Analysis
-
max time kernel
110s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 18:29
Behavioral task
behavioral1
Sample
091cbcbb5f17828ec2e7547dffa558e8976a1ade79fd296c769efb916e179e30N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
091cbcbb5f17828ec2e7547dffa558e8976a1ade79fd296c769efb916e179e30N.exe
Resource
win10v2004-20241007-en
General
-
Target
091cbcbb5f17828ec2e7547dffa558e8976a1ade79fd296c769efb916e179e30N.exe
-
Size
879KB
-
MD5
4dc13abda5ec39d3dfd3e0f1ccb84750
-
SHA1
fdd3b8915b0c760fe41a1a31756c922bc8963d0f
-
SHA256
091cbcbb5f17828ec2e7547dffa558e8976a1ade79fd296c769efb916e179e30
-
SHA512
d9649ca6c785f198f6394d1cff6e56682bafdf34f75f7707222bd5d2a6df5e8e4e3d7feb0beb95879835f248bc6f86d5506d3c8c67958c061a558e3400d0fa8f
-
SSDEEP
12288:wMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9bKjpzqO:wnsJ39LyjbJkQFMhmC+6GD9opD
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
resource behavioral1/files/0x0009000000019551-102.dat behavioral1/files/0x000800000001a495-113.dat -
Executes dropped EXE 3 IoCs
pid Process 1380 ._cache_091cbcbb5f17828ec2e7547dffa558e8976a1ade79fd296c769efb916e179e30N.exe 2440 Synaptics.exe 2644 ._cache_Synaptics.exe -
Loads dropped DLL 11 IoCs
pid Process 576 091cbcbb5f17828ec2e7547dffa558e8976a1ade79fd296c769efb916e179e30N.exe 1380 ._cache_091cbcbb5f17828ec2e7547dffa558e8976a1ade79fd296c769efb916e179e30N.exe 1380 ._cache_091cbcbb5f17828ec2e7547dffa558e8976a1ade79fd296c769efb916e179e30N.exe 1380 ._cache_091cbcbb5f17828ec2e7547dffa558e8976a1ade79fd296c769efb916e179e30N.exe 576 091cbcbb5f17828ec2e7547dffa558e8976a1ade79fd296c769efb916e179e30N.exe 576 091cbcbb5f17828ec2e7547dffa558e8976a1ade79fd296c769efb916e179e30N.exe 2440 Synaptics.exe 2440 Synaptics.exe 2644 ._cache_Synaptics.exe 2644 ._cache_Synaptics.exe 2644 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 091cbcbb5f17828ec2e7547dffa558e8976a1ade79fd296c769efb916e179e30N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\WindowsUpdate.log ._cache_091cbcbb5f17828ec2e7547dffa558e8976a1ade79fd296c769efb916e179e30N.exe File opened for modification C:\Windows\WindowsUpdate.log ._cache_Synaptics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 091cbcbb5f17828ec2e7547dffa558e8976a1ade79fd296c769efb916e179e30N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_091cbcbb5f17828ec2e7547dffa558e8976a1ade79fd296c769efb916e179e30N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2060 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2060 EXCEL.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 576 wrote to memory of 1380 576 091cbcbb5f17828ec2e7547dffa558e8976a1ade79fd296c769efb916e179e30N.exe 31 PID 576 wrote to memory of 1380 576 091cbcbb5f17828ec2e7547dffa558e8976a1ade79fd296c769efb916e179e30N.exe 31 PID 576 wrote to memory of 1380 576 091cbcbb5f17828ec2e7547dffa558e8976a1ade79fd296c769efb916e179e30N.exe 31 PID 576 wrote to memory of 1380 576 091cbcbb5f17828ec2e7547dffa558e8976a1ade79fd296c769efb916e179e30N.exe 31 PID 576 wrote to memory of 1380 576 091cbcbb5f17828ec2e7547dffa558e8976a1ade79fd296c769efb916e179e30N.exe 31 PID 576 wrote to memory of 1380 576 091cbcbb5f17828ec2e7547dffa558e8976a1ade79fd296c769efb916e179e30N.exe 31 PID 576 wrote to memory of 1380 576 091cbcbb5f17828ec2e7547dffa558e8976a1ade79fd296c769efb916e179e30N.exe 31 PID 576 wrote to memory of 2440 576 091cbcbb5f17828ec2e7547dffa558e8976a1ade79fd296c769efb916e179e30N.exe 