Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16/12/2024, 23:46
Behavioral task
behavioral1
Sample
c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe
Resource
win10v2004-20241007-en
General
-
Target
c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe
-
Size
2.6MB
-
MD5
7458a184805e2e995d577d41ece13f53
-
SHA1
b0115ea082e2bc9828dfd584476641e10f836e87
-
SHA256
c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3
-
SHA512
2dc6be3c6a57046e4dbe6524365fbe091b6dfb8b2018dc764354926fd96211dcd46aa6006a0416ea4db9498134aa29550526aba88cdc0014f956de1a0415fffb
-
SSDEEP
49152:wnsHyjtk2MYC5GD++xIXVqMlQ9BxMRW/R49SPpB7vxhotliTQo4yfGw5A2t:wnsmtk2aLLlQzuW/R49SPpDQo4yfGc
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2748 ._cache_c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe 2920 Synaptics.exe 2316 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 2648 c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe 2648 c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe 2648 c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe 2648 c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe 2920 Synaptics.exe 2920 Synaptics.exe 2920 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1948 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1948 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2748 2648 c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe 30 PID 2648 wrote to memory of 2748 2648 c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe 30 PID 2648 wrote to memory of 2748 2648 c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe 30 PID 2648 wrote to memory of 2748 2648 c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe 30 PID 2648 wrote to memory of 2920 2648 c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe 32 PID 2648 wrote to memory of 2920 2648 c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe 32 PID 2648 wrote to memory of 2920 2648 c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe 32 PID 2648 wrote to memory of 2920 2648 c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe 32 PID 2920 wrote to memory of 2316 2920 Synaptics.exe 33 PID 2920 wrote to memory of 2316 2920 Synaptics.exe 33 PID 2920 wrote to memory of 2316 2920 Synaptics.exe 33 PID 2920 wrote to memory of 2316 2920 Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe"C:\Users\Admin\AppData\Local\Temp\c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\._cache_c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe"C:\Users\Admin\AppData\Local\Temp\._cache_c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe"2⤵
- Executes dropped EXE
PID:2748
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2316
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD57458a184805e2e995d577d41ece13f53
SHA1b0115ea082e2bc9828dfd584476641e10f836e87
SHA256c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3
SHA5122dc6be3c6a57046e4dbe6524365fbe091b6dfb8b2018dc764354926fd96211dcd46aa6006a0416ea4db9498134aa29550526aba88cdc0014f956de1a0415fffb
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
24KB
MD597100159161626328a31ccf7a2c80612
SHA1b4a47a3d66f0fba542c2e1c18e63ba719f39ad86
SHA256663a36a53f0d6f25d1fa2fdf5d368aac5839b4fdef99d92207b13fd070744c9e
SHA512a0e51d20314efde498383f747560d04e58871e093ce15223eecb41c131cdda3fa080762e522a08906d7addde7410817dc9c5e01c29957895f22f91e169401bcb
-
Filesize
26KB
MD539bf995a99b70be10065158d6b0a41e0
SHA121337b94728aa23bbf039228c6a1a8f29165145b
SHA256123665c6a1604cf1333f16d9366c641aa8b3f070fd8851e66e61b6b1810c1425
SHA5124f6ced5d083ca06ba6fecbb90af5ba7fb8ff61ade7b2cfaacf27fcea9785bcaf39ae4ef6f4d2e9e6ed582e14915bc3730967ddbc8cf69ab84d0db8c7111a93ab
-
Filesize
27KB
MD573cec6f65a2f2cfb2ed83840ebf37523
SHA16e4f43847dcd47d3fec1ac8693cb041785168732
SHA256828171c0134bf4f0de3880eb6a000a8cb67c8de8f4b4cbe89165f5391f1a5a54
SHA512e56a0bb72d41f81431042e52a46c15d369d08ed5f7ea45c1839188230190995241052564fa714129c7658f87a3f7d84d9bd5c3fa6385103210bc05107f4f1c88
-
Filesize
26KB
MD522b48a16afcdfb40097c360db2a364e8
SHA12ac03e1a8fbf987568778183d5284be4947cedfa
SHA25675fc123ab065dfb7338c6063759d771c06f441000f832e9a4743cf708a914aa3
SHA512e73ba1c46dc8795b3c1f461286f279759fb0c9725ed61bdf1f987f418b6d74fec04c14f80fd7c5a70209e60b291cea7051a9822da9049d1a5a6b9a6325a60926
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
\Users\Admin\AppData\Local\Temp\._cache_c423541994bded6860c3e90f00202cf498c3d433575493d49c9f9f8ce44dedd3.exe
Filesize1.9MB
MD57064bc533038322c72261ae1aa27a220
SHA19e7e750d68786b918c7e89b715bf28d289ef4852
SHA2562d79edec941579e025c94d1cac84615dc4f8de5beb41987d7f5e8aa811425f48
SHA5125a4c0722b5fb7ff98beeb32db547c1fca65482eb78420335cf451b8a2ea0c8b415786a8ec3c92bc690bd4f26a067675edebac0d27bccaac1015cfa693e6b77e3