Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 01:41
Behavioral task
behavioral1
Sample
9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe
Resource
win10v2004-20241007-en
General
-
Target
9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe
-
Size
1.6MB
-
MD5
12c15622b2ea89ac2d013e40f3c840c6
-
SHA1
cec0c45eab3f56c9d428599c65b1b3b91e1a8c09
-
SHA256
9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66
-
SHA512
e494348a209a2a18baeab35d1a219651d4088cccad0f27bb04a484f8363bf2fb6f0db493859984b7d3095b0a0a1a06337bfb38fcec1213f8afee548d662b881c
-
SSDEEP
24576:gnsJ39LyjbJkQFMhmC+6GD9mp2gARDzWUHcW5BKDoEnAuB3VcXsQiWfw:gnsHyjtk2MYC5GDzgAxz3HcWv2BmBw
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe -
Executes dropped EXE 5 IoCs
pid Process 1476 ._cache_9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe 376 Synaptics.exe 3580 ._cache_Synaptics.exe 3992 ._cache_9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe 2884 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\cCSZUelxYK = "\"C:\\Users\\Admin\\AppData\\Local\\PHYNUZ~1\\CPUCHE~1.EXE\"" ._cache_Synaptics.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1476 set thread context of 3992 1476 ._cache_9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe 95 PID 3580 set thread context of 2884 3580 ._cache_Synaptics.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3672 3992 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1080 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2884 ._cache_Synaptics.exe 2884 ._cache_Synaptics.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1476 ._cache_9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe Token: SeDebugPrivilege 3580 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1080 EXCEL.EXE 1080 EXCEL.EXE 1080 EXCEL.EXE 1080 EXCEL.EXE 1080 EXCEL.EXE 1080 EXCEL.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1336 wrote to memory of 1476 1336 9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe 83 PID 1336 wrote to memory of 1476 1336 9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe 83 PID 1336 wrote to memory of 1476 1336 9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe 83 PID 1336 wrote to memory of 376 1336 9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe 84 PID 1336 wrote to memory of 376 1336 9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe 84 PID 1336 wrote to memory of 376 1336 9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe 84 PID 376 wrote to memory of 3580 376 Synaptics.exe 85 PID 376 wrote to memory of 3580 376 Synaptics.exe 85 PID 376 wrote to memory of 3580 376 Synaptics.exe 85 PID 1476 wrote to memory of 3992 1476 ._cache_9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe 95 PID 1476 wrote to memory of 3992 1476 ._cache_9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe 95 PID 1476 wrote to memory of 3992 1476 ._cache_9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe 95 PID 1476 wrote to memory of 3992 1476 ._cache_9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe 95 PID 1476 wrote to memory of 3992 1476 ._cache_9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe 95 PID 1476 wrote to memory of 3992 1476 ._cache_9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe 95 PID 1476 wrote to memory of 3992 1476 ._cache_9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe 95 PID 1476 wrote to memory of 3992 1476 ._cache_9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe 95 PID 1476 wrote to memory of 3992 1476 ._cache_9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe 95 PID 3580 wrote to memory of 2884 3580 ._cache_Synaptics.exe 100 PID 3580 wrote to memory of 2884 3580 ._cache_Synaptics.exe 100 PID 3580 wrote to memory of 2884 3580 ._cache_Synaptics.exe 100 PID 3580 wrote to memory of 2884 3580 ._cache_Synaptics.exe 100 PID 3580 wrote to memory of 2884 3580 ._cache_Synaptics.exe 100 PID 3580 wrote to memory of 2884 3580 ._cache_Synaptics.exe 100 PID 3580 wrote to memory of 2884 3580 ._cache_Synaptics.exe 100 PID 3580 wrote to memory of 2884 3580 ._cache_Synaptics.exe 100 PID 3580 wrote to memory of 2884 3580 ._cache_Synaptics.exe 100 PID 2884 wrote to memory of 4780 2884 ._cache_Synaptics.exe 101 PID 2884 wrote to memory of 4780 2884 ._cache_Synaptics.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe"C:\Users\Admin\AppData\Local\Temp\9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\._cache_9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe"C:\Users\Admin\AppData\Local\Temp\._cache_9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\._cache_9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe"C:\Users\Admin\AppData\Local\Temp\._cache_9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe"3⤵
- Executes dropped EXE
PID:3992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 3764⤵
- Program crash
PID:3672
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -a cryptonight -o stratum+tcp://pool.minexmr.com:4444 -u 4BrL51JCc9NGQ71kWhnYoDRffsDZy7m1HUU7MRU4nUMXAHNFBEJhkTZV9HdaL4gfuNBxLPc3BeMkLGaPbF5vWtANQpR48NWyTtgLF8daDK.newminer -p x -t 85⤵PID:4780
-
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3992 -ip 39921⤵PID:2636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD512c15622b2ea89ac2d013e40f3c840c6
SHA1cec0c45eab3f56c9d428599c65b1b3b91e1a8c09
SHA2569da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66
SHA512e494348a209a2a18baeab35d1a219651d4088cccad0f27bb04a484f8363bf2fb6f0db493859984b7d3095b0a0a1a06337bfb38fcec1213f8afee548d662b881c
-
C:\Users\Admin\AppData\Local\Temp\._cache_9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe
Filesize924KB
MD5e636189bce45b8bde5a59464b108cca4
SHA1828201fd6561fd992d80d40fd7c1432552f32211
SHA25686170ddd6b618ee94b8049da9486adff45f98979d62be8b4fd99f6fc6f0994f2
SHA51296887f07d155616d0905cca11d900e1020a8b28e79e6ddf665223c2a91d6ae774d6343d62836e6ad532911baf4abee93b58cafb452d360a63b4304bc9d469720
-
Filesize
26KB
MD545585ed7d31ba1434ce391e139c43f05
SHA1cd54312f47136a832302b081cf76768d69e36d74
SHA256a279a95965c5d70546f917145b3019afd3b474004fda976368e07df3d0e5ea0c
SHA51261b211f01f1ed09c57341dd466435a97c5037aeafe4a9e1c30241f20e69c45abfd902f1225e38c11599e0023378f4bbd00e5b5ce26b5b4981fe1813f66f440f3
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04