Overview
overview
10Static
static
10AntiPubs D...er.exe
windows7-x64
10AntiPubs D...er.exe
windows10-2004-x64
10AntiPubs D...er.exe
windows7-x64
3AntiPubs D...er.exe
windows10-2004-x64
3AntiPubs D...ol.dll
windows7-x64
1AntiPubs D...ol.dll
windows10-2004-x64
1AntiPubs D...er.dll
windows7-x64
1AntiPubs D...er.dll
windows10-2004-x64
1AntiPubs D...rk.dll
windows7-x64
1AntiPubs D...rk.dll
windows10-2004-x64
1AntiPubs D...ib.dll
windows7-x64
1AntiPubs D...ib.dll
windows10-2004-x64
1AntiPubs D...on.dll
windows7-x64
1AntiPubs D...on.dll
windows10-2004-x64
1AntiPubs D...er.exe
windows7-x64
10AntiPubs D...er.exe
windows10-2004-x64
10AntiPubs D...F6.dll
windows7-x64
1AntiPubs D...F6.dll
windows10-2004-x64
1AntiPubs D...nq.dll
windows7-x64
1AntiPubs D...nq.dll
windows10-2004-x64
1AntiPubs D...te.dll
windows7-x64
1AntiPubs D...te.dll
windows10-2004-x64
1AntiPubs D...te.exe
windows7-x64
10AntiPubs D...te.exe
windows10-2004-x64
10AntiPubs D...ar.dll
windows7-x64
1AntiPubs D...ar.dll
windows10-2004-x64
1AntiPubs D...er.exe
windows7-x64
3AntiPubs D...er.exe
windows10-2004-x64
3AntiPubs D...op.dll
windows7-x64
1AntiPubs D...op.dll
windows10-2004-x64
1AntiPubs D...op.dll
windows7-x64
3AntiPubs D...op.dll
windows10-2004-x64
3Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 12:23
Behavioral task
behavioral1
Sample
AntiPubs Dork Searcher EZ/._cache_Searcher.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
AntiPubs Dork Searcher EZ/._cache_Searcher.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
AntiPubs Dork Searcher EZ/._cache_searcher.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
AntiPubs Dork Searcher EZ/._cache_searcher.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
AntiPubs Dork Searcher EZ/Control.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
AntiPubs Dork Searcher EZ/Control.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
AntiPubs Dork Searcher EZ/EntityFramework.SqlServer.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
AntiPubs Dork Searcher EZ/EntityFramework.SqlServer.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
AntiPubs Dork Searcher EZ/EntityFramework.dll
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
AntiPubs Dork Searcher EZ/EntityFramework.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
AntiPubs Dork Searcher EZ/Interop.WMPLib.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
AntiPubs Dork Searcher EZ/Interop.WMPLib.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
AntiPubs Dork Searcher EZ/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
AntiPubs Dork Searcher EZ/Newtonsoft.Json.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
AntiPubs Dork Searcher EZ/Searcher.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
AntiPubs Dork Searcher EZ/Searcher.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
AntiPubs Dork Searcher EZ/System.Data.SQLite.EF6.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
AntiPubs Dork Searcher EZ/System.Data.SQLite.EF6.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
AntiPubs Dork Searcher EZ/System.Data.SQLite.Linq.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
AntiPubs Dork Searcher EZ/System.Data.SQLite.Linq.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
AntiPubs Dork Searcher EZ/System.Data.SQLite.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
AntiPubs Dork Searcher EZ/System.Data.SQLite.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
AntiPubs Dork Searcher EZ/Update.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
