Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 04:04
Behavioral task
behavioral1
Sample
eb2565115beed9ed0087f37bfdbf8c22261c255321b5405455f0ef5afbe4c002.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb2565115beed9ed0087f37bfdbf8c22261c255321b5405455f0ef5afbe4c002.exe
Resource
win10v2004-20241007-en
General
-
Target
eb2565115beed9ed0087f37bfdbf8c22261c255321b5405455f0ef5afbe4c002.exe
-
Size
2.3MB
-
MD5
9d60a6eaaff703efb95ace1da0bf4101
-
SHA1
b2757850734116e5d2f6215037e2405f99b55418
-
SHA256
eb2565115beed9ed0087f37bfdbf8c22261c255321b5405455f0ef5afbe4c002
-
SHA512
c94e7f0867e2db89f8ae2323a4896954a86a7e0b8fd7539135941ab038f54211856363aff6c953b21a9eefc63a292349361fc9a47b2986d6c9409e3ae4ee53de
-
SSDEEP
49152:qnsHyjtk2MYC5GDALR497XKs9alTxhSL4:qnsmtk2a1R4Ras8ML4
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
resource behavioral1/files/0x000a000000016241-101.dat -
Executes dropped EXE 3 IoCs
pid Process 1264 ._cache_eb2565115beed9ed0087f37bfdbf8c22261c255321b5405455f0ef5afbe4c002.exe 2304 Synaptics.exe 2932 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 2388 eb2565115beed9ed0087f37bfdbf8c22261c255321b5405455f0ef5afbe4c002.exe 2388 eb2565115beed9ed0087f37bfdbf8c22261c255321b5405455f0ef5afbe4c002.exe 2388 eb2565115beed9ed0087f37bfdbf8c22261c255321b5405455f0ef5afbe4c002.exe 2388 eb2565115beed9ed0087f37bfdbf8c22261c255321b5405455f0ef5afbe4c002.exe 2304 Synaptics.exe 2304 Synaptics.exe 2304 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" eb2565115beed9ed0087f37bfdbf8c22261c255321b5405455f0ef5afbe4c002.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb2565115beed9ed0087f37bfdbf8c22261c255321b5405455f0ef5afbe4c002.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2892 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2892 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2388 wrote to memory of 1264 2388 eb2565115beed9ed0087f37bfdbf8c22261c255321b5405455f0ef5afbe4c002.exe 30 PID 2388 wrote to memory of 1264 2388 eb2565115beed9ed0087f37bfdbf8c22261c255321b5405455f0ef5afbe4c002.exe 30 PID 2388 wrote to memory of 1264 2388 eb2565115beed9ed0087f37bfdbf8c22261c255321b5405455f0ef5afbe4c002.exe 30 PID 2388 wrote to memory of 1264 2388 eb2565115beed9ed0087f37bfdbf8c22261c255321b5405455f0ef5afbe4c002.exe 30 PID 2388 wrote to memory of 2304 2388 eb2565115beed9ed0087f37bfdbf8c22261c255321b5405455f0ef5afbe4c002.exe 32 PID 2388 wrote to memory of 2304 2388 eb2565115beed9ed0087f37bfdbf8c22261c255321b5405455f0ef5afbe4c002.exe 32 PID 2388 wrote to memory of 2304 2388 eb2565115beed9ed0087f37bfdbf8c22261c255321b5405455f0ef5afbe4c002.exe 32 PID 2388 wrote to memory of 2304 2388 eb2565115beed9ed0087f37bfdbf8c22261c255321b5405455f0ef5afbe4c002.exe 32 PID 2304 wrote to memory of 2932 2304 Synaptics.exe 33 PID 2304 wrote to memory of 2932 2304 Synaptics.exe 33 PID 2304 wrote to memory of 2932 2304 Synaptics.exe 33 PID 2304 wrote to memory of 2932 2304 Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb2565115beed9ed0087f37bfdbf8c22261c255321b5405455f0ef5afbe4c002.exe"C:\Users\Admin\AppData\Local\Temp\eb2565115beed9ed0087f37bfdbf8c22261c255321b5405455f0ef5afbe4c002.