Analysis
-
max time kernel
110s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 00:27
Behavioral task
behavioral1
Sample
37de45226117a1f1476ebe6ea9054bace309ea8340f3119a976c20b91670e530N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
37de45226117a1f1476ebe6ea9054bace309ea8340f3119a976c20b91670e530N.exe
Resource
win10v2004-20241007-en
General
-
Target
37de45226117a1f1476ebe6ea9054bace309ea8340f3119a976c20b91670e530N.exe
-
Size
758KB
-
MD5
6cf2b1f13ed4b40c2af999833890fcb0
-
SHA1
f4ffd759c73732e84855a5bcea8b0199889e8028
-
SHA256
37de45226117a1f1476ebe6ea9054bace309ea8340f3119a976c20b91670e530
-
SHA512
14680a0750ca865f8d5e70bc36bcc9a5dfa623e04f38a5a3b824e64d947af76aab8778428600956a471dfae609d0a8c56123a76fdfe1af6eba393426c561998c
-
SSDEEP
12288:mMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9ixj:mnsJ39LyjbJkQFMhmC+6GD9I
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 1952 ._cache_37de45226117a1f1476ebe6ea9054bace309ea8340f3119a976c20b91670e530N.exe 1112 Synaptics.exe 3060 ._cache_Synaptics.exe -
Loads dropped DLL 15 IoCs
pid Process 2120 37de45226117a1f1476ebe6ea9054bace309ea8340f3119a976c20b91670e530N.exe 2120 37de45226117a1f1476ebe6ea9054bace309ea8340f3119a976c20b91670e530N.exe 2120 37de45226117a1f1476ebe6ea9054bace309ea8340f3119a976c20b91670e530N.exe 1112 Synaptics.exe 1112 Synaptics.exe 2736 WerFault.exe 2736 WerFault.exe 2736 WerFault.exe 2736 WerFault.exe 2860 WerFault.exe 2860 WerFault.exe 2860 WerFault.exe 2860 WerFault.exe 2736 WerFault.exe 2860 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 37de45226117a1f1476ebe6ea9054bace309ea8340f3119a976c20b91670e530N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2736 1952 WerFault.exe 30 2860 3060 WerFault.exe 34 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 37de45226117a1f1476ebe6ea9054bace309ea8340f3119a976c20b91670e530N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_37de45226117a1f1476ebe6ea9054bace309ea8340f3119a976c20b91670e530N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2612 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2612 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2120 wrote to memory of 1952 2120 37de45226117a1f1476ebe6ea9054bace309ea8340f3119a976c20b91670e530N.exe 30 PID 2120 wrote to memory of 1952 2120 37de45226117a1f1476ebe6ea9054bace309ea8340f3119a976c20b91670e530N.exe 30 PID 2120 wrote to memory of 1952 2120 37de45226117a1f1476ebe6ea9054bace309ea8340f3119a976c20b91670e530N.exe 30 PID 2120 wrote to memory of 1952 2120 37de45226117a1f1476ebe6ea9054bace309ea8340f3119a976c20b91670e530N.exe 30 PID 2120 wrote to memory of 1112 2120 37de45226117a1f1476ebe6ea9054bace309ea8340f3119a976c20b91670e530N.exe 32 PID 2120 wrote to memory of 1112 2120 37de45226117a1f1476ebe6ea9054bace309ea8340f3119a976c20b91670e530N.exe 32 PID 2120 wrote to memory of 1112 2120 37de45226117a1f1476ebe6ea9054bace309ea8340f3119a976c20b91670e530N.exe 32 PID 2120 wrote to memory of 1112 2120 37de45226117a1f1476ebe6ea9054bace309ea8340f3119a976c20b91670e530N.exe 32 PID 1112 wrote to memory of 3060 1112 Synaptics.exe 34 PID 1112 wrote to memory of 3060 1112 Synaptics.exe 34 PID 1112 wrote to memory of 3060 1112 Synaptics.exe 34 PID 1112 wrote to memory of 3060 1112 Synaptics.exe 34 PID 1952 wrote to memory of 2736 1952 ._cache_37de45226117a1f1476ebe6ea9054bace309ea8340f3119a976c20b91670e530N.exe 33 PID 1952 wrote to memory of 2736 1952 ._cache_37de45226117a1f1476ebe6ea9054bace309ea8340f3119a976c20b91670e530N.exe 33 PID 1952 wrote to memory of 2736 1952 ._cache_37de45226117a1f1476ebe6ea9054bace309ea8340f3119a976c20b91670e530N.exe 33 PID 1952 wrote to memory of 2736 1952 ._cache_37de45226117a1f1476ebe6ea9054bace309ea8340f3119a976c20b91670e530N.exe 33 PID 3060 wrote to memory of 2860 3060 ._cache_Synaptics.exe 37 PID 3060 wrote to memory of 2860 3060 ._cache_Synaptics.exe 37 PID 3060 wrote to memory of 2860 3060 ._cache_Synaptics.exe 37 PID 3060 wrote to memory of 2860 3060 ._cache_Synaptics.