Analysis
-
max time kernel
141s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 04:42
Behavioral task
behavioral1
Sample
eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe
Resource
win10v2004-20241007-en
General
-
Target
eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe
-
Size
1.0MB
-
MD5
3400d8f99eef8e59a2a64a1371df45bc
-
SHA1
523137b99892f6ce493339bc9d1569d66f780707
-
SHA256
eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b
-
SHA512
3897f6876c6be76a3c55a4a44f0ca45d7f1acea9fad3d5c82a6d10ddd5a784774f86cb5553fd61ff72d549c5955ea30ff917fa7c7e88b7ccc6dab8a7ed52e804
-
SSDEEP
24576:KnsJ39LyjbJkQFMhmC+6GD9wOX2YGyzSDuAWjJG:KnsHyjtk2MYC5GDyOX2YgQU
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2704 ._cache_eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe 2812 Synaptics.exe 2628 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 1908 eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe 1908 eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe 1908 eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe 1908 eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe 2812 Synaptics.exe 2812 Synaptics.exe 2812 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe -
resource yara_rule behavioral1/files/0x000a00000001225e-7.dat upx behavioral1/memory/2704-21-0x0000000000400000-0x000000000058A000-memory.dmp upx behavioral1/memory/2704-23-0x0000000000400000-0x000000000058A000-memory.dmp upx behavioral1/memory/2628-48-0x0000000000400000-0x000000000058A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3020 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3020 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2704 1908 eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe 30 PID 1908 wrote to memory of 2704 1908 eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe 30 PID 1908 wrote to memory of 2704 1908 eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe 30 PID 1908 wrote to memory of 2704 1908 eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe 30 PID 1908 wrote to memory of 2812 1908 eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe 32 PID 1908 wrote to memory of 2812 1908 eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe 32 PID 1908 wrote to memory of 2812 1908 eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe 32 PID 1908 wrote to memory of 2812 1908 eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe 32 PID 2812 wrote to memory of 2628 2812 Synaptics.exe 33 PID 2812 wrote to memory of 2628 2812 Synaptics.exe 33 PID 2812 wrote to memory of 2628 2812 Synaptics.exe 33 PID 2812 wrote to memory of 2628 2812 Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe"C:\Users\Admin\AppData\Local\Temp\eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\._cache_eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe"C:\Users\Admin\AppData\Local\Temp\._cache_eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe"2⤵
- Executes dropped EXE
PID:2704
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2628
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD53400d8f99eef8e59a2a64a1371df45bc
SHA1523137b99892f6ce493339bc9d1569d66f780707
SHA256eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b
SHA5123897f6876c6be76a3c55a4a44f0ca45d7f1acea9fad3d5c82a6d10ddd5a784774f86cb5553fd61ff72d549c5955ea30ff917fa7c7e88b7ccc6dab8a7ed52e804
-
C:\Users\Admin\AppData\Local\Temp\._cache_eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe
Filesize287KB
MD5ffa637abd482b5e7d3fb75182f43f080
SHA1d5589ff9d01d8d64669e41161f71e9969ee4204f
SHA2564d3d363b5b3dcd9fa516b481c92d62c02aed804318bdc4d5e97a68bb6e6d62db
SHA512515ed43190b9b73feb389efd125cbd4cd435b90189adf51a215cb28d70c564c936cfa6f7ec46b606212979947f341e2b854d33fdeefe190163e508dcfdd3375b
-
Filesize
24KB
MD52fccbf438ebb63ea7d230da1c00ac70d
SHA1ea2cdf194bb1704b5f999fe4ffd399ada7dcb58a
SHA256ce6b51fec531d6efbd6093edf80646d0082a0431148157434aa3a5c23b3feccb
SHA5129714694922c4157722ab1425f26b881a7be158dffac3750ae382650bf92fc4806bd4ff5b2ef9a0f29bf613e5f80f1ef1aac3ad8a5633172114bfe27de8743130
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
26KB
MD5d8e32827d80cbb74da72b04ee4800946
SHA1fe1af3e91d862637ef51654f410399a1420017e5
SHA2567baced60a117740dbae1e08de9bc04beab5d86251e76a6c2437ef7754fde75c4
SHA51260e9fb7825834d6d86aed5ac28d28cca40f8ff729c6a68621231071d18b65f6b5da837aaa8f950c55dc3111655a0f3ee8117366080859245d478935dd439ece9
-
Filesize
27KB
MD5e555e7c0cd0f2c9a240b5d7a5964ee18
SHA15232052cae99740d635f2820b6fc7c16efaa74e6
SHA256c6fd3e0dcc891be679b7c60a49d5af18d689879e97670f566f0811d54f6e00a1
SHA512a53ea065e6fd127494fae9152424e74dd0dacc52596d8f220cf96b464e889cb90fce5ff8f01b2caf050a10a68c9f787d444ee4becf8ae04c50f1dddb3cadbc22
-
Filesize
27KB
MD5e8934baa51cef1875ec9ecc7d1c1e533
SHA11d48cbbda46c33aaa5c9de447c2e58dccd2ff97f
SHA2565cd32a1e4f493620635896b6b15898bb25b054bb21489681535c06e54a8761fb
SHA512e77c7bc684c9efa8d599eaab64c87158bd3ef506c03fd663f48ef3d5ada60408553585752c00366d3a977c8e3e533af50ad779a324b90b0e69aebbf9e1c1a8f7
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882