Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 06:21
Behavioral task
behavioral1
Sample
22a2d360105da012f6cfefc9679398aa9503ce78404a16375db9a1e52798f8a6N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
22a2d360105da012f6cfefc9679398aa9503ce78404a16375db9a1e52798f8a6N.exe
Resource
win10v2004-20241007-en
General
-
Target
22a2d360105da012f6cfefc9679398aa9503ce78404a16375db9a1e52798f8a6N.exe
-
Size
765KB
-
MD5
610616027d6e00d167443b906eb5ce30
-
SHA1
4b4ad042636e2946a242b0d62e530e2aa9bc64fe
-
SHA256
22a2d360105da012f6cfefc9679398aa9503ce78404a16375db9a1e52798f8a6
-
SHA512
db5c407cb988e53bfd80191d5ea0b3dd9be02922d591bb3eec287753aa9b55f2df929328f05da11fa295d37cb1fbe21f1ab83499f75c07782011056dd71f9fba
-
SSDEEP
12288:CMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9QBdj:CnsJ39LyjbJkQFMhmC+6GD9IF
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
resource behavioral1/files/0x00080000000193af-72.dat behavioral1/files/0x000a0000000193af-96.dat -
Executes dropped EXE 3 IoCs
pid Process 2080 ._cache_22a2d360105da012f6cfefc9679398aa9503ce78404a16375db9a1e52798f8a6N.exe 1908 Synaptics.exe 2692 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 2244 22a2d360105da012f6cfefc9679398aa9503ce78404a16375db9a1e52798f8a6N.exe 2244 22a2d360105da012f6cfefc9679398aa9503ce78404a16375db9a1e52798f8a6N.exe 2244 22a2d360105da012f6cfefc9679398aa9503ce78404a16375db9a1e52798f8a6N.exe 1908 Synaptics.exe 1908 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 22a2d360105da012f6cfefc9679398aa9503ce78404a16375db9a1e52798f8a6N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22a2d360105da012f6cfefc9679398aa9503ce78404a16375db9a1e52798f8a6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2548 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2548 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2080 2244 22a2d360105da012f6cfefc9679398aa9503ce78404a16375db9a1e52798f8a6N.exe 31 PID 2244 wrote to memory of 2080 2244 22a2d360105da012f6cfefc9679398aa9503ce78404a16375db9a1e52798f8a6N.exe 31 PID 2244 wrote to memory of 2080 2244 22a2d360105da012f6cfefc9679398aa9503ce78404a16375db9a1e52798f8a6N.exe 31 PID 2244 wrote to memory of 2080 2244 22a2d360105da012f6cfefc9679398aa9503ce78404a16375db9a1e52798f8a6N.exe 31 PID 2244 wrote to memory of 1908 2244 22a2d360105da012f6cfefc9679398aa9503ce78404a16375db9a1e52798f8a6N.exe 33 PID 2244 wrote to memory of 1908 2244 22a2d360105da012f6cfefc9679398aa9503ce78404a16375db9a1e52798f8a6N.exe 33 PID 2244 wrote to memory of 1908 2244 22a2d360105da012f6cfefc9679398aa9503ce78404a16375db9a1e52798f8a6N.exe 33 PID 2244 wrote to memory of 1908 2244 22a2d360105da012f6cfefc9679398aa9503ce78404a16375db9a1e52798f8a6N.exe 33 PID 1908 wrote to memory of 2692 1908 Synaptics.exe 34 PID 1908 wrote to memory of 2692 1908 Synaptics.exe 34 PID 1908 wrote to memory of 2692 1908 Synaptics.exe 34 PID 1908 wrote to memory of 2692 1908 Synaptics.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\22a2d360105da012f6cfefc9679398aa9503ce78404a16375db9a1e52798f8a6N.exe"C:\Users\Admin\AppData\Local\Temp\22a2d360105da012f6cfefc9679398aa9503ce78404a16375db9a1e52798f8a6N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\._cache_22a2d360105da012f6cfefc9679398aa9503ce78404a16375db9a1e52798f8a6N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_22a2d360105da012f6cfefc9679398aa9503ce78404a16375db9a1e52798f8a6N.exe"2⤵
- Executes dropped EXE
PID:2080
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2692
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
765KB
MD5610616027d6e00d167443b906eb5ce30
SHA14b4ad042636e2946a242b0d62e530e2aa9bc64fe
SHA25622a2d360105da012f6cfefc9679398aa9503ce78404a16375db9a1e52798f8a6
SHA512db5c407cb988e53bfd80191d5ea0b3dd9be02922d591bb3eec287753aa9b55f2df929328f05da11fa295d37cb1fbe21f1ab83499f75c07782011056dd71f9fba
-
Filesize
25KB
MD57df8a68f00718a71a5820ea41ca883ec
SHA18676df1afe56cc8611fd9d3f4876f4d5e1876661
SHA256d2bcc061244aab2e934c63d26bdd2f562b4051126283ff31a0a34055c7d47847
SHA512b3f5f68b0d5e320a464af983731599499c609f11857e9bc8aa4f4425ee3eb70b43e0fd63649f04787b90a1108cdcd05eedf29969fe8aabf6b7cc9e9417db50a0
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
21KB
MD5b412f10fc734bc178dc495f2ca3aee4e
SHA1c3de6be200e3116107ae1d56163b392bbb0da2f3
SHA2560d6ae18011c8d6eb423f05928b027f4d11258a02c9ab0d326f8645c5c1016a2c
SHA512ee5eff1acd3d40d13b031fe6fb78e88d1f81d08f05d6129613344a96c5d5853955525e87ee8992eb4f925217990f4249ff4309411fd3a1094d69ec78dfc363ed
-
Filesize
27KB
MD5bc2ae931026134e32b7e6cb3ccbbdc82
SHA168079c63b1180b7e4463a4cd7ebc5351e7d8c4c5
SHA256a846b7e5c2d8c6a6953272391b8160c96158ea39651b0708216ce6cff789604c
SHA5120f2b7aa69a3b2ffaafb5f662a895564f05b1031cb3e41b925f5faed5e72f80987ce8a2fa0b4516c3953c061f4368ed3e3d22f3dc1b24a84924b3082c8d88f3aa
-
Filesize
25KB
MD5177f4678c96c139d2d5c23baafdac424
SHA17549b860b67e82efada67ec1e1058f075134f71c
SHA2569c9f7debd0cb578a0e4b5dc3d8e2c0b1e4d698dcf07b8ee3a1138f5af84265b5
SHA512d43a05c6072db8b1afd027696d557ec8cf1904d0f1a5cf7fae0fbb96ffbdd1bd82fba12493099c0b260907a685d8dd83d845d8400e684b1f38c24a66d890904f
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
\Users\Admin\AppData\Local\Temp\._cache_22a2d360105da012f6cfefc9679398aa9503ce78404a16375db9a1e52798f8a6N.exe
Filesize11KB
MD546e9a273d6587191b512fd1050dc1fc4
SHA1015535f3274f28cf0b01a3e858de4ecf9fb4ef34
SHA25632acc1bc543116cbe2cff10cb867772df2f254ff2634c870aef0b46c4b696fdb
SHA5127195efc6f03924cd9f5eda03d8ef3497b533952f4de9602d856703581777c8519b4b86915d25e4457c2fb0d5fad5f69a7cbd3679ac412c881fa7151cc10d109c