Analysis
-
max time kernel
110s -
max time network
101s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 02:35
Behavioral task
behavioral1
Sample
e397e81f529becf675472779616d70a369cb591c7f642db0f3dce1555f6d58b9N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e397e81f529becf675472779616d70a369cb591c7f642db0f3dce1555f6d58b9N.exe
Resource
win10v2004-20241007-en
General
-
Target
e397e81f529becf675472779616d70a369cb591c7f642db0f3dce1555f6d58b9N.exe
-
Size
2.0MB
-
MD5
2305b1a8b8f394f371e997337140cc00
-
SHA1
1f1dccb5df62526a069ebdf019115c4284f18922
-
SHA256
e397e81f529becf675472779616d70a369cb591c7f642db0f3dce1555f6d58b9
-
SHA512
9633e37977215f08acf35c7e7106d00f2d347d6c1b89990fd5808bdd489e05881c54b66a774f9fd297482980fec1e77d9b6e41f5a6d2a6dc4baabdd4a2c2c12c
-
SSDEEP
49152:XnsHyjtk2MYC5GDgvRlyycuEU7NyZ7JOyra/uN4E:Xnsmtk2aXy1uEU7Nu7JOyUq
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 3044 ._cache_e397e81f529becf675472779616d70a369cb591c7f642db0f3dce1555f6d58b9N.exe 2016 Synaptics.exe 2316 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 2104 e397e81f529becf675472779616d70a369cb591c7f642db0f3dce1555f6d58b9N.exe 2104 e397e81f529becf675472779616d70a369cb591c7f642db0f3dce1555f6d58b9N.exe 2104 e397e81f529becf675472779616d70a369cb591c7f642db0f3dce1555f6d58b9N.exe 2104 e397e81f529becf675472779616d70a369cb591c7f642db0f3dce1555f6d58b9N.exe 2016 Synaptics.exe 2016 Synaptics.exe 2016 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" e397e81f529becf675472779616d70a369cb591c7f642db0f3dce1555f6d58b9N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e397e81f529becf675472779616d70a369cb591c7f642db0f3dce1555f6d58b9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1872 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1872 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2104 wrote to memory of 3044 2104 e397e81f529becf675472779616d70a369cb591c7f642db0f3dce1555f6d58b9N.exe 30 PID 2104 wrote to memory of 3044 2104 e397e81f529becf675472779616d70a369cb591c7f642db0f3dce1555f6d58b9N.exe 30 PID 2104 wrote to memory of 3044 2104 e397e81f529becf675472779616d70a369cb591c7f642db0f3dce1555f6d58b9N.exe 30 PID 2104 wrote to memory of 3044 2104 e397e81f529becf675472779616d70a369cb591c7f642db0f3dce1555f6d58b9N.exe 30 PID 2104 wrote to memory of 2016 2104 e397e81f529becf675472779616d70a369cb591c7f642db0f3dce1555f6d58b9N.exe 31 PID 2104 wrote to memory of 2016 2104 e397e81f529becf675472779616d70a369cb591c7f642db0f3dce1555f6d58b9N.exe 31 PID 2104 wrote to memory of 2016 2104 e397e81f529becf675472779616d70a369cb591c7f642db0f3dce1555f6d58b9N.exe 31 PID 2104 wrote to memory of 2016 2104 e397e81f529becf675472779616d70a369cb591c7f642db0f3dce1555f6d58b9N.exe 31 PID 2016 wrote to memory of 2316 2016 Synaptics.exe 32 PID 2016 wrote to memory of 2316 2016 Synaptics.exe 32 PID 2016 wrote to memory of 2316 2016 Synaptics.exe 32 PID 2016 wrote to memory of 2316 2016 Synaptics.