Analysis
-
max time kernel
111s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 23:43
Behavioral task
behavioral1
Sample
c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe
Resource
win10v2004-20241007-en
General
-
Target
c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe
-
Size
2.6MB
-
MD5
7458a184805e2e995d577d41ece13f53
-
SHA1
b0115ea082e2bc9828dfd584476641e10f836e87
-
SHA256
c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3
-
SHA512
2dc6be3c6a57046e4dbe6524365fbe091b6dfb8b2018dc764354926fd96211dcd46aa6006a0416ea4db9498134aa29550526aba88cdc0014f956de1a0415fffb
-
SSDEEP
49152:wnsHyjtk2MYC5GD++xIXVqMlQ9BxMRW/R49SPpB7vxhotliTQo4yfGw5A2t:wnsmtk2aLLlQzuW/R49SPpDQo4yfGc
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 3656 ._cache_c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe 972 Synaptics.exe 4272 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2828 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2828 EXCEL.EXE 2828 EXCEL.EXE 2828 EXCEL.EXE 2828 EXCEL.EXE 2828 EXCEL.EXE 2828 EXCEL.EXE 2828 EXCEL.EXE 2828 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5088 wrote to memory of 3656 5088 c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe 82 PID 5088 wrote to memory of 3656 5088 c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe 82 PID 5088 wrote to memory of 3656 5088 c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe 82 PID 5088 wrote to memory of 972 5088 c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe 84 PID 5088 wrote to memory of 972 5088 c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe 84 PID 5088 wrote to memory of 972 5088 c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe 84 PID 972 wrote to memory of 4272 972 Synaptics.exe 85 PID 972 wrote to memory of 4272 972 Synaptics.exe 85 PID 972 wrote to memory of 4272 972 Synaptics.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe"C:\Users\Admin\AppData\Local\Temp\c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\._cache_c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe"C:\Users\Admin\AppData\Local\Temp\._cache_c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3656
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4272
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD57458a184805e2e995d577d41ece13f53
SHA1b0115ea082e2bc9828dfd584476641e10f836e87
SHA256c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3
SHA5122dc6be3c6a57046e4dbe6524365fbe091b6dfb8b2018dc764354926fd96211dcd46aa6006a0416ea4db9498134aa29550526aba88cdc0014f956de1a0415fffb
-
C:\Users\Admin\AppData\Local\Temp\._cache_c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe
Filesize1.9MB
MD57064bc533038322c72261ae1aa27a220
SHA19e7e750d68786b918c7e89b715bf28d289ef4852
SHA2562d79edec941579e025c94d1cac84615dc4f8de5beb41987d7f5e8aa811425f48
SHA5125a4c0722b5fb7ff98beeb32db547c1fca65482eb78420335cf451b8a2ea0c8b415786a8ec3c92bc690bd4f26a067675edebac0d27bccaac1015cfa693e6b77e3
-
Filesize
25KB
MD5a1eeeb7c7073b360e425dbc01bc17ff5
SHA180d1521d016400daa8ce25eb3e57dac146069fde
SHA256d6a7c31342d5eb780875627b92fb00049f5320b2c038e88c22bd84fb217d29fc
SHA512256f1a5f63f2e91e8f29c246f27a21858e98c594d6a477d4adca45c4f0f33acedc3c9c4f609a3c4f6d3e4bc6eebc89338049d7445842a8731b3bdf1ccdeb7f8a
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04