Analysis
-
max time kernel
112s -
max time network
101s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17-12-2024 20:00
Behavioral task
behavioral1
Sample
a6d64c677e4bf949f0c5444a3b794d07d6ce06276a969dc7be48ff9fab6f3b2e.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a6d64c677e4bf949f0c5444a3b794d07d6ce06276a969dc7be48ff9fab6f3b2e.exe
Resource
win10v2004-20241007-en
General
-
Target
a6d64c677e4bf949f0c5444a3b794d07d6ce06276a969dc7be48ff9fab6f3b2e.exe
-
Size
900KB
-
MD5
362daddecd4d13489b66a3877e60fd11
-
SHA1
2d7e71832ba982da8a29e1b809cb79b9e282dadd
-
SHA256
a6d64c677e4bf949f0c5444a3b794d07d6ce06276a969dc7be48ff9fab6f3b2e
-
SHA512
140de2ff889084e83572f70fb4788f386c21484b32e10857dbf99294290dc06c85427b9ff020055794ddd87dd1ff32641a4888909864a1ccbc64bab8d91923ac
-
SSDEEP
12288:sMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9mU6bi9I6VVe:snsJ39LyjbJkQFMhmC+6GD9hIy0
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
resource behavioral1/files/0x0008000000019761-107.dat -
Executes dropped EXE 3 IoCs
pid Process 2468 ._cache_a6d64c677e4bf949f0c5444a3b794d07d6ce06276a969dc7be48ff9fab6f3b2e.exe 2984 Synaptics.exe 2776 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 2792 a6d64c677e4bf949f0c5444a3b794d07d6ce06276a969dc7be48ff9fab6f3b2e.exe 2792 a6d64c677e4bf949f0c5444a3b794d07d6ce06276a969dc7be48ff9fab6f3b2e.exe 2792 a6d64c677e4bf949f0c5444a3b794d07d6ce06276a969dc7be48ff9fab6f3b2e.exe 2984 Synaptics.exe 2984 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" a6d64c677e4bf949f0c5444a3b794d07d6ce06276a969dc7be48ff9fab6f3b2e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6d64c677e4bf949f0c5444a3b794d07d6ce06276a969dc7be48ff9fab6f3b2e.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2716 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2716 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2468 2792 a6d64c677e4bf949f0c5444a3b794d07d6ce06276a969dc7be48ff9fab6f3b2e.exe 29 PID 2792 wrote to memory of 2468 2792 a6d64c677e4bf949f0c5444a3b794d07d6ce06276a969dc7be48ff9fab6f3b2e.exe 29 PID 2792 wrote to memory of 2468 2792 a6d64c677e4bf949f0c5444a3b794d07d6ce06276a969dc7be48ff9fab6f3b2e.exe 29 PID 2792 wrote to memory of 2468 2792 a6d64c677e4bf949f0c5444a3b794d07d6ce06276a969dc7be48ff9fab6f3b2e.exe 29 PID 2792 wrote to memory of 2984 2792 a6d64c677e4bf949f0c5444a3b794d07d6ce06276a969dc7be48ff9fab6f3b2e.exe 30 PID 2792 wrote to memory of 2984 2792 a6d64c677e4bf949f0c5444a3b794d07d6ce06276a969dc7be48ff9fab6f3b2e.exe 30 PID 2792 wrote to memory of 2984 2792 a6d64c677e4bf949f0c5444a3b794d07d6ce06276a969dc7be48ff9fab6f3b2e.exe 30 PID 2792 wrote to memory of 2984 2792 a6d64c677e4bf949f0c5444a3b794d07d6ce06276a969dc7be48ff9fab6f3b2e.exe 30 PID 2984 wrote to memory of 2776 2984 Synaptics.exe 31 PID 2984 wrote to memory of 2776 2984 Synaptics.exe 31 PID 2984 wrote to memory of 2776 2984 Synaptics.exe 31 PID 2984 wrote to memory of 2776 2984 Synaptics.