Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
08-12-2024 18:04
Behavioral task
behavioral1
Sample
Temp Free.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Temp Free.exe
Resource
win10v2004-20241007-en
General
-
Target
Temp Free.exe
-
Size
1000KB
-
MD5
cc5f51201874052f462618399a629d74
-
SHA1
8ad3924bc4311e1ae4f94036c0febf90bd33d91d
-
SHA256
896f987e0f403251ca9e03c239313ba386532ef4e4331c783753a61513dda630
-
SHA512
ca4e3579e7072e6baf140c2e2e7729a271d35d812e918d8d2807d5e2f5dfd60e10aa96f9fe2238af06b50f412c277a727889e380b3961643a27d22f23645df73
-
SSDEEP
12288:TMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V98j2W7tQJ6f+R5hj:TnsJ39LyjbJkQFMhmC+6GD9Mf+7J
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
resource behavioral1/files/0x0007000000018739-95.dat behavioral1/files/0x000a000000016d9f-107.dat behavioral1/files/0x0009000000018739-119.dat behavioral1/files/0x000b000000018739-143.dat -
Executes dropped EXE 3 IoCs
pid Process 2440 ._cache_Temp Free.exe 2852 Synaptics.exe 2844 ._cache_Synaptics.exe -
Loads dropped DLL 15 IoCs
pid Process 1720 Temp Free.exe 1720 Temp Free.exe 1720 Temp Free.exe 2852 Synaptics.exe 2852 Synaptics.exe 840 WerFault.exe 1768 WerFault.exe 840 WerFault.exe 1768 WerFault.exe 840 WerFault.exe 1768 WerFault.exe 1768 WerFault.exe 840 WerFault.exe 1768 WerFault.exe 840 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" Temp Free.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1768 2844 WerFault.exe 32 840 2440 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Temp Free.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Temp Free.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2988 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2988 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2440 1720 Temp Free.exe 30 PID 1720 wrote to memory of 2440 1720 Temp Free.exe 30 PID 1720 wrote to memory of 2440 1720 Temp Free.exe 30 PID 1720 wrote to memory of 2440 1720 Temp Free.exe 30 PID 1720 wrote to memory of 2852 1720 Temp Free.exe 31 PID 1720 wrote to memory of 2852 1720 Temp Free.exe 31 PID 1720 wrote to memory of 2852 1720 Temp Free.exe 31 PID 1720 wrote to memory of 2852 1720 Temp Free.exe 31 PID 2852 wrote to memory of 2844 2852 Synaptics.exe 32 PID 2852 wrote to memory of 2844 2852 Synaptics.exe 32 PID 2852 wrote to memory of 2844 2852 Synaptics.exe 32 PID 2852 wrote to memory of 2844 2852 Synaptics.exe 32 PID 2844 wrote to memory of 1768 2844 ._cache_Synaptics.exe 34 PID 2844 wrote to memory of 1768 2844 ._cache_Synaptics.exe 34 PID 2844 wrote to memory of 1768 2844 ._cache_Synaptics.exe 34 PID 2844 wrote to memory of 1768 2844 ._cache_Synaptics.exe 34 PID 2440 wrote to memory of 840 2440 ._cache_Temp Free.exe 35 PID 2440 wrote to memory of 840 2440 ._cache_Temp Free.exe 35 PID 2440 wrote to memory of 840 2440 ._cache_Temp Free.exe 35 PID 2440 wrote to memory of 840 2440 ._cache_Temp Free.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Temp Free.exe"C:\Users\Admin\AppData\Local\Temp\Temp Free.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\._cache_Temp Free.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Temp Free.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2440 -s 6243⤵
- Loads dropped DLL
- Program crash
PID:840
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 6244⤵
- Loads dropped DLL
- Program crash
PID:1768
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD5cc5f51201874052f462618399a629d74
SHA18ad3924bc4311e1ae4f94036c0febf90bd33d91d
SHA256896f987e0f403251ca9e03c239313ba386532ef4e4331c783753a61513dda630
SHA512ca4e3579e7072e6baf140c2e2e7729a271d35d812e918d8d2807d5e2f5dfd60e10aa96f9fe2238af06b50f412c277a727889e380b3961643a27d22f23645df73
-
Filesize
22KB
MD5aca57003d260728e5eaac76a03b6907e
SHA1215e0cb22041f55db750d0a9a1c616278e63084c
SHA256bdd04e0ed924088c24be3e2699d952587fbedd5d793276f46f09461cc7423d6e
SHA5127c9eb0277a394f55e54519e6ca0634b373a22720b13358240017ce45a80f46a0cef4360204bc6c72c1fb67656d5339acd17d318db8c89b5d22dcf32677d99b13
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
22KB
MD5d865b1b01f8278f8e1d465da23ea5ee5
SHA1c274cb6417d5325cdabb867a15ec525ceef9ebf1
SHA25692ec3bf84d87ad7598ba19c20ff9e488b5582b43103caf2f0151a392a0e68313
SHA512810fbd4f83d38eb77125f136b77fb1b2f5b772334ec390e02f13ca012a8332ef3bca8546bae4228a01819756cea59d991d270984d64e656bf97b039d5fa9115d
-
Filesize
21KB
MD59867196009d75aef79a74f5238218260
SHA15864b225d761373c13c651f316c0ca4ff862c363
SHA2562d03658d77aac296a8aea272dfd3cc7ad564ef4d27fab65ec96dd8efe774ab26
SHA51200b1d068d03057702a20a63b67e539ffe4b0b19fb3d8a83bea7e7c56a465864670700bf68dee1c3c29bfc65a103c91c2bcc12482f08589d4a89834c2834c53c6
-
Filesize
24KB
MD5231208aab46f9426159c83edfc0fe972
SHA19397baf054014f6ec64defd09395a2ed21b01db0
SHA256bd6276c3f206b693f84a004c365b39139a8954fc1b108fce03b4b93a33d725bb
SHA512552bc9e862a08f1104635b169a71fb2bebdde29aadaec2d9d67fa722fac7b568e5d5c72155f681bd9ac570b18c797b632d5da77ebcf568057f2df51d55d68098
-
Filesize
23KB
MD523c43c3fe1c509e45b74ad6f0dbd1353
SHA18488179a2ba94cd388ffab2d9c7b0028c3ba6eeb
SHA2567ec141c1dd1211a6c17f70aab96abfb7cb23a8cf1e969a3537db807fee7183b9
SHA512fe7590341c46587871f8477069b4929b11e3de726e3a3c5a20edbf96f2ba51e115620c8fa0f7db5305dbf59ae223f7e8843f30affcfc50076266156330ec9af9
-
Filesize
25KB
MD5544387e9c148dbb986ea17c5f8d0ec23
SHA111e821b52e9de8965911b24dc007cfc917bcf90d
SHA2567dfbdf1e3465f3878cf73be1d79a44165205877129bf14ed8ef52a4985ec6f2d
SHA512f280b5b26292bc0a00b761b718b35d41fca994ac1c23997f7756f4c01a3b07fed1b21d4a4725d47e62bda28aae75d9c7dfd4f709589de023458622067ebccab0
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
Filesize
246KB
MD58818bfbb6f733193f987724a4f0efbd6
SHA13f2efc98effc616e99ae733cadf64262bf8e93ed
SHA2560bb4187f97b57c10dba81e80040ff237f4af881dc8061af3c6af2a31ebd43ba2
SHA512f7c6cdf9b9fac21fa7e5e8b9ff810172125f08f96719c49927ff143515442f0f7112bcdeb070cd5ea507ae8d59fcf54566acc4b9025f583166121ef996d879c6