Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
111s -
max time network
106s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
02/01/2025, 00:13
Behavioral task
behavioral1
Sample
1d8004dae7fe7320a1eca8e0bf11e4501bcea0fb10f619bcfc83489230c2b2d5N.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
1d8004dae7fe7320a1eca8e0bf11e4501bcea0fb10f619bcfc83489230c2b2d5N.exe
Resource
win10v2004-20241007-en
General
-
Target
1d8004dae7fe7320a1eca8e0bf11e4501bcea0fb10f619bcfc83489230c2b2d5N.exe
-
Size
925KB
-
MD5
c76bafc4c7c2f9586f39af3f15a2f000
-
SHA1
dc39d9e0d8b8ebc7e5ae56d3d0ea4909b0c4988a
-
SHA256
1d8004dae7fe7320a1eca8e0bf11e4501bcea0fb10f619bcfc83489230c2b2d5
-
SHA512
5523fcbc201dd0c7ae6267cead2bc73babe49e94dea57b230467c9850f11d4e171ee95e68432480f61c602321bb4fb6aac2387d87f7db98e68d3e80736d85ae8
-
SSDEEP
12288:kMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9RZvwnXj:knsJ39LyjbJkQFMhmC+6GD9noT
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2176 ._cache_1d8004dae7fe7320a1eca8e0bf11e4501bcea0fb10f619bcfc83489230c2b2d5N.exe 2536 Synaptics.exe 2932 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 472 1d8004dae7fe7320a1eca8e0bf11e4501bcea0fb10f619bcfc83489230c2b2d5N.exe 472 1d8004dae7fe7320a1eca8e0bf11e4501bcea0fb10f619bcfc83489230c2b2d5N.exe 472 1d8004dae7fe7320a1eca8e0bf11e4501bcea0fb10f619bcfc83489230c2b2d5N.exe 2536 Synaptics.exe 2536 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 1d8004dae7fe7320a1eca8e0bf11e4501bcea0fb10f619bcfc83489230c2b2d5N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d8004dae7fe7320a1eca8e0bf11e4501bcea0fb10f619bcfc83489230c2b2d5N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_1d8004dae7fe7320a1eca8e0bf11e4501bcea0fb10f619bcfc83489230c2b2d5N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2692 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2692 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 472 wrote to memory of 2176 472 1d8004dae7fe7320a1eca8e0bf11e4501bcea0fb10f619bcfc83489230c2b2d5N.exe 30 PID 472 wrote to memory of 2176 472 1d8004dae7fe7320a1eca8e0bf11e4501bcea0fb10f619bcfc83489230c2b2d5N.exe 30 PID 472 wrote to memory of 2176 472 1d8004dae7fe7320a1eca8e0bf11e4501bcea0fb10f619bcfc83489230c2b2d5N.exe 30 PID 472 wrote to memory of 2176 472 1d8004dae7fe7320a1eca8e0bf11e4501bcea0fb10f619bcfc83489230c2b2d5N.exe 30 PID 472 wrote to memory of 2536 472 1d8004dae7fe7320a1eca8e0bf11e4501bcea0fb10f619bcfc83489230c2b2d5N.exe 31 PID 472 wrote to memory of 2536 472 1d8004dae7fe7320a1eca8e0bf11e4501bcea0fb10f619bcfc83489230c2b2d5N.exe 31 PID 472 wrote to memory of 2536 472 1d8004dae7fe7320a1eca8e0bf11e4501bcea0fb10f619bcfc83489230c2b2d5N.exe 31 PID 472 wrote to memory of 2536 472 1d8004dae7fe7320a1eca8e0bf11e4501bcea0fb10f619bcfc83489230c2b2d5N.exe 31 PID 2536 wrote to memory of 2932 2536 Synaptics.exe 32 PID 2536 wrote to memory of 2932 2536 Synaptics.exe 32 PID 2536 wrote to memory of 2932 2536 Synaptics.exe 32 PID 2536 wrote to memory of 2932 2536 Synaptics.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d8004dae7fe7320a1eca8e0bf11e4501bcea0fb10f619bcfc83489230c2b2d5N.exe"C:\Users\Admin\AppData\Local\Temp\1d8004dae7fe7320a1eca8e0bf11e4501bcea0fb10f619bcfc83489230c2b2d5N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Users\Admin\AppData\Local\Temp\._cache_1d8004dae7fe7320a1eca8e0bf11e4501bcea0fb10f619bcfc83489230c2b2d5N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_1d8004dae7fe7320a1eca8e0bf11e4501bcea0fb10f619bcfc83489230c2b2d5N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2176
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2932
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
925KB
MD5c76bafc4c7c2f9586f39af3f15a2f000
SHA1dc39d9e0d8b8ebc7e5ae56d3d0ea4909b0c4988a
SHA2561d8004dae7fe7320a1eca8e0bf11e4501bcea0fb10f619bcfc83489230c2b2d5
SHA5125523fcbc201dd0c7ae6267cead2bc73babe49e94dea57b230467c9850f11d4e171ee95e68432480f61c602321bb4fb6aac2387d87f7db98e68d3e80736d85ae8
-
C:\Users\Admin\AppData\Local\Temp\._cache_1d8004dae7fe7320a1eca8e0bf11e4501bcea0fb10f619bcfc83489230c2b2d5N.exe
Filesize172KB
MD55a6b680e2caf4335da59f9271903a0fc
SHA1d361b91d8abb9a4ac45c759378671fce95ee6a71
SHA2564de460a6f7658f9c6233c9be3f9be70cf893d2010276c1b5c7521cfc42e15ce7
SHA51205e41eb4c9a5672561b74bf61582b6ed3f48b99df4890c8404dff827e864c3de29ec070d15c22245aa9cacccb927fd9d985646f771a1ede2185331e73bb279c3
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
24KB
MD57ff09da3314057b97cc64e5f982fb927
SHA11953bb0ca86ab6e832c6cf1ded57fe3edc588b03
SHA25695591fe43817fcf90ea0e979498e276c1325d3819d9cfb677c3292bc4edb2e66
SHA512286852b2e0c5bf9264562ff311466bcea011231e444cb2eca578670a4dd3e0e3145e93423eff67bc3be2e9a47c829955889ec03509cc04db0f324b046cd20e9b