Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 08:11
Behavioral task
behavioral1
Sample
c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe
Resource
win10v2004-20241007-en
General
-
Target
c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe
-
Size
1.6MB
-
MD5
812a0aea3929e99d479e0f6c96c7efdf
-
SHA1
7337af6d58c1ab32cff259e1f794ded2e8710910
-
SHA256
c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f
-
SHA512
35a5f702277ab7fc7edf257a4c310d430440e68c724510d264247be82f49a435fc30b4861fb242e4497ed596e65e3fea50de1642c02b78d6bac4dec08e0e965d
-
SSDEEP
49152:snsHyjtk2MYC5GD7Zkg6Yf5/pFFFOhKMdDBY:snsmtk2acZkg6YBhFFFOhKMdy
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe 1852 Synaptics.exe 2820 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 2096 c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe 2096 c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe 2096 c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe 1852 Synaptics.exe 1852 Synaptics.exe 2820 ._cache_Synaptics.exe 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\????? = "C:\\ProgramData\\Synaptics\\Synaptics.exe" c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe -
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ._cache_Synaptics.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2756 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2820 ._cache_Synaptics.exe 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2820 ._cache_Synaptics.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe Token: SeDebugPrivilege 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Token: SeDebugPrivilege 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Token: SeDebugPrivilege 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Token: SeDebugPrivilege 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Token: SeDebugPrivilege 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Token: SeDebugPrivilege 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Token: SeDebugPrivilege 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Token: SeDebugPrivilege 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Token: SeDebugPrivilege 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Token: SeDebugPrivilege 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Token: SeDebugPrivilege 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Token: SeDebugPrivilege 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Token: SeDebugPrivilege 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Token: SeDebugPrivilege 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Token: SeDebugPrivilege 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Token: SeDebugPrivilege 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Token: SeDebugPrivilege 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Token: SeDebugPrivilege 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Token: SeDebugPrivilege 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Token: SeDebugPrivilege 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Token: SeDebugPrivilege 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Token: SeDebugPrivilege 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Token: SeDebugPrivilege 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Token: SeDebugPrivilege 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe Token: SeDebugPrivilege 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Token: SeDebugPrivilege 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Token: SeDebugPrivilege 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Token: SeDebugPrivilege 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe Token: SeDebugPrivilege 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Token: SeDebugPrivilege 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe Token: SeDebugPrivilege 2820 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2756 EXCEL.EXE 2820 ._cache_Synaptics.exe 2536 ._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2536 2096 c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe 30 PID 2096 wrote to memory of 2536 2096 c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe 30 PID 2096 wrote to memory of 2536 2096 c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe 30 PID 2096 wrote to memory of 2536 2096 c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe 30 PID 2096 wrote to memory of 1852 2096 c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe 31 PID 2096 wrote to memory of 1852 2096 c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe 31 PID 2096 wrote to memory of 1852 2096 c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe 31 PID 2096 wrote to memory of 1852 2096 c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe 31 PID 1852 wrote to memory of 2820 1852 Synaptics.exe 32 PID 1852 wrote to memory of 2820 1852 Synaptics.exe 32 PID 1852 wrote to memory of 2820 1852 Synaptics.exe 32 PID 1852 wrote to memory of 2820 1852 Synaptics.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe"C:\Users\Admin\AppData\Local\Temp\c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe"C:\Users\Admin\AppData\Local\Temp\._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2536
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2820
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5812a0aea3929e99d479e0f6c96c7efdf
SHA17337af6d58c1ab32cff259e1f794ded2e8710910
SHA256c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f
SHA51235a5f702277ab7fc7edf257a4c310d430440e68c724510d264247be82f49a435fc30b4861fb242e4497ed596e65e3fea50de1642c02b78d6bac4dec08e0e965d
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
\Users\Admin\AppData\Local\Temp\._cache_c24ac669ab1e4689d70f416cdff3ea0ec4c9856e324f5eafc27c4ce32fa91b0f.exe
Filesize922KB
MD57ce89829f9fb955dc377529c461852fd
SHA18b14f5345bfcfac08c31c284c1a0eee2cd53bcfb
SHA2569775b4bbe23b8eb93727efe0a6d0b160ae5132a10b223f43200499cf0051a18f
SHA5127b9cd587ba53f632a1eff914a6a4bfc345b2232ed6dc02dfefa9bc9aebe06ff7836c1698077f41483a34b0610e92549b1a4baf8b9e9b29c28469f53ec6722e0c