Analysis
-
max time kernel
111s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 20:43
Behavioral task
behavioral1
Sample
d8760373c675939de899558c3da7baf94078d0519d6beec46400969a35af571d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d8760373c675939de899558c3da7baf94078d0519d6beec46400969a35af571d.exe
Resource
win10v2004-20241007-en
General
-
Target
d8760373c675939de899558c3da7baf94078d0519d6beec46400969a35af571d.exe
-
Size
2.0MB
-
MD5
d327419bcdbdb1b2a3181515a882aee6
-
SHA1
3b580ae67e4058c6f678ee4df6d9454f3bfeb950
-
SHA256
d8760373c675939de899558c3da7baf94078d0519d6beec46400969a35af571d
-
SHA512
3cad4b59a33a52d87ae1b09287265a2ef58b69710e6a0250edbb67167da6b267b955032377283ec584c98f3f2d22307d1d1106f21c4872fe9b22a52470b94401
-
SSDEEP
49152:unsHyjtk2MYC5GD666aa+++b+xBxABO7/eZffw8VpeDn7kJQ8Za8Sen:unsmtk2aj7/eZnw8VpeD7QQ8jSW
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation d8760373c675939de899558c3da7baf94078d0519d6beec46400969a35af571d.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 2324 ._cache_d8760373c675939de899558c3da7baf94078d0519d6beec46400969a35af571d.exe 3924 Synaptics.exe 3680 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" d8760373c675939de899558c3da7baf94078d0519d6beec46400969a35af571d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d8760373c675939de899558c3da7baf94078d0519d6beec46400969a35af571d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ d8760373c675939de899558c3da7baf94078d0519d6beec46400969a35af571d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4256 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4256 EXCEL.EXE 4256 EXCEL.EXE 4256 EXCEL.EXE 4256 EXCEL.EXE 4256 EXCEL.EXE 4256 EXCEL.EXE 4256 EXCEL.EXE 4256 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3532 wrote to memory of 2324 3532 d8760373c675939de899558c3da7baf94078d0519d6beec46400969a35af571d.exe 85 PID 3532 wrote to memory of 2324 3532 d8760373c675939de899558c3da7baf94078d0519d6beec46400969a35af571d.exe 85 PID 3532 wrote to memory of 2324 3532 d8760373c675939de899558c3da7baf94078d0519d6beec46400969a35af571d.exe 85 PID 3532 wrote to memory of 3924 3532 d8760373c675939de899558c3da7baf94078d0519d6beec46400969a35af571d.exe 86 PID 3532 wrote to memory of 3924 3532 d8760373c675939de899558c3da7baf94078d0519d6beec46400969a35af571d.exe 86 PID 3532 wrote to memory of 3924 3532 d8760373c675939de899558c3da7baf94078d0519d6beec46400969a35af571d.exe 86 PID 3924 wrote to memory of 3680 3924 Synaptics.exe 87 PID 3924 wrote to memory of 3680 3924 Synaptics.exe 87 PID 3924 wrote to memory of 3680 3924 Synaptics.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\d8760373c675939de899558c3da7baf94078d0519d6beec46400969a35af571d.exe"C:\Users\Admin\AppData\Local\Temp\d8760373c675939de899558c3da7baf94078d0519d6beec46400969a35af571d.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\._cache_d8760373c675939de899558c3da7baf94078d0519d6beec46400969a35af571d.exe"C:\Users\Admin\AppData\Local\Temp\._cache_d8760373c675939de899558c3da7baf94078d0519d6beec46400969a35af571d.exe"2⤵
- Executes dropped EXE
PID:2324
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:3680
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5d327419bcdbdb1b2a3181515a882aee6
SHA13b580ae67e4058c6f678ee4df6d9454f3bfeb950
SHA256d8760373c675939de899558c3da7baf94078d0519d6beec46400969a35af571d
SHA5123cad4b59a33a52d87ae1b09287265a2ef58b69710e6a0250edbb67167da6b267b955032377283ec584c98f3f2d22307d1d1106f21c4872fe9b22a52470b94401
-
C:\Users\Admin\AppData\Local\Temp\._cache_d8760373c675939de899558c3da7baf94078d0519d6beec46400969a35af571d.exe
Filesize1.3MB
MD5239ebed4db9fdb3ae93d1592ea2f8132
SHA14c0547c04a8f7a06e436f8788bb7289a9768ef33
SHA256971a591b9c2f4d06d77268787d54220a48bac7b17b000b13777ff89f2d11c15c
SHA512c89a0fd39e19afdb6c0c24cd4427abda0bbd089f5ccc7487891065cffae058c6c2faf00d727d36ee6912e204155d4b0962cfc5ad2ada11bdd02ec7961294e2c8
-
Filesize
23KB
MD5170406561cfecbb33a7553e3436e89d1
SHA19b879dfac891b05821d1ccb7accf336a7c17cc70
SHA2560bd9cba1a2267bf9bc267bbd6d5f7d8b3ee01cef3441210e1255278873c621a3
SHA51227a05016a50a2114d952bad70071cc78d808654f345f41873f8667a1d75720c24b52842dfdbf6452bc3206dfd003edd20395924e80d87519ed6d99462c9f14ab
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04