1657ddb543b51d19a8481a5e0a6ec5145d5c2eb1f41eb50526.exe 85 PID 4240 wrote to memory of 3476 4240 Synaptics.exe 86 PID 4240 wrote to memory of 3476 4240 Synaptics.exe 86 PID 4240 wrote to memory of 3476 4240 Synaptics.exe 86 PID 3476 wrote to memory of 3096 3476 ._cache_Synaptics.exe 87 PID 3476 wrote to memory of 3096 3476 ._cache_Synaptics.exe 87 PID 3476 wrote to memory of 3096 3476 ._cache_Synaptics.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcf974cbd26f9d1657ddb543b51d19a8481a5e0a6ec5145d5c2eb1f41eb50526.exe"C:\Users\Admin\AppData\Local\Temp\bcf974cbd26f9d1657ddb543b51d19a8481a5e0a6ec5145d5c2eb1f41eb50526.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\._cache_bcf974cbd26f9d1657ddb543b51d19a8481a5e0a6ec5145d5c2eb1f41eb50526.exe"C:\Users\Admin\AppData\Local\Temp\._cache_bcf974cbd26f9d1657ddb543b51d19a8481a5e0a6ec5145d5c2eb1f41eb50526.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\is-Q62JO.tmp\._cache_bcf974cbd26f9d1657ddb543b51d19a8481a5e0a6ec5145d5c2eb1f41eb50526.tmp"C:\Users\Admin\AppData\Local\Temp\is-Q62JO.tmp\._cache_bcf974cbd26f9d1657ddb543b51d19a8481a5e0a6ec5145d5c2eb1f41eb50526.tmp" /SL5="$601C4,1250926,812032,C:\Users\Admin\AppData\Local\Temp\._cache_bcf974cbd26f9d1657ddb543b51d19a8481a5e0a6ec5145d5c2eb1f41eb50526.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4772
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\is-RVOQC.tmp\._cache_Synaptics.tmp"C:\Users\Admin\AppData\Local\Temp\is-RVOQC.tmp\._cache_Synaptics.tmp" /SL5="$30224,1250926,812032,C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3096
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD588f127c51b55843302acbc911590cbec
SHA17b7ca91a80031c091e73e84608e8e913877aee14
SHA256bcf974cbd26f9d1657ddb543b51d19a8481a5e0a6ec5145d5c2eb1f41eb50526
SHA512d8118e5ec3b81e64854dceea034811ef6fe391ef20efc91c487b501b15102e6857c7eb9c4319defdf3fa618deb488aca2bfc22d2e6a2b83d141612e9818f7548
-
C:\Users\Admin\AppData\Local\Temp\._cache_bcf974cbd26f9d1657ddb543b51d19a8481a5e0a6ec5145d5c2eb1f41eb50526.exe
Filesize1.9MB
MD57a466b10197e72a9b706f7035d9f5446
SHA1c0ceee18203fd98877ec1a20f4e3e7787f4ee3d8
SHA256179c16df942609d731050e4f3a1591ba5cab414f750417dc04412c508e8d24c9
SHA512afea99f3fd36844b2ab18c24853913a0587d29529bb68e63429c43aab22a59a03eec7ce40193ffd6bb6cb5579cd7edde867db5c2b09b68c85d4e2d886102f321
-
Filesize
21KB
MD5951868a52f81e8d60461c5b9c327a301
SHA13747bc284511442e59e0a2e567542aeea729627a
SHA2564706bae7393fd9651d9e5ab779131f1813af0681146dd009f6838d64387dd129
SHA512b3ba77d68ea77e0880043f170b25d80f79fd635ac031389fd50d4787db620fce7c5870e3aeb94f538979364d0b3dca1e5495b75bf1705c3b04f615191e3d3351
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
C:\Users\Admin\AppData\Local\Temp\is-Q62JO.tmp\._cache_bcf974cbd26f9d1657ddb543b51d19a8481a5e0a6ec5145d5c2eb1f41eb50526.tmp
Filesize2.5MB
MD53169ff78d0fde504a09076e94951ac68
SHA1e9ff92eace9e03a3a00d7bac40e982fe9be1d4a9
SHA2564f6695b45d7bd25059502daabe351f7043033ab2eed8271be3dc0489c653ddbb
SHA51224d67a344f698838704ab4b870ab9caa9dbfbba8b6eb96a88805a57dcf3d84385f1178257078e5d956d8fca48ee4e8dac49ff6029a2e7d362fcf1f81df318b89