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\._cache_eb2565115beed9ed0087f37bfdbf8c22261c255321b5405455f0ef5afbe4c002.exe"C:\Users\Admin\AppData\Local\Temp\._cache_eb2565115beed9ed0087f37bfdbf8c22261c255321b5405455f0ef5afbe4c002.exe"2⤵
- Executes dropped EXE
PID:1264
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2932
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD59d60a6eaaff703efb95ace1da0bf4101
SHA1b2757850734116e5d2f6215037e2405f99b55418
SHA256eb2565115beed9ed0087f37bfdbf8c22261c255321b5405455f0ef5afbe4c002
SHA512c94e7f0867e2db89f8ae2323a4896954a86a7e0b8fd7539135941ab038f54211856363aff6c953b21a9eefc63a292349361fc9a47b2986d6c9409e3ae4ee53de
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
23KB
MD537eee00d0ed742af5b173f8897ea6674
SHA197651cba923e45c1074d39100b3f08fb10c6a33d
SHA2562f60bf8b46326beefcfd294e6a6f92da988ce35f2529eaae3c670ee648e8500f
SHA51252a3bbc9e9d6770d2b3481d5ac0dafd50ed06098d5f51a33dadd001c5b7c37526d612b16c463c33fe467e32000b0901b79205b556c2a70bcaa4ef8d4a511aa83
-
Filesize
21KB
MD54e81b096a84779e1349c5bb24e7260b8
SHA13f170d2b018dd195f04cbf069278083fe9116d02
SHA256d54ee512ebfd3588d3af0dfd6e800f2bbd4efc5b9e32fa6dee8cd72b0e5fb55b
SHA5127c1520b272877dcfb4dd1830b6ffba2037d836c609e6da47bf5c043fb4271bf4ae900625b95c5388c84e5e84e7ba059f62a288e3100acd6d7e8f291635a96cd3
-
Filesize
25KB
MD5f035fe72dd935899f0cadacdfd5ef7ce
SHA10b456a51d1842e8acfda2dcadbc117b9fef5ce9d
SHA256205278308ffa599230605ce437e855048dd8fb7f3a22aaaa9965bebaae803a85
SHA512b1a020257240672988c8690caea4bd8ba936ad6a1cb181dae505cc2e7916ca453801dc0e80c60bb342267e96282c5c05224b9d8e80bdf9ca26ac4ba639063411
-
Filesize
21KB
MD57deb26c5f96be961552f46f2872f2216
SHA18f37a3a2093eedcb699967a0e0f8b6f829750075
SHA256061c6c0b52aca8f1c86f995613950d6b20fec7cb17ffc935024d669f429627cf
SHA512e2a6c681c1220d375e94ac220a70ebc450b3d0ace0014b1cd9bc607fe06f0752e0d86a4af7060e0cdb4dd75f75e9d103fcc98917c89de8e0636068bdac264908
-
Filesize
26KB
MD5e7d1f8ed0fcbaae96e8495f57c290989
SHA1b3a5e9876a5a2b54558db747c821f327c0b90664
SHA2560f18e94d3a4f00bb9a2b32003a21e5f17f482c1267562af4fe52e1909be9ddc2
SHA5128871c0372d3a43478449c911fc577aa333664fa88d7da10529200ba36e97a8bf61867eefa32ca7288828093fc21b8c13ea03dabcb62c877639bcd77048f3950a
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
\Users\Admin\AppData\Local\Temp\._cache_eb2565115beed9ed0087f37bfdbf8c22261c255321b5405455f0ef5afbe4c002.exe
Filesize1.6MB
MD58893640fa6208e20adbd2249bacc1817
SHA1a8c3248f11e24a6b3b85255450bf7b294780c4fb
SHA25689cd293569093a1606143876a978f2daa19151c27bdfb7d6b7a6235371b8f9b6
SHA5120f8033bb9acf706b2bc784b72527d69f0c8cf4a167e084b4d6560d5b628be4fd3c04df80c7b51d3f180b2a3351b8a5494d8a5b42cdd304784196fe07f2bef74d