Analysis
-
max time kernel
111s -
max time network
106s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 07:39
Behavioral task
behavioral1
Sample
0a24d186e751bc024926088c5b778acf30a6a1bd97ef566a6d56e3ea94fbfadc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0a24d186e751bc024926088c5b778acf30a6a1bd97ef566a6d56e3ea94fbfadc.exe
Resource
win10v2004-20241007-en
General
-
Target
0a24d186e751bc024926088c5b778acf30a6a1bd97ef566a6d56e3ea94fbfadc.exe
-
Size
3.6MB
-
MD5
8efa1a1e48b24201fb4fb2ba4d56855e
-
SHA1
0c0af3626fb982db60e33f787e841e1c165adaba
-
SHA256
0a24d186e751bc024926088c5b778acf30a6a1bd97ef566a6d56e3ea94fbfadc
-
SHA512
8ad6ceba6edfbaacfa19c18a4ca12e08335071c808ad42977575db103c78a9f9923604e9343e191dbc2b7b62be783e224e6e953f6c88f972498321caf7199658
-
SSDEEP
49152:hnsHyjtk2MYC5GDisOzD893Cv9bdJPryVrD/nBoCUi+dgWBVtsXJE+ivAIokSa8u:hnsmtk2asF3Cv9OVrD/B+XmJwUQPP0ny
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 1452 ._cache_0a24d186e751bc024926088c5b778acf30a6a1bd97ef566a6d56e3ea94fbfadc.exe 2916 Synaptics.exe 2736 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 2408 0a24d186e751bc024926088c5b778acf30a6a1bd97ef566a6d56e3ea94fbfadc.exe 2408 0a24d186e751bc024926088c5b778acf30a6a1bd97ef566a6d56e3ea94fbfadc.exe 2408 0a24d186e751bc024926088c5b778acf30a6a1bd97ef566a6d56e3ea94fbfadc.exe 2408 0a24d186e751bc024926088c5b778acf30a6a1bd97ef566a6d56e3ea94fbfadc.exe 2916 Synaptics.exe 2916 Synaptics.exe 2916 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 0a24d186e751bc024926088c5b778acf30a6a1bd97ef566a6d56e3ea94fbfadc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_0a24d186e751bc024926088c5b778acf30a6a1bd97ef566a6d56e3ea94fbfadc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0a24d186e751bc024926088c5b778acf30a6a1bd97ef566a6d56e3ea94fbfadc.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2608 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2608 EXCEL.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2408 wrote to memory of 1452 2408 0a24d186e751bc024926088c5b778acf30a6a1bd97ef566a6d56e3ea94fbfadc.exe 30 PID 2408 wrote to memory of 1452 2408 0a24d186e751bc024926088c5b778acf30a6a1bd97ef566a6d56e3ea94fbfadc.exe 30 PID 2408 wrote to memory of 1452 2408 0a24d186e751bc024926088c5b778acf30a6a1bd97ef566a6d56e3ea94fbfadc.exe 30 PID 2408 wrote to memory of 1452 2408 0a24d186e751bc024926088c5b778acf30a6a1bd97ef566a6d56e3ea94fbfadc.exe 30 PID 2408 wrote to memory of 1452 2408 0a24d186e751bc024926088c5b778acf30a6a1bd97ef566a6d56e3ea94fbfadc.exe 30 PID 2408 wrote to memory of 1452 2408 0a24d186e751bc024926088c5b778acf30a6a1bd97ef566a6d56e3ea94fbfadc.exe 30 PID 2408 wrote to memory of 1452 2408 0a24d186e751bc024926088c5b778acf30a6a1bd97ef566a6d56e3ea94fbfadc.exe 30 PID 2408 wrote to memory of 2916 2408 0a24d186e751bc024926088c5b778acf30a6a1bd97ef566a6d56e3ea94fbfadc.exe 31 PID 2408 wrote to memory of 2916 2408 0a24d186e751bc024926088c5b778acf30a6a1bd97ef566a6d56e3ea94fbfadc.exe 31 PID 2408 wrote to memory of 2916 2408 0a24d186e751bc024926088c5b778acf30a6a1bd97ef566a6d56e3ea94fbfadc.exe 31 PID 2408 wrote to memory of 2916 2408 0a24d186e751bc024926088c5b778acf30a6a1bd97ef566a6d56e3ea94fbfadc.exe 31 PID 2916 wrote to memory of 2736 2916 Synaptics.exe 32 PID 2916 wrote to memory of 2736 2916 Synaptics.exe 32 PID 2916 wrote to memory of 2736 2916 Synaptics.exe 32 PID 2916 wrote to memory of 2736 2916 Synaptics.exe 32 PID 2916 wrote to memory of 2736 2916 Synaptics.exe 32 PID 2916 wrote to memory of 2736 2916 Synaptics.exe 32 PID 2916 wrote to memory of 2736 2916 Synaptics.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a24d186e751bc024926088c5b778acf30a6a1bd97ef566a6d56e3ea94fbfadc.exe"C:\Users\Admin\AppData\Local\Temp\0a24d186e751bc024926088c5b778acf30a6a1bd97ef566a6d56e3ea94fbfadc.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\._cache_0a24d186e751bc024926088c5b778acf30a6a1bd97ef566a6d56e3ea94fbfadc.exe"C:\Users\Admin\AppData\Local\Temp\._cache_0a24d186e751bc024926088c5b778acf30a6a1bd97ef566a6d56e3ea94fbfadc.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1452
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2736
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD58efa1a1e48b24201fb4fb2ba4d56855e
SHA10c0af3626fb982db60e33f787e841e1c165adaba
SHA2560a24d186e751bc024926088c5b778acf30a6a1bd97ef566a6d56e3ea94fbfadc
SHA5128ad6ceba6edfbaacfa19c18a4ca12e08335071c808ad42977575db103c78a9f9923604e9343e191dbc2b7b62be783e224e6e953f6c88f972498321caf7199658
-
Filesize
23KB
MD5c9be1c3714d1da3d328310b01d98f6c0
SHA1dee42e2c7a878dd5add0448946f1ea7e14d7bb07
SHA2563bf66ccc3d7e01bae4cb7aea707df2fa41fd0f42bafbe443d2c71003f18f50e9
SHA51282bcc99966ef224d0df8701e9395cfa1fc67a4549eabfcdbdddf06eab8eb7cb26ec8c03edfdaccc846567186e246de9f6de9e363ab3128a0200cf2bf8dca52a1
-
Filesize
25KB
MD5536de2ee272606745b5d92c6772089a8
SHA1870a7cc20d8e05d7e06c847cc2cbb40d3ed55bce
SHA256fa913be9d1be962b272d709b48f687b8b252f7226be9645882f05151ae44aef0
SHA5124e10b443aa1760a459685554d8e7d98928c9803cea8c281f88ecd9775afff269c099ac56c8dee50f6b959e10484025134033077c7c503be6c32683dd0dc7c25f
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
\Users\Admin\AppData\Local\Temp\._cache_0a24d186e751bc024926088c5b778acf30a6a1bd97ef566a6d56e3ea94fbfadc.exe
Filesize2.8MB
MD52b88ab75fd6cd651d0d73d15a54bf50c
SHA18c861ffc845fa0709e20d3445cc0de58cebc3b82
SHA25645bced7f573d8aa0edd86486aaf74b3d45e69b5c75617a6bfdf62c3f19bc2db0
SHA51273767e79d84f0149bc490da4ba29c35acf924e1f42f09b8278390ea90ef0fc2748016c2622f52c1702c9f99a0e155f3e035e4f4f7d21e07dec350fc3c6d404d0