Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 16:39
Behavioral task
behavioral1
Sample
c460416d08bc179568a75b2f0b37fdc1fb3f7cececbb2879b6e2c1af43575359N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c460416d08bc179568a75b2f0b37fdc1fb3f7cececbb2879b6e2c1af43575359N.exe
Resource
win10v2004-20241007-en
General
-
Target
c460416d08bc179568a75b2f0b37fdc1fb3f7cececbb2879b6e2c1af43575359N.exe
-
Size
786KB
-
MD5
719203c56682b82e760b126d2f7a2690
-
SHA1
d1890f543cacba1e06bfb48df0dab47449eac046
-
SHA256
c460416d08bc179568a75b2f0b37fdc1fb3f7cececbb2879b6e2c1af43575359
-
SHA512
9b11a3a8175b10f4154920d0e9c53c0ed75fab3ea134db3c0eb35e826bed9fea23fff76ef29e854ab5f217f9386d63f91730e0d38403d18896462e6d9d35b453
-
SSDEEP
12288:2MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V93RYj:2nsJ39LyjbJkQFMhmC+6GD9i
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2748 ._cache_c460416d08bc179568a75b2f0b37fdc1fb3f7cececbb2879b6e2c1af43575359N.exe 2872 Synaptics.exe 2652 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 2488 c460416d08bc179568a75b2f0b37fdc1fb3f7cececbb2879b6e2c1af43575359N.exe 2488 c460416d08bc179568a75b2f0b37fdc1fb3f7cececbb2879b6e2c1af43575359N.exe 2488 c460416d08bc179568a75b2f0b37fdc1fb3f7cececbb2879b6e2c1af43575359N.exe 2872 Synaptics.exe 2872 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" c460416d08bc179568a75b2f0b37fdc1fb3f7cececbb2879b6e2c1af43575359N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c460416d08bc179568a75b2f0b37fdc1fb3f7cececbb2879b6e2c1af43575359N.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1104 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1104 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2748 2488 c460416d08bc179568a75b2f0b37fdc1fb3f7cececbb2879b6e2c1af43575359N.exe 31 PID 2488 wrote to memory of 2748 2488 c460416d08bc179568a75b2f0b37fdc1fb3f7cececbb2879b6e2c1af43575359N.exe 31 PID 2488 wrote to memory of 2748 2488 c460416d08bc179568a75b2f0b37fdc1fb3f7cececbb2879b6e2c1af43575359N.exe 31 PID 2488 wrote to memory of 2748 2488 c460416d08bc179568a75b2f0b37fdc1fb3f7cececbb2879b6e2c1af43575359N.exe 31 PID 2488 wrote to memory of 2872 2488 c460416d08bc179568a75b2f0b37fdc1fb3f7cececbb2879b6e2c1af43575359N.exe 33 PID 2488 wrote to memory of 2872 2488 c460416d08bc179568a75b2f0b37fdc1fb3f7cececbb2879b6e2c1af43575359N.exe 33 PID 2488 wrote to memory of 2872 2488 c460416d08bc179568a75b2f0b37fdc1fb3f7cececbb2879b6e2c1af43575359N.exe 33 PID 2488 wrote to memory of 2872 2488 c460416d08bc179568a75b2f0b37fdc1fb3f7cececbb2879b6e2c1af43575359N.exe 33 PID 2872 wrote to memory of 2652 2872 Synaptics.exe 34 PID 2872 wrote to memory of 2652 2872 Synaptics.exe 34 PID 2872 wrote to memory of 2652 2872 Synaptics.exe 34 PID 2872 wrote to memory of 2652 2872 Synaptics.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\c460416d08bc179568a75b2f0b37fdc1fb3f7cececbb2879b6e2c1af43575359N.exe"C:\Users\Admin\AppData\Local\Temp\c460416d08bc179568a75b2f0b37fdc1fb3f7cececbb2879b6e2c1af43575359N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\._cache_c460416d08bc179568a75b2f0b37fdc1fb3f7cececbb2879b6e2c1af43575359N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_c460416d08bc179568a75b2f0b37fdc1fb3f7cececbb2879b6e2c1af43575359N.exe"2⤵
- Executes dropped EXE
PID:2748
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2652
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD52527c463a079c81af7b3bc1d26bd3b5d
SHA1ce3c6931641edcfe68900628852932911ccc9476
SHA256168a175ccf74e80899d2519bbe6e1ae8b0fa2489af70e8cc0720afab1ad8b0ab
SHA512f503693b124a5a138e758d6f9ecec04b72848179fef5d60fcd225c3ba18ec1ba030f31c88ea219c5d15505955b150ede938b694521f6932fcb496bdc9e1991be
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
26KB
MD5f0778e0a7b3ad58ab35746aec7539354
SHA151336df9bae8a679f7c2371d156c2e39b3f69102
SHA256df224bdc458d3db634543467c2d1b7bad0961e8f91324fb0869bfdea3e90882e
SHA5124a5296f8e7fa0c455d275c7d2d47d372a42c2e370c768029c107cda66f720eef137b7612245696d5b9e19bb9d054f2b56b52cf823455263cfeeac3322c434972
-
Filesize
21KB
MD52974ae8cc6811554d6d14ada18d6a059
SHA1bd7bf9a132b38ceebd0004c6ac133b41ea33d9fa
SHA256966628c93baeb5ec46aff38cdfd773669fe422cdcd4b181ccc5a94c27185bb0c
SHA51246fa8fb7b5fc7a5902b467f41123287a199bf7fdf3a6a6b889df5fbfaab556fcd9d65b741d1d2ac513a1ed5d02e9b18e1ebe2b621f3f791ca200b15651ace7eb
-
Filesize
786KB
MD5719203c56682b82e760b126d2f7a2690
SHA1d1890f543cacba1e06bfb48df0dab47449eac046
SHA256c460416d08bc179568a75b2f0b37fdc1fb3f7cececbb2879b6e2c1af43575359
SHA5129b11a3a8175b10f4154920d0e9c53c0ed75fab3ea134db3c0eb35e826bed9fea23fff76ef29e854ab5f217f9386d63f91730e0d38403d18896462e6d9d35b453