Analysis
-
max time kernel
111s -
max time network
107s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 02:48
Behavioral task
behavioral1
Sample
980da76a12482736cfa65694f93a69f1c55d05be5fa080171c3e39d8cc54a9dbN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
980da76a12482736cfa65694f93a69f1c55d05be5fa080171c3e39d8cc54a9dbN.exe
Resource
win10v2004-20241007-en
General
-
Target
980da76a12482736cfa65694f93a69f1c55d05be5fa080171c3e39d8cc54a9dbN.exe
-
Size
9.5MB
-
MD5
f28012e70bf98f0cb3d24fd82a44be80
-
SHA1
9b480ac32ed01463ff4b10cffed0049b645b488b
-
SHA256
980da76a12482736cfa65694f93a69f1c55d05be5fa080171c3e39d8cc54a9db
-
SHA512
7f00637ffbe47093897e75813bb23d69306620f4b6b2be4a5941fc0d7e17ca039bcc12419c380d9c999b05594516e0c2110f345e6b7a77ceaf27bccc57d02271
-
SSDEEP
196608:cLwIkJ4io4EM+8muhUgeyeclXYGZKHEyUjGC+wmTkK6MYdd:cIfo4EMPmuhUceclXYaAEy2MwmTkvMYT
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2804 ._cache_980da76a12482736cfa65694f93a69f1c55d05be5fa080171c3e39d8cc54a9dbN.exe 2868 Synaptics.exe 2628 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 1840 980da76a12482736cfa65694f93a69f1c55d05be5fa080171c3e39d8cc54a9dbN.exe 1840 980da76a12482736cfa65694f93a69f1c55d05be5fa080171c3e39d8cc54a9dbN.exe 1840 980da76a12482736cfa65694f93a69f1c55d05be5fa080171c3e39d8cc54a9dbN.exe 2868 Synaptics.exe 2868 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 980da76a12482736cfa65694f93a69f1c55d05be5fa080171c3e39d8cc54a9dbN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_980da76a12482736cfa65694f93a69f1c55d05be5fa080171c3e39d8cc54a9dbN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 980da76a12482736cfa65694f93a69f1c55d05be5fa080171c3e39d8cc54a9dbN.exe -
Enumerates system info in registry 2 TTPs 7 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion ._cache_980da76a12482736cfa65694f93a69f1c55d05be5fa080171c3e39d8cc54a9dbN.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS ._cache_980da76a12482736cfa65694f93a69f1c55d05be5fa080171c3e39d8cc54a9dbN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer ._cache_980da76a12482736cfa65694f93a69f1c55d05be5fa080171c3e39d8cc54a9dbN.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2788 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2788 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1840 wrote to memory of 2804 1840 980da76a12482736cfa65694f93a69f1c55d05be5fa080171c3e39d8cc54a9dbN.exe 30 PID 1840 wrote to memory of 2804 1840 980da76a12482736cfa65694f93a69f1c55d05be5fa080171c3e39d8cc54a9dbN.exe 30 PID 1840 wrote to memory of 2804 1840 980da76a12482736cfa65694f93a69f1c55d05be5fa080171c3e39d8cc54a9dbN.exe 30 PID 1840 wrote to memory of 2804 1840 980da76a12482736cfa65694f93a69f1c55d05be5fa080171c3e39d8cc54a9dbN.exe 30 PID 1840 wrote to memory of 2868 1840 980da76a12482736cfa65694f93a69f1c55d05be5fa080171c3e39d8cc54a9dbN.exe 31 PID 1840 wrote to memory of 2868 1840 980da76a12482736cfa65694f93a69f1c55d05be5fa080171c3e39d8cc54a9dbN.exe 31 PID 1840 wrote to memory of 2868 1840 980da76a12482736cfa65694f93a69f1c55d05be5fa080171c3e39d8cc54a9dbN.exe 31 PID 1840 wrote to memory of 2868 1840 980da76a12482736cfa65694f93a69f1c55d05be5fa080171c3e39d8cc54a9dbN.exe 31 PID 2868 wrote to memory of 2628 2868 Synaptics.exe 32 PID 2868 wrote to memory of 2628 2868 Synaptics.exe 32 PID 2868 wrote to memory of 2628 2868 Synaptics.exe 32 PID 2868 wrote to memory of 2628 2868 Synaptics.