Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 10:49
Behavioral task
behavioral1
Sample
2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe
Resource
win10v2004-20241007-en
General
-
Target
2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe
-
Size
5.0MB
-
MD5
a48f1ff8a0fb0f605a31b7f21a7c8540
-
SHA1
8f52f64159db24c307f8390bd07f3fdc1ecb7462
-
SHA256
2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205
-
SHA512
d1220b3510ea08a5cc19e01d45de1d61b4c8c2b104fc3505b38e123d7e7550aa83ba28d75a9e2b59278efaa899747c264e11d1864096a6b0c28c7f7e294d820b
-
SSDEEP
98304:Pnsmtk2aGkLUHCga1aeKv+NrdW54qbtx/5CPDhGNAzxa8XK6FIPyp:fLqUH/aE6nW54qpxk7hGCwZ6ya
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 5 IoCs
pid Process 1800 ._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe 2108 ._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.tmp 2720 Synaptics.exe 2788 ._cache_Synaptics.exe 2484 ._cache_Synaptics.tmp -
Loads dropped DLL 7 IoCs
pid Process 1664 2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe 1800 ._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe 1664 2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe 1664 2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe 2720 Synaptics.exe 2720 Synaptics.exe 2788 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Time Discovery 1 TTPs 2 IoCs
Adversary may gather the system time and/or time zone settings from a local or remote system.
pid Process 484 cmd.exe 1276 cmd.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2168 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2168 EXCEL.EXE -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1664 wrote to memory of 1800 1664 2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe 31 PID 1664 wrote to memory of 1800 1664 2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe 31 PID 1664 wrote to memory of 1800 1664 2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe 31 PID 1664 wrote to memory of 1800 1664 2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe 31 PID 1664 wrote to memory of 1800 1664 2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe 31 PID 1664 wrote to memory of 1800 1664 2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe 31 PID 1664 wrote to memory of 1800 1664 2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe 31 PID 1800 wrote to memory of 2108 1800 ._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe 32 PID 1800 wrote to memory of 2108 1800 ._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe 32 PID 1800 wrote to memory of 2108 1800 ._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe 32 PID 1800 wrote to memory of 2108 1800 ._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe 32 PID 1800 wrote to memory of 2108 1800 ._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe 32 PID 1800 wrote to memory of 2108 1800 ._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe 32 PID 1800 wrote to memory of 2108 1800 ._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe 32 PID 1664 wrote to memory of 2720 1664 2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe 33 PID 1664 wrote to memory of 2720 1664 2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe 33 PID 1664 wrote to memory of 2720 1664 2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe 33 PID 1664 wrote to memory of 2720 1664 2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe 33 PID 2720 wrote to memory of 2788 2720 Synaptics.exe 34 PID 2720 wrote to memory of 2788 2720 Synaptics.exe 34 PID 2720 wrote to memory of 2788 2720 Synaptics.exe 34 PID 2720 wrote to memory of 2788 2720 Synaptics.exe 34 PID 2720 wrote to memory of 2788 2720 Synaptics.exe 34 PID 2720 wrote to memory of 2788 2720 Synaptics.exe 34 PID 2720 wrote to memory of 2788 2720 Synaptics.exe 34 PID 2788 wrote to memory of 2484 2788 ._cache_Synaptics.exe 36 PID 2788 wrote to memory of 2484 2788 ._cache_Synaptics.exe 36 PID 2788 wrote to memory of 2484 2788 ._cache_Synaptics.exe 36 PID 2788 wrote to memory of 2484 2788 ._cache_Synaptics.exe 36 PID 2788 wrote to memory of 2484 2788 ._cache_Synaptics.exe 36 PID 2788 wrote to memory of 2484 2788 ._cache_Synaptics.exe 36 PID 2788 wrote to memory of 2484 2788 ._cache_Synaptics.exe 36 PID 2484 wrote to memory of 1276 2484 ._cache_Synaptics.tmp 38 PID 2484 wrote to memory of 1276 2484 ._cache_Synaptics.tmp 38 PID 2484 wrote to memory of 1276 2484 ._cache_Synaptics.tmp 38 PID 2484 wrote to memory of 1276 2484 ._cache_Synaptics.tmp 38 PID 2108 wrote to memory of 484 2108 ._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.tmp 39 PID 2108 wrote to memory of 484 2108 ._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.tmp 39 PID 2108 wrote to memory of 484 2108 ._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.tmp 39 PID 2108 wrote to memory of 484 2108 ._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.tmp 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe"C:\Users\Admin\AppData\Local\Temp\2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\is-5EGSP.tmp\._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.tmp"C:\Users\Admin\AppData\Local\Temp\is-5EGSP.tmp\._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.tmp" /SL5="$A0156,3559565,799744,C:\Users\Admin\AppData\Local\Temp\._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C dotnet --list-runtimes > "C:\Users\Admin\AppData\Local\Temp\is-Q21N1.tmp\dotnet.txt" 2>&14⤵
- System Location Discovery: System Language Discovery
- System Time Discovery
PID:484
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\is-39EJ1.tmp\._cache_Synaptics.tmp"C:\Users\Admin\AppData\Local\Temp\is-39EJ1.tmp\._cache_Synaptics.tmp" /SL5="$30228,3559565,799744,C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C dotnet --list-runtimes > "C:\Users\Admin\AppData\Local\Temp\is-OS1HT.tmp\dotnet.txt" 2>&15⤵
- System Location Discovery: System Language Discovery
- System Time Discovery
PID:1276
-
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.0MB
MD5a48f1ff8a0fb0f605a31b7f21a7c8540
SHA18f52f64159db24c307f8390bd07f3fdc1ecb7462
SHA2562b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205
SHA512d1220b3510ea08a5cc19e01d45de1d61b4c8c2b104fc3505b38e123d7e7550aa83ba28d75a9e2b59278efaa899747c264e11d1864096a6b0c28c7f7e294d820b
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
C:\Users\Admin\AppData\Local\Temp\is-5EGSP.tmp\._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.tmp
Filesize3.0MB
MD5f0ad1df08f394c8ca8db69873abb3ae3
SHA15d8ce330635abd828f408bef523d4a249798d14e
SHA25624f249cccff2d5ec19df2187767f1c7c6b1171efcc9b40420b643683eaedb9ca
SHA512d7852d631bdecfda8dab7ef86606ad40c5bc0e0344d3f3d7e1658300789251a81a1c36ace9e2a36849dabaf2a676090d1e2fa99831efee3a50048eaa8eb920f9
-
Filesize
97B
MD58cd9403da9d12872be063fa9352e1005
SHA1bba18d043d149bb801b63a5850c1b0742b4d7f44
SHA2563f560f9bca24de761e8c1a5496ebb60b5070cd6c607b3a58e91405a0d5c633b3
SHA5122aa99c5f489ffec41f35b470756eaf9f3883efa1d8ad8085f9f8f8194ddf1201fe763af8a2fb3c8be65b8956a326520d0eb60a823353ec64c4c8ed1fd72f4e29
-
\Users\Admin\AppData\Local\Temp\._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe
Filesize4.2MB
MD583968d5c91c9632cd0a90f8ca044be70
SHA13606603762ee75ad42f2b0f168c84cb8ef532494
SHA256fe95201b04461886b9381a243189a26d4150e1a64e61cb74635b681f4d6f99cd
SHA51230c2068df0f60eb6a388b6da58dd61081d578f5e017e4c12bd0f78d2865a12e00073835ae4cb4b12de3e1f97dc5edcc3332c549b4d7ac34dcac2d45a7be4932c