Analysis
-
max time kernel
118s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 05:37
Behavioral task
behavioral1
Sample
be414f9f2ad164a1fb5e5c599aef52b7170403f5144875f340f2393f0fd7c52fN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
be414f9f2ad164a1fb5e5c599aef52b7170403f5144875f340f2393f0fd7c52fN.exe
Resource
win10v2004-20241007-en
General
-
Target
be414f9f2ad164a1fb5e5c599aef52b7170403f5144875f340f2393f0fd7c52fN.exe
-
Size
846KB
-
MD5
ec7fad4433af0181f0511528f657a430
-
SHA1
1a6bd3041e67e1572580be34cf4fb9e7b5d18053
-
SHA256
be414f9f2ad164a1fb5e5c599aef52b7170403f5144875f340f2393f0fd7c52f
-
SHA512
ec91a7ea58ddc53d3ad4586d5b08480058ec8de3b514968ed9e908c0fbb24fda3a18350c5cb164b5039721fba44e30fe9b2c7a1691bde2f1e490b96605bd4c79
-
SSDEEP
12288:RMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V99xbp3E9bfa:RnsJ39LyjbJkQFMhmC+6GD9/pIby
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2912 ._cache_be414f9f2ad164a1fb5e5c599aef52b7170403f5144875f340f2393f0fd7c52fN.exe 2680 Synaptics.exe 1172 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 2816 be414f9f2ad164a1fb5e5c599aef52b7170403f5144875f340f2393f0fd7c52fN.exe 2816 be414f9f2ad164a1fb5e5c599aef52b7170403f5144875f340f2393f0fd7c52fN.exe 2816 be414f9f2ad164a1fb5e5c599aef52b7170403f5144875f340f2393f0fd7c52fN.exe 2680 Synaptics.exe 2680 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" be414f9f2ad164a1fb5e5c599aef52b7170403f5144875f340f2393f0fd7c52fN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be414f9f2ad164a1fb5e5c599aef52b7170403f5144875f340f2393f0fd7c52fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2980 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2980 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2816 wrote to memory of 2912 2816 be414f9f2ad164a1fb5e5c599aef52b7170403f5144875f340f2393f0fd7c52fN.exe 30 PID 2816 wrote to memory of 2912 2816 be414f9f2ad164a1fb5e5c599aef52b7170403f5144875f340f2393f0fd7c52fN.exe 30 PID 2816 wrote to memory of 2912 2816 be414f9f2ad164a1fb5e5c599aef52b7170403f5144875f340f2393f0fd7c52fN.exe 30 PID 2816 wrote to memory of 2912 2816 be414f9f2ad164a1fb5e5c599aef52b7170403f5144875f340f2393f0fd7c52fN.exe 30 PID 2816 wrote to memory of 2680 2816 be414f9f2ad164a1fb5e5c599aef52b7170403f5144875f340f2393f0fd7c52fN.exe 32 PID 2816 wrote to memory of 2680 2816 be414f9f2ad164a1fb5e5c599aef52b7170403f5144875f340f2393f0fd7c52fN.exe 32 PID 2816 wrote to memory of 2680 2816 be414f9f2ad164a1fb5e5c599aef52b7170403f5144875f340f2393f0fd7c52fN.exe 32 PID 2816 wrote to memory of 2680 2816 be414f9f2ad164a1fb5e5c599aef52b7170403f5144875f340f2393f0fd7c52fN.exe 32 PID 2680 wrote to memory of 1172 2680 Synaptics.exe 33 PID 2680 wrote to memory of 1172 2680 Synaptics.exe 33 PID 2680 wrote to memory of 1172 2680 Synaptics.exe 33 PID 2680 wrote to memory of 1172 2680 Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\be414f9f2ad164a1fb5e5c599aef52b7170403f5144875f340f2393f0fd7c52fN.exe"C:\Users\Admin\AppData\Local\Temp\be414f9f2ad164a1fb5e5c599aef52b7170403f5144875f340f2393f0fd7c52fN.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\._cache_be414f9f2ad164a1fb5e5c599aef52b7170403f5144875f340f2393f0fd7c52fN.exe"C:\Users\Admin\AppData\Local\Temp\._cache_be414f9f2ad164a1fb5e5c599aef52b7170403f5144875f340f2393f0fd7c52fN.exe"2⤵
- Executes dropped EXE
PID:2912
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:1172
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
846KB
MD5ec7fad4433af0181f0511528f657a430
SHA11a6bd3041e67e1572580be34cf4fb9e7b5d18053
SHA256be414f9f2ad164a1fb5e5c599aef52b7170403f5144875f340f2393f0fd7c52f
SHA512ec91a7ea58ddc53d3ad4586d5b08480058ec8de3b514968ed9e908c0fbb24fda3a18350c5cb164b5039721fba44e30fe9b2c7a1691bde2f1e490b96605bd4c79
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
\Users\Admin\AppData\Local\Temp\._cache_be414f9f2ad164a1fb5e5c599aef52b7170403f5144875f340f2393f0fd7c52fN.exe
Filesize92KB
MD55c0f4dea86e76e89465e5c8572b50ecd
SHA10503ab14cba0d8b8580b7a427fbe31e795569f75
SHA2564d5b7e72d959843783ca52de3847462f303318f6baa8155b7f57488c8720f7bd
SHA5122fe814c1828d9ac84dddd02d290dec6e0fd9c3c7f1f97136935ba90d678251d8f9b1f20901ef4fdd22700d3137cce890c50bc5987c90fe958dbcb981846dbcad