Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 01:25
Behavioral task
behavioral1
Sample
d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe
Resource
win10v2004-20241007-en
General
-
Target
d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe
-
Size
842KB
-
MD5
3d39588fc7fe2010b69b873c6af0f953
-
SHA1
8f7215b5934dc92a091fbe271ce20fec0958dbe9
-
SHA256
d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2
-
SHA512
6dba29d847639a14e56e868e83ce7a46889693a5b600be6f3de89d42f49bef68950c2c05810aa7afc3c35a2a4f316a8ef286ab9a51357d781f2930242cdeb976
-
SSDEEP
12288:hMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9SptXvxUAqYfj:hnsJ39LyjbJkQFMhmC+6GD9WtXv
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2840 ._cache_d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe 3008 Synaptics.exe 2880 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 2008 d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe 2008 d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe 2008 d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe 3008 Synaptics.exe 3008 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2584 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2584 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2840 2008 d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe 30 PID 2008 wrote to memory of 2840 2008 d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe 30 PID 2008 wrote to memory of 2840 2008 d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe 30 PID 2008 wrote to memory of 2840 2008 d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe 30 PID 2008 wrote to memory of 3008 2008 d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe 31 PID 2008 wrote to memory of 3008 2008 d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe 31 PID 2008 wrote to memory of 3008 2008 d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe 31 PID 2008 wrote to memory of 3008 2008 d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe 31 PID 3008 wrote to memory of 2880 3008 Synaptics.exe 32 PID 3008 wrote to memory of 2880 3008 Synaptics.exe 32 PID 3008 wrote to memory of 2880 3008 Synaptics.exe 32 PID 3008 wrote to memory of 2880 3008 Synaptics.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe"C:\Users\Admin\AppData\Local\Temp\d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\._cache_d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe"C:\Users\Admin\AppData\Local\Temp\._cache_d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2840
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2880
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
842KB
MD53d39588fc7fe2010b69b873c6af0f953
SHA18f7215b5934dc92a091fbe271ce20fec0958dbe9
SHA256d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2
SHA5126dba29d847639a14e56e868e83ce7a46889693a5b600be6f3de89d42f49bef68950c2c05810aa7afc3c35a2a4f316a8ef286ab9a51357d781f2930242cdeb976
-
Filesize
21KB
MD5333605cff4b13d1b1cee9a9efb0a5d23
SHA1d5793127807e907ea80d8c053dd9c147d7e3755a
SHA2566641ce4b016caa0c0772500a39f6e8c819d6d91fd92df856ced1a14394be3683
SHA512661bad96ea6953a8831ab8462638ab8eccc6467c00e9bb8a7c5cc41d73c1e4f0e0253c05c1b246c0b4c0a99e80d4e2e283c0337478b6e40d106bc19056c530b4
-
Filesize
23KB
MD5749a50b744a9a7441478619f5395d9ba
SHA1339af074a52db272f8c36d195d5d6663bb36b92e
SHA256a2db07a9734d4896d9ed83a4782f54062cf111c98da8ded647c713b255b2eca6
SHA5124eb87ce0d1e724041679759474b545051b61ff5768692ff68798f100a7e9fc4c6105e13187a6a8bbb4afbe7422b39efd6eab385b41b8e8e4789a767c10131a4d
-
Filesize
22KB
MD5756d5d0493c2d713de532ae6014f7227
SHA18b69067bb543cd00e68ef1a34afb49e6d4af315a
SHA25630c710305a61ef86111a134eb837c580fc5ebb801d1a3db2df23c9970a91e664
SHA5121923175a81293a7008bc918a46a06f85572981440498deb1958cc76f2925c635716904e9b3c76601fb510ef1541ea795e68e45c9ec7066c4949d316e3e7aba1a
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
27KB
MD527e8fbb977e32552215cce14d4e7e507
SHA1b72f7fc374d43067bf15757c9cdb55f25b97b2b3
SHA256f7390f11e09a64f73edb89a81f1c0ed87c1b1ddfcca959e2c1f0a6682ff1415f
SHA512756b352243629ad9ee6e3893bbee50a8b0e182d73c8e8660efd338bdbac20fdf29c0c74010f68dbbfce96666aff67d80ef4cb68d8a8538a55fcede2140fd0cfe
-
Filesize
25KB
MD5d04e4149c67d625e9e9d7fd702da07c3
SHA19069ac00cd26ac9343e1970279aa3cdbf2a2d3f1
SHA2564207f7de4e1a2d1ceece1efa147455ae01b77a4a8df910dd15c1527677eaa32d
SHA51270de29d9f5a539de0bb3795b22c6fa493edc96f2dfb55718efcbcdf500baaeffb16901768bc784b3ce512fce7ea4b16081d95fd76fa277d12399cc3a3218278f
-
Filesize
24KB
MD5a8fd61ce2ed68830ee4eff3880cd71ef
SHA1bd18f8062c608d3c6abbc3246a8d497356b56ff4
SHA2565d5d340f848467484d0beb0cc8bbf68ab3eb883d33f6e43a52bfedde16cd16e3
SHA51258d618366a4a60679f83422f6846a293bbdd0e5ae3ab15b13a549b82aed8067dc716bcbf362c41a5f0d87316e6766e3edc4d398fe6404686a5e89ce5e2d71985
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
\Users\Admin\AppData\Local\Temp\._cache_d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe
Filesize88KB
MD5187df9bce5dccd678827ddfef3e2ded5
SHA1c11d6776bcd0cebd227cdb2b8d5ec01921461e35
SHA25693f3e1a24eb49712e1cda2bf867d8f5ab693d9d5eb3368c5803e432f0651863e
SHA51288a4a70d7c6574146379c44b12f3b16d71b8f51e5e84adb6afddfd6350975e4250d4911bc16ebf1978ac4e956bcb63c44ea25ffe977d878133345e711439a92f