Analysis
-
max time kernel
111s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 21:01
Behavioral task
behavioral1
Sample
bd1ecb2d1698320a6b5cd34c8d9e0bcf81cad9b45dbd127be8d7cbfd5c0b03bcN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bd1ecb2d1698320a6b5cd34c8d9e0bcf81cad9b45dbd127be8d7cbfd5c0b03bcN.exe
Resource
win10v2004-20241007-en
General
-
Target
bd1ecb2d1698320a6b5cd34c8d9e0bcf81cad9b45dbd127be8d7cbfd5c0b03bcN.exe
-
Size
1.0MB
-
MD5
9a1b3de080103a63fab71c1d357e72a0
-
SHA1
eea63c05940b942ec96f1ec531b7c400edf26f43
-
SHA256
bd1ecb2d1698320a6b5cd34c8d9e0bcf81cad9b45dbd127be8d7cbfd5c0b03bc
-
SHA512
2d436019232440ae925dca3e07f665c85c7b65b76acfa462726795a756b9898420ca80ddfad61c89efdac1fd73c318fc8f8400d2c3003b8df8018398595e5a29
-
SSDEEP
24576:2nsJ39LyjbJkQFMhmC+6GD991ZJguSdV0hGn:2nsHyjtk2MYC5GDrJguSdV/
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2316 ._cache_bd1ecb2d1698320a6b5cd34c8d9e0bcf81cad9b45dbd127be8d7cbfd5c0b03bcN.exe 2672 Synaptics.exe 2868 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 2432 bd1ecb2d1698320a6b5cd34c8d9e0bcf81cad9b45dbd127be8d7cbfd5c0b03bcN.exe 2432 bd1ecb2d1698320a6b5cd34c8d9e0bcf81cad9b45dbd127be8d7cbfd5c0b03bcN.exe 2432 bd1ecb2d1698320a6b5cd34c8d9e0bcf81cad9b45dbd127be8d7cbfd5c0b03bcN.exe 2432 bd1ecb2d1698320a6b5cd34c8d9e0bcf81cad9b45dbd127be8d7cbfd5c0b03bcN.exe 2672 Synaptics.exe 2672 Synaptics.exe 2672 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" bd1ecb2d1698320a6b5cd34c8d9e0bcf81cad9b45dbd127be8d7cbfd5c0b03bcN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd1ecb2d1698320a6b5cd34c8d9e0bcf81cad9b45dbd127be8d7cbfd5c0b03bcN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_bd1ecb2d1698320a6b5cd34c8d9e0bcf81cad9b45dbd127be8d7cbfd5c0b03bcN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2800 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2868 ._cache_Synaptics.exe Token: 35 2868 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2800 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2316 2432 bd1ecb2d1698320a6b5cd34c8d9e0bcf81cad9b45dbd127be8d7cbfd5c0b03bcN.exe 31 PID 2432 wrote to memory of 2316 2432 bd1ecb2d1698320a6b5cd34c8d9e0bcf81cad9b45dbd127be8d7cbfd5c0b03bcN.exe 31 PID 2432 wrote to memory of 2316 2432 bd1ecb2d1698320a6b5cd34c8d9e0bcf81cad9b45dbd127be8d7cbfd5c0b03bcN.exe 31 PID 2432 wrote to memory of 2316 2432 bd1ecb2d1698320a6b5cd34c8d9e0bcf81cad9b45dbd127be8d7cbfd5c0b03bcN.exe 31 PID 2432 wrote to memory of 2672 2432 bd1ecb2d1698320a6b5cd34c8d9e0bcf81cad9b45dbd127be8d7cbfd5c0b03bcN.exe 33 PID 2432 wrote to memory of 2672 2432 bd1ecb2d1698320a6b5cd34c8d9e0bcf81cad9b45dbd127be8d7cbfd5c0b03bcN.exe 33 PID 2432 wrote to memory of 2672 2432 bd1ecb2d1698320a6b5cd34c8d9e0bcf81cad9b45dbd127be8d7cbfd5c0b03bcN.exe 33 PID 2432 wrote to memory of 2672 2432 bd1ecb2d1698320a6b5cd34c8d9e0bcf81cad9b45dbd127be8d7cbfd5c0b03bcN.exe 33 PID 2672 wrote to memory of 2868 2672 Synaptics.exe 34 PID 2672 wrote to memory of 2868 2672 Synaptics.exe 34 PID 2672 wrote to memory of 2868 2672 Synaptics.exe 34 PID 2672 wrote to memory of 2868 2672 Synaptics.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd1ecb2d1698320a6b5cd34c8d9e0bcf81cad9b45dbd127be8d7cbfd5c0b03bcN.exe"C:\Users\Admin\AppData\Local\Temp\bd1ecb2d1698320a6b5cd34c8d9e0bcf81cad9b45dbd127be8d7cbfd5c0b03bcN.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\._cache_bd1ecb2d1698320a6b5cd34c8d9e0bcf81cad9b45dbd127be8d7cbfd5c0b03bcN.exe"C:\Users\Admin\AppData\Local\Temp\._cache_bd1ecb2d1698320a6b5cd34c8d9e0bcf81cad9b45dbd127be8d7cbfd5c0b03bcN.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2316
