Analysis
-
max time kernel
114s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 10:49
Behavioral task
behavioral1
Sample
2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe
Resource
win10v2004-20241007-en
General
-
Target
2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe
-
Size
5.0MB
-
MD5
a48f1ff8a0fb0f605a31b7f21a7c8540
-
SHA1
8f52f64159db24c307f8390bd07f3fdc1ecb7462
-
SHA256
2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205
-
SHA512
d1220b3510ea08a5cc19e01d45de1d61b4c8c2b104fc3505b38e123d7e7550aa83ba28d75a9e2b59278efaa899747c264e11d1864096a6b0c28c7f7e294d820b
-
SSDEEP
98304:Pnsmtk2aGkLUHCga1aeKv+NrdW54qbtx/5CPDhGNAzxa8XK6FIPyp:fLqUH/aE6nW54qpxk7hGCwZ6ya
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 5 IoCs
pid Process 4556 ._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe 3204 ._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.tmp 3904 Synaptics.exe 2800 ._cache_Synaptics.exe 1544 ._cache_Synaptics.tmp -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
System Time Discovery 1 TTPs 4 IoCs
Adversary may gather the system time and/or time zone settings from a local or remote system.
pid Process 1932 dotnet.exe 4788 cmd.exe 4736 cmd.exe 1156 dotnet.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4188 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4188 EXCEL.EXE 4188 EXCEL.EXE 4188 EXCEL.EXE 4188 EXCEL.EXE 4188 EXCEL.EXE 4188 EXCEL.EXE 4188 EXCEL.EXE 4188 EXCEL.EXE -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 3296 wrote to memory of 4556 3296 2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe 82 PID 3296 wrote to memory of 4556 3296 2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe 82 PID 3296 wrote to memory of 4556 3296 2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe 82 PID 4556 wrote to memory of 3204 4556 ._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe 83 PID 4556 wrote to memory of 3204 4556 ._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe 83 PID 4556 wrote to memory of 3204 4556 ._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe 83 PID 3296 wrote to memory of 3904 3296 2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe 84 PID 3296 wrote to memory of 3904 3296 2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe 84 PID 3296 wrote to memory of 3904 3296 2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe 84 PID 3904 wrote to memory of 2800 3904 Synaptics.exe 85 PID 3904 wrote to memory of 2800 3904 Synaptics.exe 85 PID 3904 wrote to memory of 2800 3904 Synaptics.exe 85 PID 2800 wrote to memory of 1544 2800 ._cache_Synaptics.exe 87 PID 2800 wrote to memory of 1544 2800 ._cache_Synaptics.exe 87 PID 2800 wrote to memory of 1544 2800 ._cache_Synaptics.exe 87 PID 1544 wrote to memory of 4788 1544 ._cache_Synaptics.tmp 93 PID 1544 wrote to memory of 4788 1544 ._cache_Synaptics.tmp 93 PID 1544 wrote to memory of 4788 1544 ._cache_Synaptics.tmp 93 PID 3204 wrote to memory of 4736 3204 ._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.tmp 95 PID 3204 wrote to memory of 4736 3204 ._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.tmp 95 PID 3204 wrote to memory of 4736 3204 ._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.tmp 95 PID 4788 wrote to memory of 1156 4788 cmd.exe 97 PID 4788 wrote to memory of 1156 4788 cmd.exe 97 PID 4736 wrote to memory of 1932 4736 cmd.exe 98 PID 4736 wrote to memory of 1932 4736 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe"C:\Users\Admin\AppData\Local\Temp\2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\is-RL1VL.tmp\._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.tmp"C:\Users\Admin\AppData\Local\Temp\is-RL1VL.tmp\._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.tmp" /SL5="$C004C,3559565,799744,C:\Users\Admin\AppData\Local\Temp\._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C dotnet --list-runtimes > "C:\Users\Admin\AppData\Local\Temp\is-KTCKQ.tmp\dotnet.txt" 2>&14⤵
- System Location Discovery: System Language Discovery
- System Time Discovery
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Program Files\dotnet\dotnet.exedotnet --list-runtimes5⤵
- System Time Discovery
PID:1932
-
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\is-ALG27.tmp\._cache_Synaptics.tmp"C:\Users\Admin\AppData\Local\Temp\is-ALG27.tmp\._cache_Synaptics.tmp" /SL5="$70238,3559565,799744,C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C dotnet --list-runtimes > "C:\Users\Admin\AppData\Local\Temp\is-JGKVS.tmp\dotnet.txt" 2>&15⤵
- System Location Discovery: System Language Discovery
- System Time Discovery
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Program Files\dotnet\dotnet.exedotnet --list-runtimes6⤵
- System Time Discovery
PID:1156
-
-
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.0MB
MD5a48f1ff8a0fb0f605a31b7f21a7c8540
SHA18f52f64159db24c307f8390bd07f3fdc1ecb7462
SHA2562b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205
SHA512d1220b3510ea08a5cc19e01d45de1d61b4c8c2b104fc3505b38e123d7e7550aa83ba28d75a9e2b59278efaa899747c264e11d1864096a6b0c28c7f7e294d820b
-
C:\Users\Admin\AppData\Local\Temp\._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.exe
Filesize4.2MB
MD583968d5c91c9632cd0a90f8ca044be70
SHA13606603762ee75ad42f2b0f168c84cb8ef532494
SHA256fe95201b04461886b9381a243189a26d4150e1a64e61cb74635b681f4d6f99cd
SHA51230c2068df0f60eb6a388b6da58dd61081d578f5e017e4c12bd0f78d2865a12e00073835ae4cb4b12de3e1f97dc5edcc3332c549b4d7ac34dcac2d45a7be4932c
-
Filesize
21KB
MD5b92f7762d73e529cfb02dad87e1b010e
SHA118f7055f9715c47725d0177c032eb47a8c023e2d
SHA2561cc487528a0bd7af9851b93f1ecdd6b52d85fb099e118abb4d610168792fec44
SHA5129ede7e17dbc478710c0f1d1ecf699f27830ec00fce5c13b09b1c13afa8cc40334ed56c460033ff1a2334f75ced9c5c7caf892e8557674f728b82ba532284ce1d
-
Filesize
550B
MD57c0ca124b478c82d12bc7b31098573a7
SHA16bd2dad140dc7f2baee34804ebf66868b0a20728
SHA2568d3fb6137fbe6c91f31cd9c01795736adfce7d0535c65dfa77160c85dc60e82f
SHA512b6fd96ee24b7d9f24dbb33c06b7f68fa14859f119280c1df45ee86f959dd3c4a4d8e1a544b645f0b6993a2679478ec3d00ef1a559cb8c19df7cf45b324f8812a
-
C:\Users\Admin\AppData\Local\Temp\is-RL1VL.tmp\._cache_2b0589ae1fd9ec761d562a5f01d0794a194c5079ec56394d79d0d538058d4205N.tmp
Filesize3.0MB
MD5f0ad1df08f394c8ca8db69873abb3ae3
SHA15d8ce330635abd828f408bef523d4a249798d14e
SHA25624f249cccff2d5ec19df2187767f1c7c6b1171efcc9b40420b643683eaedb9ca
SHA512d7852d631bdecfda8dab7ef86606ad40c5bc0e0344d3f3d7e1658300789251a81a1c36ace9e2a36849dabaf2a676090d1e2fa99831efee3a50048eaa8eb920f9
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04