Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
17-12-2024 16:27
Behavioral task
behavioral1
Sample
EzCad2.exe
Resource
win11-20241007-en
General
-
Target
EzCad2.exe
-
Size
3.5MB
-
MD5
7256ec660313e2c0a3e3f4d7bb24bd02
-
SHA1
912a35f1deffe72261de50346b051eae9bba785b
-
SHA256
724025e886398ce15f67ca426a924a1a4128106e90c6dd65b88ad79569b06c4d
-
SHA512
73caf399b9a6d6fe365b86220466673adbbebd50b25c5a563c06e5fa4ec2fd51163ee1e1e85dd0ec490bfd487aad67b8bbcf2f1fd0bd09472baa4ed2069b52ab
-
SSDEEP
98304:unsmtk2afgjYcyjOGa9CWROW6sCxMuYcG10gIR7:wLkgjYcyjOGa9CWROW6sC3Yc4O
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 3156 ._cache_EzCad2.exe 792 Synaptics.exe 5608 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" EzCad2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EzCad2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_EzCad2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ EzCad2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1436 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1436 EXCEL.EXE 1436 EXCEL.EXE 1436 EXCEL.EXE 1436 EXCEL.EXE 1436 EXCEL.EXE 1436 EXCEL.EXE 1436 EXCEL.EXE 1436 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3500 wrote to memory of 3156 3500 EzCad2.exe 79 PID 3500 wrote to memory of 3156 3500 EzCad2.exe 79 PID 3500 wrote to memory of 3156 3500 EzCad2.exe 79 PID 3500 wrote to memory of 792 3500 EzCad2.exe 80 PID 3500 wrote to memory of 792 3500 EzCad2.exe 80 PID 3500 wrote to memory of 792 3500 EzCad2.exe 80 PID 792 wrote to memory of 5608 792 Synaptics.exe 81 PID 792 wrote to memory of 5608 792 Synaptics.exe 81 PID 792 wrote to memory of 5608 792 Synaptics.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\EzCad2.exe"C:\Users\Admin\AppData\Local\Temp\EzCad2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\._cache_EzCad2.exe"C:\Users\Admin\AppData\Local\Temp\._cache_EzCad2.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3156
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5608
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD57256ec660313e2c0a3e3f4d7bb24bd02
SHA1912a35f1deffe72261de50346b051eae9bba785b
SHA256724025e886398ce15f67ca426a924a1a4128106e90c6dd65b88ad79569b06c4d
SHA51273caf399b9a6d6fe365b86220466673adbbebd50b25c5a563c06e5fa4ec2fd51163ee1e1e85dd0ec490bfd487aad67b8bbcf2f1fd0bd09472baa4ed2069b52ab
-
Filesize
2.7MB
MD582fc900a0e265ee80800189eaf21cc47
SHA145d0731aae6ff97a2521c0da4f4e99264baa5b25
SHA25624a7ea47e0967482366606cacb82d405a692c67520098c86a7c6394ded7aebeb
SHA51260be5bca76d326c2c2c5cc9fea079f724b90c5a9bbe4e424adfcb305f78b93e998697fd7c0be8d6f6ff684acbd611a795e671e34624583ec775a8bf9446c1449
-
Filesize
21KB
MD52a287cbcd6d83622314afdae844b2868
SHA114b918e590efc9b60c664a728ad1a615882c045b
SHA256f0cfc2844c609b9c39756244cf2f2ec9878c40662a3b37d378046fde671083cd
SHA512e01e39e4ca795ea0f89f4e9cc569ca6dcd2c991b4dadf63359e0b08546d234710abd8f4e5e10bd82008052ac0cad82301cbb3a467ada0e85919df88b608eedbc
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04