Analysis
-
max time kernel
111s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 19:18
Behavioral task
behavioral1
Sample
08929148e8d4648c1c9a2be137a0ed622d380628463e45810f4822aa4c85d8c4N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
08929148e8d4648c1c9a2be137a0ed622d380628463e45810f4822aa4c85d8c4N.exe
Resource
win10v2004-20241007-en
General
-
Target
08929148e8d4648c1c9a2be137a0ed622d380628463e45810f4822aa4c85d8c4N.exe
-
Size
1.0MB
-
MD5
9111a0cc916fa0b277fb01452aee07b0
-
SHA1
b27ddf7448f93dd3e1a6a8390cec4dc7ff89bb5d
-
SHA256
08929148e8d4648c1c9a2be137a0ed622d380628463e45810f4822aa4c85d8c4
-
SHA512
63ff81d2bc7cd4663039308bb71a1f9ea3e438c61b2e7927bf23ae5410384b854cb4cfcd94009363b88678043c2b36f3f846d4d57d1f20b2faf231fcaf836198
-
SSDEEP
24576:KnsJ39LyjbJkQFMhmC+6GD9wOX2YGyzSDuAWjJC:KnsHyjtk2MYC5GDyOX2YgQs
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2752 ._cache_08929148e8d4648c1c9a2be137a0ed622d380628463e45810f4822aa4c85d8c4N.exe 2804 Synaptics.exe 1044 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 2772 08929148e8d4648c1c9a2be137a0ed622d380628463e45810f4822aa4c85d8c4N.exe 2772 08929148e8d4648c1c9a2be137a0ed622d380628463e45810f4822aa4c85d8c4N.exe 2772 08929148e8d4648c1c9a2be137a0ed622d380628463e45810f4822aa4c85d8c4N.exe 2772 08929148e8d4648c1c9a2be137a0ed622d380628463e45810f4822aa4c85d8c4N.exe 2804 Synaptics.exe 2804 Synaptics.exe 2804 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 08929148e8d4648c1c9a2be137a0ed622d380628463e45810f4822aa4c85d8c4N.exe -
resource yara_rule behavioral1/memory/2752-21-0x0000000000400000-0x000000000058A000-memory.dmp upx behavioral1/files/0x00080000000120cd-10.dat upx behavioral1/memory/2752-22-0x0000000000400000-0x000000000058A000-memory.dmp upx behavioral1/memory/1044-46-0x0000000000400000-0x000000000058A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08929148e8d4648c1c9a2be137a0ed622d380628463e45810f4822aa4c85d8c4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1712 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1712 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2752 2772 08929148e8d4648c1c9a2be137a0ed622d380628463e45810f4822aa4c85d8c4N.exe 30 PID 2772 wrote to memory of 2752 2772 08929148e8d4648c1c9a2be137a0ed622d380628463e45810f4822aa4c85d8c4N.exe 30 PID 2772 wrote to memory of 2752 2772 08929148e8d4648c1c9a2be137a0ed622d380628463e45810f4822aa4c85d8c4N.exe 30 PID 2772 wrote to memory of 2752 2772 08929148e8d4648c1c9a2be137a0ed622d380628463e45810f4822aa4c85d8c4N.exe 30 PID 2772 wrote to memory of 2804 2772 08929148e8d4648c1c9a2be137a0ed622d380628463e45810f4822aa4c85d8c4N.exe 32 PID 2772 wrote to memory of 2804 2772 08929148e8d4648c1c9a2be137a0ed622d380628463e45810f4822aa4c85d8c4N.exe 32 PID 2772 wrote to memory of 2804 2772 08929148e8d4648c1c9a2be137a0ed622d380628463e45810f4822aa4c85d8c4N.exe 32 PID 2772 wrote to memory of 2804 2772 08929148e8d4648c1c9a2be137a0ed622d380628463e45810f4822aa4c85d8c4N.exe 32 PID 2804 wrote to memory of 1044 2804 Synaptics.exe 33 PID 2804 wrote to memory of 1044 2804 Synaptics.exe 33 PID 2804 wrote to memory of 1044 2804 Synaptics.exe 33 PID 2804 wrote to memory of 1044 2804 Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\08929148e8d4648c1c9a2be137a0ed622d380628463e45810f4822aa4c85d8c4N.exe"C:\Users\Admin\AppData\Local\Temp\08929148e8d4648c1c9a2be137a0ed622d380628463e45810f4822aa4c85d8c4N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\._cache_08929148e8d4648c1c9a2be137a0ed622d380628463e45810f4822aa4c85d8c4N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_08929148e8d4648c1c9a2be137a0ed622d380628463e45810f4822aa4c85d8c4N.exe"2⤵
- Executes dropped EXE
PID:2752
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:1044
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD59111a0cc916fa0b277fb01452aee07b0
SHA1b27ddf7448f93dd3e1a6a8390cec4dc7ff89bb5d
SHA25608929148e8d4648c1c9a2be137a0ed622d380628463e45810f4822aa4c85d8c4
SHA51263ff81d2bc7cd4663039308bb71a1f9ea3e438c61b2e7927bf23ae5410384b854cb4cfcd94009363b88678043c2b36f3f846d4d57d1f20b2faf231fcaf836198
-
C:\Users\Admin\AppData\Local\Temp\._cache_08929148e8d4648c1c9a2be137a0ed622d380628463e45810f4822aa4c85d8c4N.exe
Filesize287KB
MD5ffa637abd482b5e7d3fb75182f43f080
SHA1d5589ff9d01d8d64669e41161f71e9969ee4204f
SHA2564d3d363b5b3dcd9fa516b481c92d62c02aed804318bdc4d5e97a68bb6e6d62db
SHA512515ed43190b9b73feb389efd125cbd4cd435b90189adf51a215cb28d70c564c936cfa6f7ec46b606212979947f341e2b854d33fdeefe190163e508dcfdd3375b
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
21KB
MD5a41259fd518700427b44fa6645985228
SHA1e83ce06232ca13466badb8d9a2cf0ad2001389c4
SHA256dbadd947bcb5c52b9fa1c32cfedb181950f70e31e1f2e75c4b54128d04af8105
SHA51298a49cb6b43b7584ff1458f85b6cb5490262ceeb0dd161b5fa9bbf547dde5605850d6474bfeab3f7ba6119a821ce269b7928398908844bd212f93600c1616518