Analysis
-
max time kernel
119s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 22:40
Behavioral task
behavioral1
Sample
96b1bec6c2f82f1b0f6fafb59049effcdc886bb3c73c45cbb93ea0f2af3b4a7bN.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
96b1bec6c2f82f1b0f6fafb59049effcdc886bb3c73c45cbb93ea0f2af3b4a7bN.exe
Resource
win10v2004-20241007-en
General
-
Target
96b1bec6c2f82f1b0f6fafb59049effcdc886bb3c73c45cbb93ea0f2af3b4a7bN.exe
-
Size
2.0MB
-
MD5
b44c9c8ca8e070236abef14c530365e0
-
SHA1
b62a358ce374f8e79e9f35c191edcb581924b441
-
SHA256
96b1bec6c2f82f1b0f6fafb59049effcdc886bb3c73c45cbb93ea0f2af3b4a7b
-
SHA512
517ee47cd002d3ca188b5d6dded9d20ac7df73dbe1ebc609cfa3903897eeffbde0a3e81b747e179aaa63eeaf43b7f86f73e45cd321244c090e790fb894ffaf85
-
SSDEEP
49152:unsHyjtk2MYC5GD666aa+++b+xBxABO7/eZffw8VpeDn7kJQ8Za8Se1:unsmtk2aj7/eZnw8VpeD7QQ8jSy
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
resource behavioral1/files/0x0007000000016d67-101.dat -
Executes dropped EXE 3 IoCs
pid Process 2884 ._cache_96b1bec6c2f82f1b0f6fafb59049effcdc886bb3c73c45cbb93ea0f2af3b4a7bN.exe 2856 Synaptics.exe 1048 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 2852 96b1bec6c2f82f1b0f6fafb59049effcdc886bb3c73c45cbb93ea0f2af3b4a7bN.exe 2852 96b1bec6c2f82f1b0f6fafb59049effcdc886bb3c73c45cbb93ea0f2af3b4a7bN.exe 2852 96b1bec6c2f82f1b0f6fafb59049effcdc886bb3c73c45cbb93ea0f2af3b4a7bN.exe 2852 96b1bec6c2f82f1b0f6fafb59049effcdc886bb3c73c45cbb93ea0f2af3b4a7bN.exe 2856 Synaptics.exe 2856 Synaptics.exe 2856 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 96b1bec6c2f82f1b0f6fafb59049effcdc886bb3c73c45cbb93ea0f2af3b4a7bN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96b1bec6c2f82f1b0f6fafb59049effcdc886bb3c73c45cbb93ea0f2af3b4a7bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1780 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1780 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2884 2852 96b1bec6c2f82f1b0f6fafb59049effcdc886bb3c73c45cbb93ea0f2af3b4a7bN.exe 30 PID 2852 wrote to memory of 2884 2852 96b1bec6c2f82f1b0f6fafb59049effcdc886bb3c73c45cbb93ea0f2af3b4a7bN.exe 30 PID 2852 wrote to memory of 2884 2852 96b1bec6c2f82f1b0f6fafb59049effcdc886bb3c73c45cbb93ea0f2af3b4a7bN.exe 30 PID 2852 wrote to memory of 2884 2852 96b1bec6c2f82f1b0f6fafb59049effcdc886bb3c73c45cbb93ea0f2af3b4a7bN.exe 30 PID 2852 wrote to memory of 2856 2852 96b1bec6c2f82f1b0f6fafb59049effcdc886bb3c73c45cbb93ea0f2af3b4a7bN.exe 31 PID 2852 wrote to memory of 2856 2852 96b1bec6c2f82f1b0f6fafb59049effcdc886bb3c73c45cbb93ea0f2af3b4a7bN.exe 31 PID 2852 wrote to memory of 2856 2852 96b1bec6c2f82f1b0f6fafb59049effcdc886bb3c73c45cbb93ea0f2af3b4a7bN.exe 31 PID 2852 wrote to memory of 2856 2852 96b1bec6c2f82f1b0f6fafb59049effcdc886bb3c73c45cbb93ea0f2af3b4a7bN.exe 31 PID 2856 wrote to memory of 1048 2856 Synaptics.exe 32 PID 2856 wrote to memory of 1048 2856 Synaptics.exe 32 PID 2856 wrote to memory of 1048 2856 Synaptics.exe 32 PID 2856 wrote to memory of 1048 2856 Synaptics.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\96b1bec6c2f82f1b0f6fafb59049effcdc886bb3c73c45cbb93ea0f2af3b4a7bN.exe"C:\Users\Admin\AppData\Local\Temp\96b1bec6c2f82f1b0f6fafb59049effcdc886bb3c73c45cbb93ea0f2af3b4a7bN.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\._cache_96b1bec6c2f82f1b0f6fafb59049effcdc886bb3c73c45cbb93ea0f2af3b4a7bN.exe"C:\Users\Admin\AppData\Local\Temp\._cache_96b1bec6c2f82f1b0f6fafb59049effcdc886bb3c73c45cbb93ea0f2af3b4a7bN.exe"2⤵
- Executes dropped EXE
PID:2884
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:1048
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5b44c9c8ca8e070236abef14c530365e0
SHA1b62a358ce374f8e79e9f35c191edcb581924b441
SHA25696b1bec6c2f82f1b0f6fafb59049effcdc886bb3c73c45cbb93ea0f2af3b4a7b
SHA512517ee47cd002d3ca188b5d6dded9d20ac7df73dbe1ebc609cfa3903897eeffbde0a3e81b747e179aaa63eeaf43b7f86f73e45cd321244c090e790fb894ffaf85
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
27KB
MD5fbaf536a58e371d1ffec25b4b51aa3dc
SHA1216888503c02e93c12f7cfffd76d724e87101313
SHA256e120c10cfdd93d5e0f1ec7a5395ba58605bbb20db4dd418754a416e6cbd5c5ee
SHA5124904e9ce0daba13603c7e75aefac74079fc87738aa9dd0a4eafe5383e543a57536f987406da5ed86f1bfc594f9f7a860072ee45af13ade67a7a4068a56f0af07
-
Filesize
24KB
MD538513dadfa8087bb76eb913a3a017360
SHA1b538d36118aa48e24d449a61f1920acf7ed83715
SHA256563efc1165ef788f70e83f8b9fa8e4e24a67d69ce144b07038a8377e120330d9
SHA512ac7f74cd0b7a58229ac50ae00d0b7b1c32b2c3d8ea7d90d99e8efc6361ee75c270a5cf7055c776e083b85f990c1ace126ac463d8aff8c55eefd23ccac4f2f8d1
-
\Users\Admin\AppData\Local\Temp\._cache_96b1bec6c2f82f1b0f6fafb59049effcdc886bb3c73c45cbb93ea0f2af3b4a7bN.exe
Filesize1.3MB
MD5239ebed4db9fdb3ae93d1592ea2f8132
SHA14c0547c04a8f7a06e436f8788bb7289a9768ef33
SHA256971a591b9c2f4d06d77268787d54220a48bac7b17b000b13777ff89f2d11c15c
SHA512c89a0fd39e19afdb6c0c24cd4427abda0bbd089f5ccc7487891065cffae058c6c2faf00d727d36ee6912e204155d4b0962cfc5ad2ada11bdd02ec7961294e2c8