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e397e81f529becf675472779616d70a369cb591c7f642db0f3dce1555f6d58b9N.exe"C:\Users\Admin\AppData\Local\Temp\e397e81f529becf675472779616d70a369cb591c7f642db0f3dce1555f6d58b9N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\._cache_e397e81f529becf675472779616d70a369cb591c7f642db0f3dce1555f6d58b9N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_e397e81f529becf675472779616d70a369cb591c7f642db0f3dce1555f6d58b9N.exe"2⤵
- Executes dropped EXE
PID:3044
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2316
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD52305b1a8b8f394f371e997337140cc00
SHA11f1dccb5df62526a069ebdf019115c4284f18922
SHA256e397e81f529becf675472779616d70a369cb591c7f642db0f3dce1555f6d58b9
SHA5129633e37977215f08acf35c7e7106d00f2d347d6c1b89990fd5808bdd489e05881c54b66a774f9fd297482980fec1e77d9b6e41f5a6d2a6dc4baabdd4a2c2c12c
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
25KB
MD50d69857ac2232d2c47979dd9f1ccd2fd
SHA146966a682c89784567379a2babd73b0b86a3dc7e
SHA256145693e23a5a999651ffe63e40be46c05e6e513e88497fc4d4c75b4fbeee707d
SHA512e23cc48a1108f3b4ce62cd5f5e1044a5821ae08ac365e130d2870a736183d6dc28dc0c563d7366852153f896c238291c8f219dd2a010edf28b8f2b4673979f9c
-
Filesize
23KB
MD563842aca2f0fbe1ea0e0d8024ab9bf05
SHA1843efe62e651ff4ead5399da1ea6832c95ce741d
SHA256c4fed45b4e9b8f1c2e5115451cf2350b688ce4f8f2535f29d30960cf98285d22
SHA51260147519a1cfaa20db10283698b43811ccdf3cc28db5dc99b84fd0a540cbb6e4bf28d70a2a783d5329ad83edbd482c1def43419b5da99bf356d4ea8118615676
-
Filesize
21KB
MD5e6ad182519fb1c4b3165e32b013b34e1
SHA1edda6e2f2acf16898463bfa456e46aa07501315e
SHA2566a9485bbe31b557c0bf330928a382f63159fcb39349e7be30da09e2fc73a2729
SHA512d139463ad68315be37288a887ee07876d6d1e4f5e0bc6f4923fbcb0bfff2e63d17df6b18930c4350838a2cc26ef3230c502f5431af7d765995b820d748bccab3
-
Filesize
21KB
MD568fbc177ba87a0f476f366dfb7437260
SHA1b86d6deb9bc6d025c1058dfe31acfc65af2a4040
SHA2567f6e875a3d4a79ac0295b4966b27e89d7f0c788cea135fc6f823d3306275e6fa
SHA51272bdb1a6b7525a6093803b0506acd60e6434b97ee2d93ccc974dc65db50e81c120c75d33f1d2c7f8a26799a2c1be6795cc6d6c84ea50faf08be5b682c0e7d301
-
Filesize
26KB
MD57ef808e3017e0644abfb2bae159a8927
SHA17b1c601a27b0c82a73a35df39744dd673859305a
SHA256dd342896d116cc98c6afcc97f99a0c45460d739e6359ec53cb22afcf0578ece4
SHA51239005dec2bdc50e5956b654a3d7b8fc87c796e62331a6751bcd7d6310982136f9144a10ad02a5834fd6bc30bd75974365e83ba9b9165b18a2e043b0a23b0371f
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
\Users\Admin\AppData\Local\Temp\._cache_e397e81f529becf675472779616d70a369cb591c7f642db0f3dce1555f6d58b9N.exe
Filesize1.2MB
MD5e2c16921ee7d949dbb70234fc235f726
SHA18f97c737f378559e257804accdc8fa73a179143a
SHA256bdfe57913c83bc1e5647ef0b75c647ff3b36673790d2abb3593dcf9f1b426ad6
SHA512184d7b3b0e67ca9fabdf85f4c70a319fbbca63b07ce7e487e5a539eda9d93de9b757a32e132d0d50f64b7f45bd4f7e271e2e41c0d972b462188f2cf2ba362205