Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
107s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/12/2024, 18:53
Behavioral task
behavioral1
Sample
a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9.exe
Resource
win10v2004-20241007-en
General
-
Target
a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9.exe
-
Size
1.2MB
-
MD5
b8827e4fa6149576aa16cbcf9ff30819
-
SHA1
fc43eee5eff356d8b66cd0e493d990262d1dcc61
-
SHA256
a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9
-
SHA512
975a3e56df9fd37b2fb82211caa7d7271ff067a35f1fab271a26bf34c9c864bac775fa09815c37e591d38db914731cf6fb4309700daa1ae19a43aeb24ae3e65f
-
SSDEEP
24576:TnsJ39LyjbJkQFMhmC+6GD9ANDbqUo5uCMiJ0vH:TnsHyjtk2MYC5GD+Nto5uCAv
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2840 ._cache_a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9.exe 1044 Synaptics.exe 1108 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 1820 a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9.exe 1820 a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9.exe 1820 a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9.exe 1820 a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9.exe 1044 Synaptics.exe 1044 Synaptics.exe 1044 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9.exe -
resource yara_rule behavioral1/files/0x00080000000120ff-4.dat upx behavioral1/memory/2840-21-0x0000000000400000-0x0000000000557000-memory.dmp upx behavioral1/memory/1108-236-0x0000000000400000-0x0000000000557000-memory.dmp upx behavioral1/memory/2840-274-0x0000000000400000-0x0000000000557000-memory.dmp upx behavioral1/memory/2840-275-0x0000000000400000-0x0000000000557000-memory.dmp upx behavioral1/memory/1108-278-0x0000000000400000-0x0000000000557000-memory.dmp upx behavioral1/memory/2840-283-0x0000000000400000-0x0000000000557000-memory.dmp upx behavioral1/memory/1108-285-0x0000000000400000-0x0000000000557000-memory.dmp upx behavioral1/memory/2840-286-0x0000000000400000-0x0000000000557000-memory.dmp upx behavioral1/memory/1108-288-0x0000000000400000-0x0000000000557000-memory.dmp upx behavioral1/memory/2840-293-0x0000000000400000-0x0000000000557000-memory.dmp upx behavioral1/memory/1108-295-0x0000000000400000-0x0000000000557000-memory.dmp upx behavioral1/memory/2840-296-0x0000000000400000-0x0000000000557000-memory.dmp upx behavioral1/memory/1108-298-0x0000000000400000-0x0000000000557000-memory.dmp upx behavioral1/memory/2840-301-0x0000000000400000-0x0000000000557000-memory.dmp upx behavioral1/memory/1108-304-0x0000000000400000-0x0000000000557000-memory.dmp upx behavioral1/memory/2840-305-0x0000000000400000-0x0000000000557000-memory.dmp upx behavioral1/memory/1108-307-0x0000000000400000-0x0000000000557000-memory.dmp upx behavioral1/memory/2840-334-0x0000000000400000-0x0000000000557000-memory.dmp upx behavioral1/memory/1108-336-0x0000000000400000-0x0000000000557000-memory.dmp upx behavioral1/memory/2840-337-0x0000000000400000-0x0000000000557000-memory.dmp upx behavioral1/memory/1108-339-0x0000000000400000-0x0000000000557000-memory.dmp upx behavioral1/memory/2840-340-0x0000000000400000-0x0000000000557000-memory.dmp upx behavioral1/memory/1108-342-0x0000000000400000-0x0000000000557000-memory.dmp upx behavioral1/memory/2840-343-0x0000000000400000-0x0000000000557000-memory.dmp upx behavioral1/memory/1108-345-0x0000000000400000-0x0000000000557000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TypedURLs ._cache_Synaptics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Save Directory = "\\" ._cache_Synaptics.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main ._cache_Synaptics.