Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 15:38
Behavioral task
behavioral1
Sample
f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe
Resource
win10v2004-20241007-en
General
-
Target
f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe
-
Size
829KB
-
MD5
72e95291904617709bd084ddc40514cc
-
SHA1
8235fdde80b1adc76e98e29d796675d6747c1b29
-
SHA256
f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf
-
SHA512
55615ac6ca7abe09f66266fbbd9681cf0f60994f6ca996fcfde7f9b93ce87ce631c1e7ec943f46e5079cf8a493f0cbecf64952122d2f0943082ecd9678538779
-
SSDEEP
12288:pMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9px4DyNT:pnsJ39LyjbJkQFMhmC+6GD91p
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 1716 ._cache_f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe 2712 Synaptics.exe 2852 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 2960 f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe 2960 f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe 2960 f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe 2712 Synaptics.exe 2712 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2728 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2728 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2960 wrote to memory of 1716 2960 f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe 30 PID 2960 wrote to memory of 1716 2960 f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe 30 PID 2960 wrote to memory of 1716 2960 f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe 30 PID 2960 wrote to memory of 1716 2960 f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe 30 PID 2960 wrote to memory of 2712 2960 f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe 32 PID 2960 wrote to memory of 2712 2960 f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe 32 PID 2960 wrote to memory of 2712 2960 f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe 32 PID 2960 wrote to memory of 2712 2960 f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe 32 PID 2712 wrote to memory of 2852 2712 Synaptics.exe 33 PID 2712 wrote to memory of 2852 2712 Synaptics.exe 33 PID 2712 wrote to memory of 2852 2712 Synaptics.exe 33 PID 2712 wrote to memory of 2852 2712 Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe"C:\Users\Admin\AppData\Local\Temp\f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\._cache_f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe"C:\Users\Admin\AppData\Local\Temp\._cache_f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe"2⤵
- Executes dropped EXE
PID:1716
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2852
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
829KB
MD572e95291904617709bd084ddc40514cc
SHA18235fdde80b1adc76e98e29d796675d6747c1b29
SHA256f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf
SHA51255615ac6ca7abe09f66266fbbd9681cf0f60994f6ca996fcfde7f9b93ce87ce631c1e7ec943f46e5079cf8a493f0cbecf64952122d2f0943082ecd9678538779
-
Filesize
17KB
MD58f3c7fbc1e051b36696dbd67e8ed4249
SHA1b6b3e8ff0aecce4e85ca9819cce2c9cce7a14c67
SHA2568a53a911752049160273f080c9631f519692de0aecd081b7b7c0239c5656f387
SHA5124ecb5f18cee44ef986845c49b2aa84c115180e277b866c4ebf9ccda94c0992cb2d2f8c0123ad0fb5558f63e0b37d6547f5e5971832ee44c55edd44521dd950a5
-
\Users\Admin\AppData\Local\Temp\._cache_f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe
Filesize75KB
MD52f9366f62dcd6e73dc3520c65bbf95da
SHA1792d846d45dee9d2f732b242c6f5c843fb27cb17
SHA256bd848b8d9ab1a6dafea89c0fb7647dd68a8356634e378fc2bdf46f44e05f699f
SHA512ee0ac811acbc031bd05442cf21eec537788e46763d6e8380f4a6b56abc6e6cd22868755d2b8bda3a1ed55545de1ecfa83e1ad2e66a13a30e314e5144ae8a257e