AntiPubs Dork Searcher EZ/Update.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
AntiPubs Dork Searcher EZ/War.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
AntiPubs Dork Searcher EZ/War.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
AntiPubs Dork Searcher EZ/searcher.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
AntiPubs Dork Searcher EZ/searcher.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
AntiPubs Dork Searcher EZ/x64/SQLite.Interop.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
AntiPubs Dork Searcher EZ/x64/SQLite.Interop.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
AntiPubs Dork Searcher EZ/x86/SQLite.Interop.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
AntiPubs Dork Searcher EZ/x86/SQLite.Interop.dll
Resource
win10v2004-20241007-en
General
-
Target
AntiPubs Dork Searcher EZ/Searcher.exe
-
Size
7.7MB
-
MD5
89b8241a6504c5f75684558cf8262c92
-
SHA1
f2572052d0905be7c6df457564f7815419f4a225
-
SHA256
2d1ce8a3c009c75c31057b02b0fabe91e479ce28d42ac146301e7b7a5944c9de
-
SHA512
5a05c1d3eb88279329c0a93bd5473732be9d48a0d96527be70d6df04b53d3b386a1282f427e2485d8e1ea34815f38f5e74801b4dcbf6eaaa21c6519a0cecc34b
-
SSDEEP
98304:Tnsmtk2aDyldpqU5s+h9oK4MtPSXDjLWdNo/v5LlCKly37gjA1tCJa8IRku6FmlC:rLKyldD5smuMQDfUi/vXgIa8IRkZI2N
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 5 IoCs
pid Process 2748 ._cache_Searcher.exe 2684 Synaptics.exe 2716 ._cache_searcher.exe 2552 ._cache_Synaptics.exe 988 ._cache_synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 2996 Searcher.exe 2996 Searcher.exe 2996 Searcher.exe 2748 ._cache_Searcher.exe 2684 Synaptics.exe 2684 Synaptics.exe 2552 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" Searcher.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe ._cache_Searcher.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe ._cache_Synaptics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Searcher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Searcher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_searcher.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 580 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2748 ._cache_Searcher.exe 2748 ._cache_Searcher.exe 2748 ._cache_Searcher.exe 2748 ._cache_Searcher.exe 2748 ._cache_Searcher.exe 2748 ._cache_Searcher.exe 2748 ._cache_Searcher.exe 2748 ._cache_Searcher.exe 2748 ._cache_Searcher.exe 2748 ._cache_Searcher.exe 2748 ._cache_Searcher.exe 2748 ._cache_Searcher.exe 2748 ._cache_Searcher.exe 2748 ._cache_Searcher.exe 2748 ._cache_Searcher.exe 2748 ._cache_Searcher.exe 2552 ._cache_Synaptics.exe 2552 ._cache_Synaptics.exe 2552 ._cache_Synaptics.exe 2552 ._cache_Synaptics.exe 2552 ._cache_Synaptics.exe 2552 ._cache_Synaptics.exe 2552 ._cache_Synaptics.exe 2552 ._cache_Synaptics.exe 2552 ._cache_Synaptics.exe 2552 ._cache_Synaptics.exe 2552 ._cache_Synaptics.exe 2552 ._cache_Synaptics.exe 2552 ._cache_Synaptics.exe 2552 ._cache_Synaptics.exe 2552 ._cache_Synaptics.exe 2552 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2748 ._cache_Searcher.exe 2748 ._cache_Searcher.exe 2552 ._cache_Synaptics.exe 2552 ._cache_Synaptics.exe 580 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2996 wrote to memory of 2748 2996 Searcher.exe 30 PID 2996 wrote to memory of 2748 2996 Searcher.exe 30 PID 2996 wrote to memory of 2748 2996 Searcher.exe 30 PID 2996 wrote to memory of 2748 2996 Searcher.exe 30 PID 2996 wrote to memory of 2684 2996 Searcher.exe 31 PID 2996 wrote to memory of 