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6d64c677e4bf949f0c5444a3b794d07d6ce06276a969dc7be48ff9fab6f3b2e.exe"C:\Users\Admin\AppData\Local\Temp\a6d64c677e4bf949f0c5444a3b794d07d6ce06276a969dc7be48ff9fab6f3b2e.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\._cache_a6d64c677e4bf949f0c5444a3b794d07d6ce06276a969dc7be48ff9fab6f3b2e.exe"C:\Users\Admin\AppData\Local\Temp\._cache_a6d64c677e4bf949f0c5444a3b794d07d6ce06276a969dc7be48ff9fab6f3b2e.exe"2⤵
- Executes dropped EXE
PID:2468
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2776
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
900KB
MD5362daddecd4d13489b66a3877e60fd11
SHA12d7e71832ba982da8a29e1b809cb79b9e282dadd
SHA256a6d64c677e4bf949f0c5444a3b794d07d6ce06276a969dc7be48ff9fab6f3b2e
SHA512140de2ff889084e83572f70fb4788f386c21484b32e10857dbf99294290dc06c85427b9ff020055794ddd87dd1ff32641a4888909864a1ccbc64bab8d91923ac
-
Filesize
21KB
MD56c634b02f6da1279d246ef9bbbe47f18
SHA1aa4170446aca52da9ef95a0b279fdd9458ec2020
SHA256f5ec977409cd6fe427e65db8908eeda8417ef07d4ed945d047512d854487fb84
SHA512a70769f117439be540a56bd2d7638a52a49b3965fd81d3fb6ba40c75eb029a52b5e1ac06821532062174530d83aa045abca97439bb2aa77d6ce8330515796004
-
Filesize
27KB
MD5270a727221fb63fcb45e1d777ed18761
SHA1bd2b577d44d21a567b38e40b032af6cf578fffd5
SHA2568ad1d29f5e47d1994abb6e1b83b756b5909ad84ef5c339719a930daf8fdbdf55
SHA5125234d29ae993fc37f2466c125113009ca26b48bb3823a77deca286b5c51b4453b09b31fcf1549679090c8b0213d92f8df72c6f29f702f88522f454d49f4acc7e
-
Filesize
25KB
MD5e76b76e23ea9a583b7bad650da8c23e3
SHA18701307f408f528d040f321735c0fa406beace9b
SHA2560dbdf5354f96d89051486d7ad313cf09f4fe1bbcd2e7ccf37e25ab3b100822fc
SHA512523c1e527614089d7f47486c73ade1026af58a6b504387632baff6e950dafa8eed18298afe5dd3c051c8b69ffd333fce04233504877f406ab8affc6f4ff28e21
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
23KB
MD5ba55b07ceb8aac15a134c084960b86ba
SHA1154285b52c9452d66beee8e7f721c927716dfe9e
SHA2569e64e1dea1c2ee7c485956c06a0ee7f1bbffe50e10a9e2a5daf7e58e2619fd07
SHA512ecd4257333ad4b6c7c78952f59f23737d432d170a1ede8815bef04a7d7dbe757a84347c335d1108e385054d880fb3a33b13c5f9b5388b1412bc288be31336553
-
Filesize
24KB
MD5ae2c735686ec4c294e324b1b1d70a7aa
SHA12c9a4b67037ab8def3f9979e6c772c0212ef0c60
SHA2561ee589126682b700aae50686bd2b1e84148ce318083804779012031eb72b27c1
SHA51280e84ce07b7ef943f06b1bc378957f82c827436c3e95bca819ca52b4dd67240e320a218aeb9d7e196d10d24c6e9e608236d13dd261941417f254ef51c010b9db
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
\Users\Admin\AppData\Local\Temp\._cache_a6d64c677e4bf949f0c5444a3b794d07d6ce06276a969dc7be48ff9fab6f3b2e.exe
Filesize147KB
MD52b8e4c792bed0e5882702720bc528ae5
SHA1e7638b294a4f1409f87e449643a02bbd49a481c8
SHA2566d7cb027bc6014cb268c49b46049cdff3ba94d07102a65bd053335a28e83d125
SHA5126cc9457024385c2687b32c5cd49aa45aa21c93c66c78efaa3e9d96e4fd26054fb9a4ef9c4974ca633e5ba63a31f625632aae7097aa6d05b54201c3f383d5a82d