Analysis
-
max time kernel
141s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 01:17
Behavioral task
behavioral1
Sample
90d7154ab0eb04f847f661b17d421142930528bc8e1484e2bd7b7fe51d11254f.exe
Resource
win7-20240903-en
General
-
Target
90d7154ab0eb04f847f661b17d421142930528bc8e1484e2bd7b7fe51d11254f.exe
-
Size
3.5MB
-
MD5
ebc8627852b666e23093d0e2866a3541
-
SHA1
c566deae49e311cab73f4c46c52cc007773a2677
-
SHA256
90d7154ab0eb04f847f661b17d421142930528bc8e1484e2bd7b7fe51d11254f
-
SHA512
4c7c3a94e107ebb7d25e677b5e81f90a81bdd1316d8aedf38a09b709ed7890653732d5e32b356a0367f7d800f736f891692aa3185e30ffe492a50db0320717a1
-
SSDEEP
98304:vnsmtk2aw++l1Nph+3DnftLxTS4YNukVD/z:/LFvh+3rFLxTiYc
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 1336 ._cache_90d7154ab0eb04f847f661b17d421142930528bc8e1484e2bd7b7fe51d11254f.exe 2660 Synaptics.exe 2692 ._cache_Synaptics.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine ._cache_90d7154ab0eb04f847f661b17d421142930528bc8e1484e2bd7b7fe51d11254f.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 2308 90d7154ab0eb04f847f661b17d421142930528bc8e1484e2bd7b7fe51d11254f.exe 2308 90d7154ab0eb04f847f661b17d421142930528bc8e1484e2bd7b7fe51d11254f.exe 2308 90d7154ab0eb04f847f661b17d421142930528bc8e1484e2bd7b7fe51d11254f.exe 2308 90d7154ab0eb04f847f661b17d421142930528bc8e1484e2bd7b7fe51d11254f.exe 2660 Synaptics.exe 2660 Synaptics.exe 2660 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 90d7154ab0eb04f847f661b17d421142930528bc8e1484e2bd7b7fe51d11254f.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ._cache_90d7154ab0eb04f847f661b17d421142930528bc8e1484e2bd7b7fe51d11254f.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ._cache_Synaptics.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 ._cache_90d7154ab0eb04f847f661b17d421142930528bc8e1484e2bd7b7fe51d11254f.exe File opened for modification \??\PhysicalDrive0 ._cache_Synaptics.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2692 ._cache_Synaptics.exe 1336 ._cache_90d7154ab0eb04f847f661b17d421142930528bc8e1484e2bd7b7fe51d11254f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90d7154ab0eb04f847f661b17d421142930528bc8e1484e2bd7b7fe51d11254f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_90d7154ab0eb04f847f661b17d421142930528bc8e1484e2bd7b7fe51d11254f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2624 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2692 ._cache_Synaptics.exe 1336 ._cache_90d7154ab0eb04f847f661b17d421142930528bc8e1484e2bd7b7fe51d11254f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2624 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2308 wrote to memory of 1336 2308 90d7154ab0eb04f847f661b17d421142930528bc8e1484e2bd7b7fe51d11254f.exe 31 PID 2308 wrote to memory of 1336 2308 90d7154ab0eb04f847f661b17d421142930528bc8e1484e2bd7b7fe51d11254f.exe 31 PID 2308 wrote to memory of 1336 2308 90d7154ab0eb04f847f661b17d421142930528bc8e1484e2bd7b7fe51d11254f.exe 31 PID 2308 wrote to memory of 1336 2308 90d7154ab0eb04f847f661b17d421142930528bc8e1484e2bd7b7fe51d11254f.exe 31 PID 2308 wrote to memory of 2660 2308 90d7154ab0eb04f847f661b17d421142930528bc8e1484e2bd7b7fe51d11254f.exe 32 PID 2308 wrote to memory of 2660 2308 90d7154ab0eb04f847f661b17d421142930528bc8e1484e2bd7b7fe51d11254f.exe 32 PID 2308 wrote to memory of 2660 2308 90d7154ab0eb04f847f661b17d421142930528bc8e1484e2bd7b7fe51d11254f.exe 32 PID 2308 wrote to memory of 2660 2308 90d7154ab0eb04f847f661b17d421142930528bc8e1484e2bd7b7fe51d11254f.exe 32 PID 2660 wrote to memory of 2692 2660 Synaptics.exe 33 PID 2660 wrote to memory of 2692 2660 Synaptics.exe 33 PID 2660 wrote to memory of 2692 2660 Synaptics.exe 33 PID 2660 wrote to memory of 2692 2660 Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\90d7154ab0eb04f847f661b17d421142930528bc8e1484e2bd7b7fe51d11254f.exe"C:\Users\Admin\AppData\Local\Temp\90d7154ab0eb04f847f661b17d421142930528bc8e1484e2bd7b7fe51d11254f.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\._cache_90d7154ab0eb04f847f661b17d421142930528bc8e1484e2bd7b7fe51d11254f.exe"C:\Users\Admin\AppData\Local\Temp\._cache_90d7154ab0eb04f847f661b17d421142930528bc8e1484e2bd7b7fe51d11254f.exe"2⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1336
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2692
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2624
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
1Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD5ebc8627852b666e23093d0e2866a3541
SHA1c566deae49e311cab73f4c46c52cc007773a2677
SHA25690d7154ab0eb04f847f661b17d421142930528bc8e1484e2bd7b7fe51d11254f
SHA5124c7c3a94e107ebb7d25e677b5e81f90a81bdd1316d8aedf38a09b709ed7890653732d5e32b356a0367f7d800f736f891692aa3185e30ffe492a50db0320717a1
-
Filesize
4KB
MD5c3d39266a9df0e8d161cba655a22e029
SHA15032b7cf0172cbf75994db23d318226b8618406c
SHA256a5148b746ff3125073624d7c25f1111534f21dd1c186ddb0f68d9aab303869fc
SHA512fdaeb3014e9c2ce57fea3fa04d5dae101bfc85f93f0bbf40f04326cb9def99f00d98dd5124ee924f499b595e8941ad3115f5245be2673137ac2fe153b9b5bb9f
-
Filesize
17KB
MD5af4d37aad8b34471da588360a43e768a
SHA183ed64667d4e68ea531b8bcf58aab3ed4a5ca998
SHA256e7550c3453156531308fda255a198c3710aa4bc7412819c180b103c11e85cef1
SHA51274f5000038c47b7c909c4ee5740e0e87cac12c9c96fff8b1c7ec749541ee3d4b7efd80f9ac02cd39809dca3f2707d0063fa852a3a541342d93a9d03de08823da
-
\Users\Admin\AppData\Local\Temp\._cache_90d7154ab0eb04f847f661b17d421142930528bc8e1484e2bd7b7fe51d11254f.exe
Filesize2.7MB
MD516df9ef6f2ce18aac990122ec8de2cc7
SHA1fcc146696ddc9eead3817aaf2363b78d7fb8394d
SHA256491f20e8ad54ac6fc9beeabf1c2ce30a9fa1bd630b580fffee26c56589113de5
SHA512b835542aec29fbd70a8d212da3fec5ead4dea4936dd05a0218b8a6a8f7566326f7bf4245a81dabf5133e6b13cae40a6f69768462dbcc52854c371879da9b5987