2684 2996 Searcher.exe 31 PID 2996 wrote to memory of 2684 2996 Searcher.exe 31 PID 2996 wrote to memory of 2684 2996 Searcher.exe 31 PID 2748 wrote to memory of 2716 2748 ._cache_Searcher.exe 32 PID 2748 wrote to memory of 2716 2748 ._cache_Searcher.exe 32 PID 2748 wrote to memory of 2716 2748 ._cache_Searcher.exe 32 PID 2748 wrote to memory of 2716 2748 ._cache_Searcher.exe 32 PID 2684 wrote to memory of 2552 2684 Synaptics.exe 33 PID 2684 wrote to memory of 2552 2684 Synaptics.exe 33 PID 2684 wrote to memory of 2552 2684 Synaptics.exe 33 PID 2684 wrote to memory of 2552 2684 Synaptics.exe 33 PID 2552 wrote to memory of 988 2552 ._cache_Synaptics.exe 34 PID 2552 wrote to memory of 988 2552 ._cache_Synaptics.exe 34 PID 2552 wrote to memory of 988 2552 ._cache_Synaptics.exe 34 PID 2552 wrote to memory of 988 2552 ._cache_Synaptics.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\AntiPubs Dork Searcher EZ\Searcher.exe"C:\Users\Admin\AppData\Local\Temp\AntiPubs Dork Searcher EZ\Searcher.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\AntiPubs Dork Searcher EZ\._cache_Searcher.exe"C:\Users\Admin\AppData\Local\Temp\AntiPubs Dork Searcher EZ\._cache_Searcher.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
\??\c:\users\admin\appdata\local\temp\antipubs dork searcher ez\._cache_searcher.exe"c:\users\admin\appdata\local\temp\antipubs dork searcher ez\._cache_searcher.exe "3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2716
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\AntiPubs Dork Searcher EZ\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\AntiPubs Dork Searcher EZ\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
\??\c:\users\admin\appdata\local\temp\antipubs dork searcher ez\._cache_synaptics.exe"c:\users\admin\appdata\local\temp\antipubs dork searcher ez\._cache_synaptics.exe " InjUpdate4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:988
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.7MB
MD589b8241a6504c5f75684558cf8262c92
SHA1f2572052d0905be7c6df457564f7815419f4a225
SHA2562d1ce8a3c009c75c31057b02b0fabe91e479ce28d42ac146301e7b7a5944c9de
SHA5125a05c1d3eb88279329c0a93bd5473732be9d48a0d96527be70d6df04b53d3b386a1282f427e2485d8e1ea34815f38f5e74801b4dcbf6eaaa21c6519a0cecc34b
-
Filesize
27KB
MD58ad82ae99d54525db7023795c134d0ac
SHA10c5bb7442a66fe9150ca9276f8d67d9ccc20f46c
SHA256db87efb9f2cc83cd05548ce4f9f90248a763b71bec56bcbf8c5b0339bd3f2ff0
SHA512068921ce84f62b6a710a6e1d13bc89434c85a1d62a09ee286fd0588eebddee34d28ff130c37b71097f21ea8dcb07f4418cd8e7a28ff446cdbc764f03b3d5d15a
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
7.0MB
MD515eb4b61e2e64ac84925535dc5ffe8de
SHA1b95491efa58261ca585878238fa24d98fae41287
SHA2563b28aaf3dd8ea9623ab80e4f567e65b8bb5db686b129f27f6d9bc0907f2ed289
SHA512489751c78f8aded9a4b77eada0cccedab4d0faf50443607e17d81f65856ff77ad2842cb2ba5002e377c48fff441d86d38f74273367353fc2572a80ff980c14b5
-
Filesize
135KB
MD5bb38812e659c3d728f409ba8206da43e
SHA1231777c045c807c20eb964c5a8714e1de9e4302b
SHA2569eee738a0be74282659e61da2764f358cd5db063019bab247d513b5b63af748f
SHA51291854244be2838e0efa5f3566ce3a4518484ab71fff5f06b86ef0b1309cb9e8dc988d63b0d35e54a6c7515b0c1cea9b95bbdfd469415459a46c58e96ed42a2fc
-
Filesize
6.8MB
MD5d4b43b2ce490d8786ccde6debcad2251
SHA1e88d0c6b5c336ee7c03e145532a6ce44db28af90
SHA2563aad4931bc76e1d654e5fe3fc6a1a10277b0d66190a8547782a3d7fa117ccc27
SHA5128bff940911e750f06c76c724b92de0753f4089d92f95e5d3d3659de3869a91908c6de25e480a0101d8149fcc881b71f585c39a2e9206393bb89f1f5e43bdda46