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\37de45226117a1f1476ebe6ea9054bace309ea8340f3119a976c20b91670e530N.exe"C:\Users\Admin\AppData\Local\Temp\37de45226117a1f1476ebe6ea9054bace309ea8340f3119a976c20b91670e530N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\._cache_37de45226117a1f1476ebe6ea9054bace309ea8340f3119a976c20b91670e530N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_37de45226117a1f1476ebe6ea9054bace309ea8340f3119a976c20b91670e530N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 5403⤵
- Loads dropped DLL
- Program crash
PID:2736
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3060 -s 5404⤵
- Loads dropped DLL
- Program crash
PID:2860
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
758KB
MD56cf2b1f13ed4b40c2af999833890fcb0
SHA1f4ffd759c73732e84855a5bcea8b0199889e8028
SHA25637de45226117a1f1476ebe6ea9054bace309ea8340f3119a976c20b91670e530
SHA51214680a0750ca865f8d5e70bc36bcc9a5dfa623e04f38a5a3b824e64d947af76aab8778428600956a471dfae609d0a8c56123a76fdfe1af6eba393426c561998c
-
Filesize
22KB
MD5a3120b897060be946b3a63616920bac0
SHA1b25f46bfe3ac3f10d63e5c8c321bc2ada1bc690a
SHA256b2c66d2fa59d5104cbdb5a44fca5ed7e46c4f54131576fdf769e5aa57902421d
SHA5129624d1a4d7446f792647012b66b4b57c6ac001f875dc95686f8d47640f19998737a25906f03dfaabc02ce27039eed8af3f63f9586374ad0005762736ad25f899
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
22KB
MD533265e814ae05877ef785741f81bb493
SHA175f5bcb9fab94a66e0ae05f1988562d728b6c19f
SHA2561d37ae7fd7248f0a769975dd0c68fc6c587bcd7724957358768506a30fd811ee
SHA5128295f1f8157cc68a5887169919fdaa49206cb551511d407e7d9fa757c42b65df88af52ca922c21bdfd944d4c094bef98b163ae257d1234c136bb2fab03b168c5
-
Filesize
21KB
MD52fcfc10fca4189da2e6fb8530dc84dda
SHA1db392703cb1221600d5c0b7ca760c56a4e780d99
SHA2569c50eec5e0329570e9453ffde8d8ac76a3d48bdb01bbe6c1572ec8835cc16163
SHA5127e396c99bd322fda22a283a4c8523f04eedffa076d421762e6462a77b4f85337177de427822a17a48400e13fe1a0d4780b4aad83ad0166baf899a5e1ede30919
-
Filesize
24KB
MD542b6643e5702a738301533d54f75df31
SHA1aead3ee11446f5a13418a9bbf4fc8d4be291d612
SHA25670fea3d8427f62b915df809df7f7d0ad7adaac5c243a8a13cafb674164dda20a
SHA51221ddffbf646231a6dda8d7f64a4c2959cba384f8043213371f87635bb1b8fae971eb362496706edb012a1b2267a1636f5686ca10005888ccae55cb81375bef43
-
Filesize
23KB
MD582f5f160ab86a7dc889b17226e6a6c5e
SHA18c05aa9456e6a3cd5f38c920c340bc110f1ca89b
SHA25671ce5e7d7347293186b99ee7a3465bd2fed1902fef3e12cb4ddfd426a23a9273
SHA5121cbdf41c3add8f5468cd841202d33c08022a7afd2da1d0a8971a89a6f6010bead01e6d0015ecec940de1da163c953d2ea67195013f5e6b99caa7ce09fcc837b4
-
Filesize
25KB
MD514d4c6e544aafc48e5b17f48fcf4524c
SHA14e5b88b9b0b7a2f3e56650fd6eb012092b6f6eaa
SHA2569e139e1b769b0d0719a2c769d5237464c99977c8a15d773bacaefffd3cd3baf9
SHA512208c75b45b31cb4435ebd70a89f1332b57bb9886216ca3bb432a3a2ca2e1c34f31ef73aa0a54e5041cb250aa51579d3c39107f3acf36b72faef021ab8c53dd19
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
\Users\Admin\AppData\Local\Temp\._cache_37de45226117a1f1476ebe6ea9054bace309ea8340f3119a976c20b91670e530N.exe
Filesize5KB
MD5d66a22c7e37161bf148e60fafc2b2a57
SHA1207aa0a18673a5162721f4372ec65a4baa6c9536
SHA256943537a28cbc4c019fdf5417713d440b55ba34a45d5d3e6fc444d7c7dbf3dd4c
SHA512843f88d48d9c5674e8b2c8a243530c34339b2de613b30983cfd4a5124c71c2d50ead86aaaa8ad6eead75e4c102e03b462d250760b5cdaab2dd6e7d83b67eee2d