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\980da76a12482736cfa65694f93a69f1c55d05be5fa080171c3e39d8cc54a9dbN.exe"C:\Users\Admin\AppData\Local\Temp\980da76a12482736cfa65694f93a69f1c55d05be5fa080171c3e39d8cc54a9dbN.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\._cache_980da76a12482736cfa65694f93a69f1c55d05be5fa080171c3e39d8cc54a9dbN.exe"C:\Users\Admin\AppData\Local\Temp\._cache_980da76a12482736cfa65694f93a69f1c55d05be5fa080171c3e39d8cc54a9dbN.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:2804
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:2628
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.5MB
MD5f28012e70bf98f0cb3d24fd82a44be80
SHA19b480ac32ed01463ff4b10cffed0049b645b488b
SHA256980da76a12482736cfa65694f93a69f1c55d05be5fa080171c3e39d8cc54a9db
SHA5127f00637ffbe47093897e75813bb23d69306620f4b6b2be4a5941fc0d7e17ca039bcc12419c380d9c999b05594516e0c2110f345e6b7a77ceaf27bccc57d02271
-
Filesize
23KB
MD56cd1723e23e8de436622f3caa6708065
SHA1d0e63eede3f42e280eacf826b1af816fa6818e5b
SHA2560fdeaa968531518001cb06e03ec526450ea1ef7c8a1bc47cb09ad176567a6f93
SHA512026855cd0c63877545028784133af0890892c15e435383b05872dfb552e7c22d0763686bf1520d5b251a45e4fa6f428b20e1e2897ea0d77c57736ee9ff9fd5bc
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
24KB
MD509452e96a5e6b82f4c0d0b4d877323cf
SHA17ae965c028d29608eb7f6a4c5aa0106b1e74cf1b
SHA2560c2ed781ea7d4333d6f1ad21337d16bf7b3f048bd8769ece9e36145700045820
SHA5124bb61448824ac41a0336f52d8b4957456b6f76bbb7b6311b68919d6bf4f68032d40705c70dde2605f14e8aab9c174f3291b75b248e76e14894afdd6dd9c74fd3
-
Filesize
27KB
MD5247e183298a05d3721837ecc03caa7c3
SHA1f18758de49dc32a6db6187fdc251d737d98e6088
SHA256c8c4de42dbafc4b472db63d16f6de05b0b6078269f16a0737682c2532e3da097
SHA512322e9a18afa19524c89bb65c5f835eef0080536ee8c47458926dff91983f58c208bc530e814af9d876459b226b4aa8c901ffd543c10027b558edeba8a1457f8a
-
Filesize
25KB
MD50f4515f19a92246dfa7d2e7071ae8325
SHA15af536278f1a36f2782d0003c466c28505284a7d
SHA256a4afe7b89e475538b245727c39142e43f85fb91113ab281bd23e03d9dabb1f6e
SHA5123bfdcd3913e251f7f88709eeeb415fdbbffa998f866212515cf05af540e89492a134a136fd1b56e9f5032bf7c29add30b990da12717ec906850cec4374b9ef1a
-
Filesize
28KB
MD5d391af680172a0171e6559cf5dca0502
SHA14df2f7a018df75dc7b87e0c7146c751c209cfa39
SHA2565dfda84c0d8a3f7e6e94b23da4279d1ff22e559eb3bbde4b4d72e65ece62ae0e
SHA512d5afb3d9b9ec77f5f6cefd225367cfb03fa1d494f8626be709f306c75c5902bad57fe1ff919fb5acbba3d29dca1184bfc6a2cc3fffb42229d62aa6acff4370b1
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
\Users\Admin\AppData\Local\Temp\._cache_980da76a12482736cfa65694f93a69f1c55d05be5fa080171c3e39d8cc54a9dbN.exe
Filesize8.8MB
MD526417db2e641625ab5051d68dd43ec63
SHA135c6c775d4f8c279911528df14cb5496d92cf8f3
SHA256cb068cde08cc4e7338942b0b28975d5b39a231a25fd6069bd6ab0a9139eb11f1
SHA5120b8a5a84517d496e5251602c78ca58d5cbd82462c1cef5a137fb161ce685b05bb6aedeb3af1d982ab5efff459ec6e53003e948c9fa51c1e9a19ac80e286aaba4