Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-12-2024 19:45
Behavioral task
behavioral1
Sample
0e72c060893ae412a1cba2f0095e8d07d47350bacb568a3e3383b807c38dd0b1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0e72c060893ae412a1cba2f0095e8d07d47350bacb568a3e3383b807c38dd0b1.exe
Resource
win10v2004-20241007-en
General
-
Target
0e72c060893ae412a1cba2f0095e8d07d47350bacb568a3e3383b807c38dd0b1.exe
-
Size
938KB
-
MD5
6a2f1c3f0e069d648d30706d308336bc
-
SHA1
0d88c721c68b405abfa7bd6c0dbbcbf3cf70ce88
-
SHA256
0e72c060893ae412a1cba2f0095e8d07d47350bacb568a3e3383b807c38dd0b1
-
SHA512
31adecce3fc954ecfb69093e7b9a169b7c4d839a4ce8f59ee155c003bfa93733da68d7cd41b303d4cd42d892ecb56273a31f23faed498f3d9b1151a470c29df8
-
SSDEEP
12288:/MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9QlGXd4OvXkLGHj0qTDzZI:/nsJ39LyjbJkQFMhmC+6GD9CGmA0UTPS
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
resource behavioral1/files/0x0006000000016cd1-73.dat -
Executes dropped EXE 3 IoCs
pid Process 2836 ._cache_0e72c060893ae412a1cba2f0095e8d07d47350bacb568a3e3383b807c38dd0b1.exe 2284 Synaptics.exe 2004 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 2444 0e72c060893ae412a1cba2f0095e8d07d47350bacb568a3e3383b807c38dd0b1.exe 2444 0e72c060893ae412a1cba2f0095e8d07d47350bacb568a3e3383b807c38dd0b1.exe 2444 0e72c060893ae412a1cba2f0095e8d07d47350bacb568a3e3383b807c38dd0b1.exe 2284 Synaptics.exe 2284 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\????? = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 0e72c060893ae412a1cba2f0095e8d07d47350bacb568a3e3383b807c38dd0b1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_0e72c060893ae412a1cba2f0095e8d07d47350bacb568a3e3383b807c38dd0b1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e72c060893ae412a1cba2f0095e8d07d47350bacb568a3e3383b807c38dd0b1.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2712 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2712 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2836 2444 0e72c060893ae412a1cba2f0095e8d07d47350bacb568a3e3383b807c38dd0b1.exe 28 PID 2444 wrote to memory of 2836 2444 0e72c060893ae412a1cba2f0095e8d07d47350bacb568a3e3383b807c38dd0b1.exe 28 PID 2444 wrote to memory of 2836 2444 0e72c060893ae412a1cba2f0095e8d07d47350bacb568a3e3383b807c38dd0b1.exe 28 PID 2444 wrote to memory of 2836 2444 0e72c060893ae412a1cba2f0095e8d07d47350bacb568a3e3383b807c38dd0b1.exe 28 PID 2444 wrote to memory of 2284 2444 0e72c060893ae412a1cba2f0095e8d07d47350bacb568a3e3383b807c38dd0b1.exe 29 PID 2444 wrote to memory of 2284 2444 0e72c060893ae412a1cba2f0095e8d07d47350bacb568a3e3383b807c38dd0b1.exe 29 PID 2444 wrote to memory of 2284 2444 0e72c060893ae412a1cba2f0095e8d07d47350bacb568a3e3383b807c38dd0b1.exe 29 PID 2444 wrote to memory of 2284 2444 0e72c060893ae412a1cba2f0095e8d07d47350bacb568a3e3383b807c38dd0b1.exe 29 PID 2284 wrote to memory of 2004 2284 Synaptics.exe 30 PID 2284 wrote to memory of 2004 2284 Synaptics.exe 30 PID 2284 wrote to memory of 2004 2284 Synaptics.exe 30 PID 2284 wrote to memory of 2004 2284 Synaptics.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e72c060893ae412a1cba2f0095e8d07d47350bacb568a3e3383b807c38dd0b1.exe"C:\Users\Admin\AppData\Local\Temp\0e72c060893ae412a1cba2f0095e8d07d47350bacb568a3e3383b807c38dd0b1.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\._cache_0e72c060893ae412a1cba2f0095e8d07d47350bacb568a3e3383b807c38dd0b1.exe"C:\Users\Admin\AppData\Local\Temp\._cache_0e72c060893ae412a1cba2f0095e8d07d47350bacb568a3e3383b807c38dd0b1.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2836
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2004
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
938KB
MD56a2f1c3f0e069d648d30706d308336bc
SHA10d88c721c68b405abfa7bd6c0dbbcbf3cf70ce88
SHA2560e72c060893ae412a1cba2f0095e8d07d47350bacb568a3e3383b807c38dd0b1
SHA51231adecce3fc954ecfb69093e7b9a169b7c4d839a4ce8f59ee155c003bfa93733da68d7cd41b303d4cd42d892ecb56273a31f23faed498f3d9b1151a470c29df8
-
C:\Users\Admin\AppData\Local\Temp\._cache_0e72c060893ae412a1cba2f0095e8d07d47350bacb568a3e3383b807c38dd0b1.exe
Filesize193KB
MD5e2a73f000402b054a9d3811812364082
SHA18ec59cf3542ef7ce523c4c803365297b5790032e
SHA256bcff800b187c59da9fbdf7dcf11c5e03862f676de6ef7275a84a7f8e21938a87
SHA5122e7c835a86e3f3c6ce7cd3535f90591e892fc0f761f02fa3e7b18c9666d28e387eb488ab5386e91941849f412b329d8dba5f1659d6d4040bffc408d45cca1e64
-
Filesize
24KB
MD5c93c8e68472799c28f5516308dafced7
SHA1387079ff3129b0031a7fc6c9c25bec97cec7a237
SHA2564e157275783a93ba6a791339ab089fe8700b9a1fbc447e2f1c4df106ed6c3dab
SHA51254e1bd520f57303217df96f29e80f47c8ac7b13b8b561995efcbe07710adf1b8e6543d104dd2e06c5e73cdc9ae15f46eaee94472e2b61fe18d6d2bcbd2e41a3d
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
29KB
MD50b4e3ce073acc74c1a1a678ea3066da3
SHA1d8d3edcf4a31463bb09802271d9100fc5d44c902
SHA256a809ce185e99cf37cd27b1230400c65ad512d59c5f0da5b2f6b61458c73d7021
SHA512c4a46c96dfb1c4bb1fb8fff837d6d902efb879aaa23a1424742e76dd8a470a02be9b614e7430df8fcffdc35f3aca0874f46c51f4dd6b377565a283dd4540b63a
-
Filesize
28KB
MD520adecd95777bd803e8d5cf86314fca5
SHA173b77cdfd30ebd8e85c31dab72b38c1fd8aca836
SHA2562d8e5b4dda19225a0c87d1f8300bf5af6dad24fd1f05e87b725bdda4c89d1af4
SHA512b3f4c7014f693e58d9b4db77a4e2ad1027f7a03ac6725834fd949f9e59344fcc95ae4225ce0a5f1d1fa484c99bd5731087e6e03542066d4d680fb8b20dece0e0