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD59a1b3de080103a63fab71c1d357e72a0
SHA1eea63c05940b942ec96f1ec531b7c400edf26f43
SHA256bd1ecb2d1698320a6b5cd34c8d9e0bcf81cad9b45dbd127be8d7cbfd5c0b03bc
SHA5122d436019232440ae925dca3e07f665c85c7b65b76acfa462726795a756b9898420ca80ddfad61c89efdac1fd73c318fc8f8400d2c3003b8df8018398595e5a29
-
C:\Users\Admin\AppData\Local\Temp\._cache_bd1ecb2d1698320a6b5cd34c8d9e0bcf81cad9b45dbd127be8d7cbfd5c0b03bcN.exe
Filesize281KB
MD55f51c92217ed91f9c7e7b843ba02bbce
SHA10046ea0b2d1d09712242edfdec3df5c6bd485dea
SHA2560df49b2bd36e4d53f1c55f011fd94c48251aafb0f18f51b7913022beab13a72a
SHA5121578457d4e7d7ce47f7768f6d3ee98c764a066356368f4134f8a124a867bc5f43d217911d9b88da6bf6d8838d503d5f5e0ffa538a3d45eb246d30ebd2ad1836d
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
20KB
MD56ac44f4f61e8b92dd39f2d9dd5c205a0
SHA162cd882a5b7922fedffd702c119adbc293698c72
SHA25603888241280a6b73b8df9d0bedcce5f4e2514c2ecfe096b5421f0c8013bb1c82
SHA5126df57e34e2a34f471a2557e97ce628f50d6c641e2b8e5f2e1ffe93a83dff8678270057c3206e0ea4519e87e74b4809c0695c2bdbdff0e3bfd38250952db6a4ec
-
Filesize
23KB
MD5072c281f635940bf23649de7c4a35797
SHA158901892b23061ed1f07f95e2134c813fedf37c2
SHA2569fcdab0b2bee0bee0cd25130e7839a8056c5e53f61e8b53e4ce4d4ad54404012
SHA512e24c2354f9a4b6cffc814251f231f49df1b6599fa054bc8e257e9d9d831cc8c7bef12a208b0f2d0e71a9e10a18fc8a47276597e7b5c17a90df8f940086b31354
-
Filesize
22KB
MD5b05d7620f6a1947d032ce24885cbec63
SHA17489ed33b658b3761ba4debf0cfdb3e61510dc8b
SHA256196b02b186b282df336fa59308983b5d28232a58c6c8ad0d9fecf02add50951b
SHA512c57685a6c99b9067be366260d52336893ecfe8a8e17dca1eba5e821e4ef5f1a5a3942a096ca6c7f1ac4e4bfae261b82c97e25b376828a8ed998c63126d141f9a
-
Filesize
22KB
MD549946e829fba545d6fc6e50cb570528f
SHA1b242bed2d390942251ad629765d78b350b8565dc
SHA2568837978a84f22a9f088d0cbe35834cbb4b77965fc70ce359c78de8252b4f519e
SHA5125da76838f671d395b8bef372d486ea03363b78ec0b0f4e8140474b71b632c714a8dbd97010d5d565f95daa6bb903a714b073795b3da7c6272f83e3204b1f7325
-
Filesize
22KB
MD5c54f95cd2404f2a586c9d117bb3a4a16
SHA1d6ce00121201b2164848390679c46ef10a1b7ff5
SHA256b3e4193d4ea1845773d401085c5bddc655bfc86308665fe83bc58fdc7df226e9
SHA512695982be15c4cdb3f4bbf7c9f858a70c56c906f7c0b7069a24063e56cef73dd01314763bf26dc2fd7c4a641b6be0647efd3d4ed992b76a43cf4813d30c850996
-
Filesize
22KB
MD5732ea6d8dd248ddc56ecd30d0d675b93
SHA1e0a46f166f46477fc9c3628613d22370e6c448fc
SHA2566c299a344475cde2d1281c2c8ea40a2dfa6d881a24d55a5b75ea17e51008cd1d
SHA5127f8841c82a12eaffeafd15f652d8f39be38e56bf81e2928130b55b13f8078b2a3ba5a20b9f2deaf12127e69ca65b5681e811a4378b447fba47d307aeb549b7bc
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882