Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 01:25
Behavioral task
behavioral1
Sample
d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe
Resource
win10v2004-20241007-en
General
-
Target
d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe
-
Size
842KB
-
MD5
3d39588fc7fe2010b69b873c6af0f953
-
SHA1
8f7215b5934dc92a091fbe271ce20fec0958dbe9
-
SHA256
d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2
-
SHA512
6dba29d847639a14e56e868e83ce7a46889693a5b600be6f3de89d42f49bef68950c2c05810aa7afc3c35a2a4f316a8ef286ab9a51357d781f2930242cdeb976
-
SSDEEP
12288:hMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9SptXvxUAqYfj:hnsJ39LyjbJkQFMhmC+6GD9WtXv
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 5084 ._cache_d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe 4668 Synaptics.exe 1796 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3656 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3656 EXCEL.EXE 3656 EXCEL.EXE 3656 EXCEL.EXE 3656 EXCEL.EXE 3656 EXCEL.EXE 3656 EXCEL.EXE 3656 EXCEL.EXE 3656 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 372 wrote to memory of 5084 372 d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe 83 PID 372 wrote to memory of 5084 372 d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe 83 PID 372 wrote to memory of 5084 372 d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe 83 PID 372 wrote to memory of 4668 372 d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe 84 PID 372 wrote to memory of 4668 372 d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe 84 PID 372 wrote to memory of 4668 372 d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe 84 PID 4668 wrote to memory of 1796 4668 Synaptics.exe 85 PID 4668 wrote to memory of 1796 4668 Synaptics.exe 85 PID 4668 wrote to memory of 1796 4668 Synaptics.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe"C:\Users\Admin\AppData\Local\Temp\d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Local\Temp\._cache_d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe"C:\Users\Admin\AppData\Local\Temp\._cache_d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5084
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1796
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
842KB
MD53d39588fc7fe2010b69b873c6af0f953
SHA18f7215b5934dc92a091fbe271ce20fec0958dbe9
SHA256d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2
SHA5126dba29d847639a14e56e868e83ce7a46889693a5b600be6f3de89d42f49bef68950c2c05810aa7afc3c35a2a4f316a8ef286ab9a51357d781f2930242cdeb976
-
C:\Users\Admin\AppData\Local\Temp\._cache_d2c46913d72ec99b6e62e9dc1eb4b01882c33a37c209f117d2639cf4144331e2.exe
Filesize88KB
MD5187df9bce5dccd678827ddfef3e2ded5
SHA1c11d6776bcd0cebd227cdb2b8d5ec01921461e35
SHA25693f3e1a24eb49712e1cda2bf867d8f5ab693d9d5eb3368c5803e432f0651863e
SHA51288a4a70d7c6574146379c44b12f3b16d71b8f51e5e84adb6afddfd6350975e4250d4911bc16ebf1978ac4e956bcb63c44ea25ffe977d878133345e711439a92f
-
Filesize
21KB
MD5551f0bbdccaa4cebfa5f8393e28ad504
SHA1ecef9c496c9a95e81d69d678e70d1d364ad4b588
SHA2569575341c3fb5f59189e694c9be683e88aae3d1dbd7f7d314f29e5ab2860a23d2
SHA512cf244fe695208bd4398be3856f59995b32775c67271231b2df8681101f1a398f60395f843dc9618ca4daae64d1faebd48cfb232edbba412f0d4366bd73d0bfd2
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04