Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2025 04:42
Behavioral task
behavioral1
Sample
eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe
Resource
win10v2004-20241007-en
General
-
Target
eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe
-
Size
1.0MB
-
MD5
3400d8f99eef8e59a2a64a1371df45bc
-
SHA1
523137b99892f6ce493339bc9d1569d66f780707
-
SHA256
eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b
-
SHA512
3897f6876c6be76a3c55a4a44f0ca45d7f1acea9fad3d5c82a6d10ddd5a784774f86cb5553fd61ff72d549c5955ea30ff917fa7c7e88b7ccc6dab8a7ed52e804
-
SSDEEP
24576:KnsJ39LyjbJkQFMhmC+6GD9wOX2YGyzSDuAWjJG:KnsHyjtk2MYC5GDyOX2YgQU
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 2888 ._cache_eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe 1484 Synaptics.exe 1920 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe -
resource yara_rule behavioral2/files/0x000c000000023b47-5.dat upx behavioral2/memory/2888-64-0x0000000000400000-0x000000000058A000-memory.dmp upx behavioral2/memory/2888-132-0x0000000000400000-0x000000000058A000-memory.dmp upx behavioral2/memory/1920-199-0x0000000000400000-0x000000000058A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4820 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2888 2204 eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe 82 PID 2204 wrote to memory of 2888 2204 eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe 82 PID 2204 wrote to memory of 2888 2204 eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe 82 PID 2204 wrote to memory of 1484 2204 eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe 84 PID 2204 wrote to memory of 1484 2204 eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe 84 PID 2204 wrote to memory of 1484 2204 eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe 84 PID 1484 wrote to memory of 1920 1484 Synaptics.exe 85 PID 1484 wrote to memory of 1920 1484 Synaptics.exe 85 PID 1484 wrote to memory of 1920 1484 Synaptics.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe"C:\Users\Admin\AppData\Local\Temp\eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\._cache_eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe"C:\Users\Admin\AppData\Local\Temp\._cache_eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2888
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1920
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD53400d8f99eef8e59a2a64a1371df45bc
SHA1523137b99892f6ce493339bc9d1569d66f780707
SHA256eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b
SHA5123897f6876c6be76a3c55a4a44f0ca45d7f1acea9fad3d5c82a6d10ddd5a784774f86cb5553fd61ff72d549c5955ea30ff917fa7c7e88b7ccc6dab8a7ed52e804
-
C:\Users\Admin\AppData\Local\Temp\._cache_eda3d0e2ceca6e0207284adf857645b4402f14351aeb293f95d6481566f25b4b.exe
Filesize287KB
MD5ffa637abd482b5e7d3fb75182f43f080
SHA1d5589ff9d01d8d64669e41161f71e9969ee4204f
SHA2564d3d363b5b3dcd9fa516b481c92d62c02aed804318bdc4d5e97a68bb6e6d62db
SHA512515ed43190b9b73feb389efd125cbd4cd435b90189adf51a215cb28d70c564c936cfa6f7ec46b606212979947f341e2b854d33fdeefe190163e508dcfdd3375b
-
Filesize
22KB
MD57717421769c4a243c05facd4c4cc70d8
SHA1be0ed72c71c0096a1bed1f9026c5d28addd5033d
SHA256fd3d8096e71f76279c1f701835476c19653b6d53dcc7105bc08f713898177a5b
SHA5127792cfd5cae0efc0f9c7ddcaed4e7537ff709dc2e339172133df1eb1054334457166750ac720cc59d85f6aa3611e377c6ce8a2df65573f4657b23a94ee51e194
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04