Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 04:36
Behavioral task
behavioral1
Sample
eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe
Resource
win10v2004-20241007-en
General
-
Target
eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe
-
Size
1.0MB
-
MD5
3400d8f99eef8e59a2a64a1371df45bc
-
SHA1
523137b99892f6ce493339bc9d1569d66f780707
-
SHA256
eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b
-
SHA512
3897f6876c6be76a3c55a4a44f0ca45d7f1acea9fad3d5c82a6d10ddd5a784774f86cb5553fd61ff72d549c5955ea30ff917fa7c7e88b7ccc6dab8a7ed52e804
-
SSDEEP
24576:KnsJ39LyjbJkQFMhmC+6GD9wOX2YGyzSDuAWjJG:KnsHyjtk2MYC5GDyOX2YgQU
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2920 ._cache_eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe 2676 Synaptics.exe 2480 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 2608 eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe 2608 eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe 2608 eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe 2608 eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe 2676 Synaptics.exe 2676 Synaptics.exe 2676 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe -
resource yara_rule behavioral1/files/0x00090000000120fe-4.dat upx behavioral1/memory/2920-22-0x0000000000400000-0x000000000058A000-memory.dmp upx behavioral1/memory/2920-24-0x0000000000400000-0x000000000058A000-memory.dmp upx behavioral1/memory/2480-48-0x0000000000400000-0x000000000058A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2452 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2452 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2608 wrote to memory of 2920 2608 eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe 30 PID 2608 wrote to memory of 2920 2608 eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe 30 PID 2608 wrote to memory of 2920 2608 eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe 30 PID 2608 wrote to memory of 2920 2608 eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe 30 PID 2608 wrote to memory of 2676 2608 eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe 32 PID 2608 wrote to memory of 2676 2608 eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe 32 PID 2608 wrote to memory of 2676 2608 eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe 32 PID 2608 wrote to memory of 2676 2608 eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe 32 PID 2676 wrote to memory of 2480 2676 Synaptics.exe 33 PID 2676 wrote to memory of 2480 2676 Synaptics.exe 33 PID 2676 wrote to memory of 2480 2676 Synaptics.exe 33 PID 2676 wrote to memory of 2480 2676 Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe"C:\Users\Admin\AppData\Local\Temp\eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\._cache_eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe"C:\Users\Admin\AppData\Local\Temp\._cache_eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe"2⤵
- Executes dropped EXE
PID:2920
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2480
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD53400d8f99eef8e59a2a64a1371df45bc
SHA1523137b99892f6ce493339bc9d1569d66f780707
SHA256eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b
SHA5123897f6876c6be76a3c55a4a44f0ca45d7f1acea9fad3d5c82a6d10ddd5a784774f86cb5553fd61ff72d549c5955ea30ff917fa7c7e88b7ccc6dab8a7ed52e804
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
25KB
MD587d8cbe777869cd88c0d92c97867f4d8
SHA1b5a9ce7b1f1e92028973d11bfbec81fda3febb83
SHA2563b0032ab70acac84f7430ff64e0fbee21bf884941f76cc1f51f69fbe99d77c02
SHA5120c9cc6cb1cee2a9e1cb89e4998afddca76859ec6fa2a234cf663dcb1cca994b4b306925a146e5a019525b0f704b9e8e44c734fddce53a5a6270e6c1961584fc4
-
Filesize
21KB
MD53acd58fc6ca157a36b4180d52e38e8c4
SHA12b94b917f64b6bb30d53fbf69174e81d3ba769d3
SHA256a3b643cc85acc9a8b24341a3ac56bbd9f8e8a84263c5e78754081c904ca04337
SHA512abc0dc8fd6b5716910da8f0cfea296b85b08435881dcbd66b2b214585fcea0d89aec2b48feb6eb69b32937034bd7a697d42d682cdecca1507a922f2b3174ea0e
-
Filesize
27KB
MD53a1769c51fac7e8956defce0eb7a1bec
SHA1f61224367837ceb938b3c6afa0e684e81e4d7fd3
SHA2562e0489f9ad6b542c681bda3f201d489dfcf328d50e56501115c75c1635142e33
SHA512caca1a45faa1c5deaa560230f65a0a9031944340f8331993ced6b031b19c70670102515aad3009936861768f716cd04ee98cb0c785cabc483640457af69a375f
-
Filesize
25KB
MD573724e6d968bb9e8f1d28e35445f5748
SHA15f718e8505c597fbf4efa4665ab864ee6e237d9e
SHA256bf3ea467c836a63f91368a573f18fc2d7e5cf4d8220f1812cc4b1d0006362d2c
SHA5121c59952c6a322fbc32e618335f9c68a599557e94bbde027bd524b2e4919f6e5437513a323b2b14648b469052807dd614efa4293147e36c159ebf74685316778e
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
\Users\Admin\AppData\Local\Temp\._cache_eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe
Filesize287KB
MD5ffa637abd482b5e7d3fb75182f43f080
SHA1d5589ff9d01d8d64669e41161f71e9969ee4204f
SHA2564d3d363b5b3dcd9fa516b481c92d62c02aed804318bdc4d5e97a68bb6e6d62db
SHA512515ed43190b9b73feb389efd125cbd4cd435b90189adf51a215cb28d70c564c936cfa6f7ec46b606212979947f341e2b854d33fdeefe190163e508dcfdd3375b