Analysis
-
max time kernel
111s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 15:38
Behavioral task
behavioral1
Sample
f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe
Resource
win10v2004-20241007-en
General
-
Target
f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe
-
Size
829KB
-
MD5
72e95291904617709bd084ddc40514cc
-
SHA1
8235fdde80b1adc76e98e29d796675d6747c1b29
-
SHA256
f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf
-
SHA512
55615ac6ca7abe09f66266fbbd9681cf0f60994f6ca996fcfde7f9b93ce87ce631c1e7ec943f46e5079cf8a493f0cbecf64952122d2f0943082ecd9678538779
-
SSDEEP
12288:pMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9px4DyNT:pnsJ39LyjbJkQFMhmC+6GD91p
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 1220 ._cache_f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe 4520 Synaptics.exe 4168 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4412 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4412 EXCEL.EXE 4412 EXCEL.EXE 4412 EXCEL.EXE 4412 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 968 wrote to memory of 1220 968 f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe 82 PID 968 wrote to memory of 1220 968 f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe 82 PID 968 wrote to memory of 1220 968 f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe 82 PID 968 wrote to memory of 4520 968 f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe 84 PID 968 wrote to memory of 4520 968 f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe 84 PID 968 wrote to memory of 4520 968 f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe 84 PID 4520 wrote to memory of 4168 4520 Synaptics.exe 85 PID 4520 wrote to memory of 4168 4520 Synaptics.exe 85 PID 4520 wrote to memory of 4168 4520 Synaptics.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe"C:\Users\Admin\AppData\Local\Temp\f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Local\Temp\._cache_f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe"C:\Users\Admin\AppData\Local\Temp\._cache_f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1220
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4168
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
829KB
MD572e95291904617709bd084ddc40514cc
SHA18235fdde80b1adc76e98e29d796675d6747c1b29
SHA256f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf
SHA51255615ac6ca7abe09f66266fbbd9681cf0f60994f6ca996fcfde7f9b93ce87ce631c1e7ec943f46e5079cf8a493f0cbecf64952122d2f0943082ecd9678538779
-
C:\Users\Admin\AppData\Local\Temp\._cache_f4b7463799d57bfabb9c0e0cf8a4e1a3a7dad4daba97c552af1728a4f5bf9ebf.exe
Filesize75KB
MD52f9366f62dcd6e73dc3520c65bbf95da
SHA1792d846d45dee9d2f732b242c6f5c843fb27cb17
SHA256bd848b8d9ab1a6dafea89c0fb7647dd68a8356634e378fc2bdf46f44e05f699f
SHA512ee0ac811acbc031bd05442cf21eec537788e46763d6e8380f4a6b56abc6e6cd22868755d2b8bda3a1ed55545de1ecfa83e1ad2e66a13a30e314e5144ae8a257e
-
Filesize
17KB
MD58f3c7fbc1e051b36696dbd67e8ed4249
SHA1b6b3e8ff0aecce4e85ca9819cce2c9cce7a14c67
SHA2568a53a911752049160273f080c9631f519692de0aecd081b7b7c0239c5656f387
SHA5124ecb5f18cee44ef986845c49b2aa84c115180e277b866c4ebf9ccda94c0992cb2d2f8c0123ad0fb5558f63e0b37d6547f5e5971832ee44c55edd44521dd950a5