32 PID 576 wrote to memory of 2440 576 091cbcbb5f17828ec2e7547dffa558e8976a1ade79fd296c769efb916e179e30N.exe 32 PID 576 wrote to memory of 2440 576 091cbcbb5f17828ec2e7547dffa558e8976a1ade79fd296c769efb916e179e30N.exe 32 PID 576 wrote to memory of 2440 576 091cbcbb5f17828ec2e7547dffa558e8976a1ade79fd296c769efb916e179e30N.exe 32 PID 2440 wrote to memory of 2644 2440 Synaptics.exe 33 PID 2440 wrote to memory of 2644 2440 Synaptics.exe 33 PID 2440 wrote to memory of 2644 2440 Synaptics.exe 33 PID 2440 wrote to memory of 2644 2440 Synaptics.exe 33 PID 2440 wrote to memory of 2644 2440 Synaptics.exe 33 PID 2440 wrote to memory of 2644 2440 Synaptics.exe 33 PID 2440 wrote to memory of 2644 2440 Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\091cbcbb5f17828ec2e7547dffa558e8976a1ade79fd296c769efb916e179e30N.exe"C:\Users\Admin\AppData\Local\Temp\091cbcbb5f17828ec2e7547dffa558e8976a1ade79fd296c769efb916e179e30N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Users\Admin\AppData\Local\Temp\._cache_091cbcbb5f17828ec2e7547dffa558e8976a1ade79fd296c769efb916e179e30N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_091cbcbb5f17828ec2e7547dffa558e8976a1ade79fd296c769efb916e179e30N.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1380
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2644
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
879KB
MD54dc13abda5ec39d3dfd3e0f1ccb84750
SHA1fdd3b8915b0c760fe41a1a31756c922bc8963d0f
SHA256091cbcbb5f17828ec2e7547dffa558e8976a1ade79fd296c769efb916e179e30
SHA512d9649ca6c785f198f6394d1cff6e56682bafdf34f75f7707222bd5d2a6df5e8e4e3d7feb0beb95879835f248bc6f86d5506d3c8c67958c061a558e3400d0fa8f
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
25KB
MD5f6c1bb3516a2a1f5aa174edb3d40b5f3
SHA15f8d092dda7b77febb5142c8c44b9e6339ec443c
SHA256fb8e7301efa479b5fe2b6b1c04dd95c2580d3063fc9693c40df7c72cdd9484a0
SHA5123863cbb7f21c446dccb8d8fbdffb90d5890c31b143619072f2029c4d9f92bb7c16ed260c2319dc9b91bc72a7393286ee220efc019bfd45e5924051722570a2bb
-
Filesize
21KB
MD53273ff0cc1f28dc7a536627a33086196
SHA1f9874baa1a9ea969b3b4fad9bd80832bbdadef6d
SHA256a63ba54ad427e5f7a60263bdbce5fd319a82f2cea64d193a950b595219a36a5c
SHA512bba45fff99b33fcba76e0541ba2c5bde3542487d5898288157ca60b1af2a0521d7bbd164930c04e64c0739801c666b155d08b5b8d636b4b0b5be30470c70bd81
-
Filesize
27KB
MD5a397f5008931bd8a7eb0f7934304e80e
SHA10e2c3ed4664abbb46b76678dd33d2fcde2c8fc1d
SHA256a35384d40c1913ec5539eb1746a408592652a6a1d1e3e21baf9d89fd4efb21c4
SHA51266193202f487d8e1bf6982f70f2ba131ede5203e9ab856c51f9d43d2f51c79b926fbccd62bc4676ecb0f4056e07327de4b48b0b010fa758bbb027a3e554062f4
-
Filesize
25KB
MD59c1881fb2c3a35ed8a857f8ee257e96a
SHA1418d783e23ab21fb299223bf2d7fc2782626ac85
SHA25628765d6a155e1e8343a34da6117e4f89f91a0b090b1d7672db644f2c548bc755
SHA5127a777f997936cded04c5e3803e54cfb4f5cb44e6834740d20694ba27df058a0a0c47735fc52e91cb90384994eb6efb43dcd54830733e376317c2105a407f6c68
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
\Users\Admin\AppData\Local\Temp\._cache_091cbcbb5f17828ec2e7547dffa558e8976a1ade79fd296c769efb916e179e30N.exe
Filesize125KB
MD5ad29c3dec8fb0cfdafe8548371b0ee6d
SHA1b923c58d0fdc9c3c9fbed17bd5fb563ebb6a89a7
SHA2562812ce780e6c3bd583d863e2520ac008bec0da3ca4fa8243296f9a00655b2e02
SHA51282f4ce7f61e58083d4f83727d66d0a751beaa2c54c7083bf1b6cde73664686a8179ce0e53b5cc5f47883f5884e6ce449c11769836e0f5c6edcc6133848c9722e