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TypedURLs ._cache_a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Save Directory = "\\" ._cache_a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main ._cache_a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2860 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 2840 ._cache_a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9.exe 2840 ._cache_a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9.exe 2840 ._cache_a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9.exe 2840 ._cache_a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9.exe 2840 ._cache_a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9.exe 1108 ._cache_Synaptics.exe 1108 ._cache_Synaptics.exe 1108 ._cache_Synaptics.exe 1108 ._cache_Synaptics.exe 1108 ._cache_Synaptics.exe 2860 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2840 1820 a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9.exe 28 PID 1820 wrote to memory of 2840 1820 a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9.exe 28 PID 1820 wrote to memory of 2840 1820 a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9.exe 28 PID 1820 wrote to memory of 2840 1820 a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9.exe 28 PID 1820 wrote to memory of 1044 1820 a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9.exe 29 PID 1820 wrote to memory of 1044 1820 a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9.exe 29 PID 1820 wrote to memory of 1044 1820 a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9.exe 29 PID 1820 wrote to memory of 1044 1820 a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9.exe 29 PID 1044 wrote to memory of 1108 1044 Synaptics.exe 30 PID 1044 wrote to memory of 1108 1044 Synaptics.exe 30 PID 1044 wrote to memory of 1108 1044 Synaptics.exe 30 PID 1044 wrote to memory of 1108 1044 Synaptics.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9.exe"C:\Users\Admin\AppData\Local\Temp\a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\._cache_a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9.exe"C:\Users\Admin\AppData\Local\Temp\._cache_a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2840
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1108
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5b8827e4fa6149576aa16cbcf9ff30819
SHA1fc43eee5eff356d8b66cd0e493d990262d1dcc61
SHA256a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9
SHA512975a3e56df9fd37b2fb82211caa7d7271ff067a35f1fab271a26bf34c9c864bac775fa09815c37e591d38db914731cf6fb4309700daa1ae19a43aeb24ae3e65f
-
Filesize
23B
MD55671ad767fc7e1af34132342e9ad06c1
SHA1575fdcb80b55a91e62e6687937038d0ca909bc2d
SHA25680e49c644396b856544a0ea6e0962c8d9fb4f8c499a249880d2ac8c30579accd
SHA5125b7f7bcf14eaa9a2f500711bac3a8d9c3f7adc0c2c2cafbfe6e4d1e406c1b3b7f00df3e0dd85a0e531f4d4d1d58298e77c4d9c0bb976e86e5a191e80ca010974
-
Filesize
61B
MD594771a318b9920c00c1cd5bdd89bfc14
SHA1e5042d31ebb328008fc9d9b1312f97068a372534
SHA256753337fbe05fa5374b6cf05b24de90ab179bf00e00432da7a78ac8fd5a9cd0e2
SHA51223af3006e5f5e20e78d9ab30a92a0131ac32c6c19290f8365efd7e53a911ded34d3e84d5881093ab7b9c30d1ff3c854b87f67d6413ff6d0796a33f42475a5d92
-
Filesize
73B
MD5ce40fde7e86c626a1d1511fe13924328
SHA1339b4326770fe23fe841150d9a4b6dbcf44cb691
SHA25645bb8dc8db3083bd93c21d1a5607e8432133181a211a79ebce92a7ad18cd1b71
SHA512e03dcdbec0bcb2f94262a5017b4768d94b21567f44b5f4cc58eb1d8f52fef68be2f130bb5286cbb5992a1835332ad6c6c4d525f1011a6e7b6a21be42a57fa6b5
-
Filesize
17KB
MD58f3c7fbc1e051b36696dbd67e8ed4249
SHA1b6b3e8ff0aecce4e85ca9819cce2c9cce7a14c67
SHA2568a53a911752049160273f080c9631f519692de0aecd081b7b7c0239c5656f387
SHA5124ecb5f18cee44ef986845c49b2aa84c115180e277b866c4ebf9ccda94c0992cb2d2f8c0123ad0fb5558f63e0b37d6547f5e5971832ee44c55edd44521dd950a5
-
\Users\Admin\AppData\Local\Temp\._cache_a07db5ee88458ada018809f1b8cc5b2fc605fc0502d0af51172dcfe870b55be9.exe
Filesize485KB
MD59894a7298ad832b8ef73e749a9acf4ab
SHA1039aa843dbe090f0ea785ae04cf125abbcf4f28f
SHA256128fc38fe26637a05405cbe3031b017a2ab12956877fc575efc709a2f920c86a
SHA5123394e82423c1d5392154295cd1627fef99a6a8cf73a88799170bc845767edb06e6d87c45f1a0bd5635c96666d75a23140e5e04b5a2a6675eb86654dd9cf9e615