Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 08:58
Behavioral task
behavioral1
Sample
472c322ae03798af62f90c019ab49a5921e6546ee2378b475150876d23c67b8bN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
472c322ae03798af62f90c019ab49a5921e6546ee2378b475150876d23c67b8bN.exe
Resource
win10v2004-20241007-en
General
-
Target
472c322ae03798af62f90c019ab49a5921e6546ee2378b475150876d23c67b8bN.exe
-
Size
2.4MB
-
MD5
9891cf9599f31697272c1dd0c21729d0
-
SHA1
61f50a5b586d90469d92a3bdec8e85d8d7a2d8be
-
SHA256
472c322ae03798af62f90c019ab49a5921e6546ee2378b475150876d23c67b8b
-
SHA512
27545d72e39c751f68507b55bb4da99e3150e516bc53c5ecb4cee2faed01be9ae432bdd0d8a820981e4169bc3e91b68bd0a2f80f35ed046c605b1fa825b817cc
-
SSDEEP
49152:EnsHyjtk2MYC5GDTw80cTsjkWajsmJ5W9L/Hw+htd4dMR:Ensmtk2aZ8sjkVW9LI+hv4q
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 472c322ae03798af62f90c019ab49a5921e6546ee2378b475150876d23c67b8bN.exe -
Executes dropped EXE 3 IoCs
pid Process 1060 ._cache_472c322ae03798af62f90c019ab49a5921e6546ee2378b475150876d23c67b8bN.exe 4540 Synaptics.exe 4748 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 472c322ae03798af62f90c019ab49a5921e6546ee2378b475150876d23c67b8bN.exe -
AutoIT Executable 5 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0008000000023c94-5.dat autoit_exe behavioral2/files/0x0007000000023c9b-65.dat autoit_exe behavioral2/memory/1332-145-0x0000000000400000-0x0000000000669000-memory.dmp autoit_exe behavioral2/memory/4540-264-0x0000000000400000-0x0000000000669000-memory.dmp autoit_exe behavioral2/memory/4540-296-0x0000000000400000-0x0000000000669000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 472c322ae03798af62f90c019ab49a5921e6546ee2378b475150876d23c67b8bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_472c322ae03798af62f90c019ab49a5921e6546ee2378b475150876d23c67b8bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language ._cache_472c322ae03798af62f90c019ab49a5921e6546ee2378b475150876d23c67b8bN.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage ._cache_472c322ae03798af62f90c019ab49a5921e6546ee2378b475150876d23c67b8bN.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 472c322ae03798af62f90c019ab49a5921e6546ee2378b475150876d23c67b8bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3388 EXCEL.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1060 ._cache_472c322ae03798af62f90c019ab49a5921e6546ee2378b475150876d23c67b8bN.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3388 EXCEL.EXE 3388 EXCEL.EXE 3388 EXCEL.EXE 3388 EXCEL.EXE 3388 EXCEL.EXE 3388 EXCEL.EXE 3388 EXCEL.EXE 3388 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1332 wrote to memory of 1060 1332 472c322ae03798af62f90c019ab49a5921e6546ee2378b475150876d23c67b8bN.exe 83 PID 1332 wrote to memory of 1060 1332 472c322ae03798af62f90c019ab49a5921e6546ee2378b475150876d23c67b8bN.exe 83 PID 1332 wrote to memory of 1060 1332 472c322ae03798af62f90c019ab49a5921e6546ee2378b475150876d23c67b8bN.exe 83 PID 1332 wrote to memory of 4540 1332 472c322ae03798af62f90c019ab49a5921e6546ee2378b475150876d23c67b8bN.exe 84 PID 1332 wrote to memory of 4540 1332 472c322ae03798af62f90c019ab49a5921e6546ee2378b475150876d23c67b8bN.exe 84 PID 1332 wrote to memory of 4540 1332 472c322ae03798af62f90c019ab49a5921e6546ee2378b475150876d23c67b8bN.exe 84 PID 4540 wrote to memory of 4748 4540 Synaptics.exe 85 PID 4540 wrote to memory of 4748 4540 Synaptics.exe 85 PID 4540 wrote to memory of 4748 4540 Synaptics.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\472c322ae03798af62f90c019ab49a5921e6546ee2378b475150876d23c67b8bN.exe"C:\Users\Admin\AppData\Local\Temp\472c322ae03798af62f90c019ab49a5921e6546ee2378b475150876d23c67b8bN.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\._cache_472c322ae03798af62f90c019ab49a5921e6546ee2378b475150876d23c67b8bN.exe"C:\Users\Admin\AppData\Local\Temp\._cache_472c322ae03798af62f90c019ab49a5921e6546ee2378b475150876d23c67b8bN.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:1060
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4748
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD59891cf9599f31697272c1dd0c21729d0
SHA161f50a5b586d90469d92a3bdec8e85d8d7a2d8be
SHA256472c322ae03798af62f90c019ab49a5921e6546ee2378b475150876d23c67b8b
SHA51227545d72e39c751f68507b55bb4da99e3150e516bc53c5ecb4cee2faed01be9ae432bdd0d8a820981e4169bc3e91b68bd0a2f80f35ed046c605b1fa825b817cc
-
C:\Users\Admin\AppData\Local\Temp\._cache_472c322ae03798af62f90c019ab49a5921e6546ee2378b475150876d23c67b8bN.exe
Filesize1.7MB
MD59e146a5074b4714ab69f72ed35120c2f
SHA117a9567a419593d647123409f72fb0d967a3aaf8
SHA2567119ca55e4b7b236cdcd2f775e97bc445838951ab09c60e987047039da76842f
SHA512b5de19177d25dde089e0e069b56411661624d39f9f2895e3dfb3fc1a0fee2dcacf7be6e12a1366e61a71431221188c9829bd43c625bf2c349ef8a777a807cb04
-
Filesize
21KB
MD5901e6a1c117db881a9fd87e2c4e1167a
SHA182c071e7b6e569407fc793d644d58804abb1a110
SHA256b840c31a78e1fb014009c97722d37a0f42e5af98ffaf05ee24c05bd5b89c3db3
SHA5126ea973e0e1b643cdaf1ba03ce5cbf8c7a0a19978f6c9c2f01165e88beb239d7bb6825d5f8e1c9c0070ec85f2700f70ebbca5c34dda16bf1dbd032838ba6a65ca
-
Filesize
9KB
MD5569a5eb2ab769a78b1e0f58f91f7d858
SHA154cb74804da4f72e05bc009a3a658fd8ceab639b
SHA2561b873f2d310206fc821c963dd7254e1a8c3b418ee9f01383d3f0ced0ef06c286
SHA5125d99e6cba41ff82c47288755ce08b6d06fa06f59e4e3b33a9fd686c22c0447098c915679bf8e9d48256843a6f35dc190e6be79fbfae431733daa9ddd00b5699a
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04