Analysis
-
max time kernel
111s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 07:31
Behavioral task
behavioral1
Sample
7ba203cf0e02705516ecb9640a6ec56e1af722c2cdf0ef396a55002b478d6714N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7ba203cf0e02705516ecb9640a6ec56e1af722c2cdf0ef396a55002b478d6714N.exe
Resource
win10v2004-20241007-en
General
-
Target
7ba203cf0e02705516ecb9640a6ec56e1af722c2cdf0ef396a55002b478d6714N.exe
-
Size
878KB
-
MD5
7082651a665e7a31c20c1b3463b8a700
-
SHA1
bf4adfd2ca0bb38fb981ffcc5c9084cf9da92882
-
SHA256
7ba203cf0e02705516ecb9640a6ec56e1af722c2cdf0ef396a55002b478d6714
-
SHA512
9e618e294a18d564c1a4fabe4e717894bbeb20e87b4dbc7760e9c40e13fa5d195662df6861d8a9a09d5eb3fa89d0e8b06eba659a51dff352e7231a9c30e6dd32
-
SSDEEP
12288:AMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9qmwDZzpM:AnsJ39LyjbJkQFMhmC+6GD9+Zza
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 7ba203cf0e02705516ecb9640a6ec56e1af722c2cdf0ef396a55002b478d6714N.exe -
Executes dropped EXE 3 IoCs
pid Process 4152 ._cache_7ba203cf0e02705516ecb9640a6ec56e1af722c2cdf0ef396a55002b478d6714N.exe 4352 Synaptics.exe 3892 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 7ba203cf0e02705516ecb9640a6ec56e1af722c2cdf0ef396a55002b478d6714N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2360 4152 WerFault.exe 84 760 3892 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ba203cf0e02705516ecb9640a6ec56e1af722c2cdf0ef396a55002b478d6714N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_7ba203cf0e02705516ecb9640a6ec56e1af722c2cdf0ef396a55002b478d6714N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 7ba203cf0e02705516ecb9640a6ec56e1af722c2cdf0ef396a55002b478d6714N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2984 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2984 EXCEL.EXE 2984 EXCEL.EXE 2984 EXCEL.EXE 2984 EXCEL.EXE 2984 EXCEL.EXE 2984 EXCEL.EXE 2984 EXCEL.EXE 2984 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1828 wrote to memory of 4152 1828 7ba203cf0e02705516ecb9640a6ec56e1af722c2cdf0ef396a55002b478d6714N.exe 84 PID 1828 wrote to memory of 4152 1828 7ba203cf0e02705516ecb9640a6ec56e1af722c2cdf0ef396a55002b478d6714N.exe 84 PID 1828 wrote to memory of 4152 1828 7ba203cf0e02705516ecb9640a6ec56e1af722c2cdf0ef396a55002b478d6714N.exe 84 PID 1828 wrote to memory of 4352 1828 7ba203cf0e02705516ecb9640a6ec56e1af722c2cdf0ef396a55002b478d6714N.exe 85 PID 1828 wrote to memory of 4352 1828 7ba203cf0e02705516ecb9640a6ec56e1af722c2cdf0ef396a55002b478d6714N.exe 85 PID 1828 wrote to memory of 4352 1828 7ba203cf0e02705516ecb9640a6ec56e1af722c2cdf0ef396a55002b478d6714N.exe 85 PID 4352 wrote to memory of 3892 4352 Synaptics.exe 89 PID 4352 wrote to memory of 3892 4352 Synaptics.exe 89 PID 4352 wrote to memory of 3892 4352 Synaptics.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ba203cf0e02705516ecb9640a6ec56e1af722c2cdf0ef396a55002b478d6714N.exe"C:\Users\Admin\AppData\Local\Temp\7ba203cf0e02705516ecb9640a6ec56e1af722c2cdf0ef396a55002b478d6714N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\._cache_7ba203cf0e02705516ecb9640a6ec56e1af722c2cdf0ef396a55002b478d6714N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_7ba203cf0e02705516ecb9640a6ec56e1af722c2cdf0ef396a55002b478d6714N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4152 -s 8043⤵
- Program crash
PID:2360
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3892 -s 7924⤵
- Program crash
PID:760
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4152 -ip 41521⤵PID:1176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3892 -ip 38921⤵PID:1900
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
878KB
MD57082651a665e7a31c20c1b3463b8a700
SHA1bf4adfd2ca0bb38fb981ffcc5c9084cf9da92882
SHA2567ba203cf0e02705516ecb9640a6ec56e1af722c2cdf0ef396a55002b478d6714
SHA5129e618e294a18d564c1a4fabe4e717894bbeb20e87b4dbc7760e9c40e13fa5d195662df6861d8a9a09d5eb3fa89d0e8b06eba659a51dff352e7231a9c30e6dd32
-
C:\Users\Admin\AppData\Local\Temp\._cache_7ba203cf0e02705516ecb9640a6ec56e1af722c2cdf0ef396a55002b478d6714N.exe
Filesize124KB
MD5dbd2a489c1f5eb8b8a11132aa31d9346
SHA1fe7578c434bbaac60354293bf9aa82119bba9c3e
SHA25688a121b4247bd47a384846467943461e2527c16d21923fbf4398ba1b0dfe824c
SHA512b839ed9196191b66428551896ec8d3291c379583ca655226766bf05c5c9bb58f6d924a4f0ec41d77a291538df25cb1e26f728091c9614e3efa309b08284b9ab3
-
Filesize
21KB
MD568c6c4fb52b21aea369f8437be48ee2c
SHA18f14acf631b2c00d6284fd0f802d6210711a0836
SHA25640c7b292b59093bb15a84d6968ab0899c7117d25c26011903e58639df94478bd
SHA51252a4c0c6699dc20847e86580f5a97ef05aae4f19bc6fb7263446e9ab5ee1ca5705967537a6b46878232696d35f8d6c55ba240ccf02af7806e53be57fa9d5a177
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04