Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
112s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2025, 16:38
Behavioral task
behavioral1
Sample
6f33f5e52b8e2075b40126880a8e9b92653a4c5bcea1acb63c94201cd1abe20b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6f33f5e52b8e2075b40126880a8e9b92653a4c5bcea1acb63c94201cd1abe20b.exe
Resource
win10v2004-20241007-en
General
-
Target
6f33f5e52b8e2075b40126880a8e9b92653a4c5bcea1acb63c94201cd1abe20b.exe
-
Size
1.4MB
-
MD5
6902f16523321ed96b8adbb09ebf2444
-
SHA1
fbb1f43c96863e99789d18c7dbe9979293151a69
-
SHA256
6f33f5e52b8e2075b40126880a8e9b92653a4c5bcea1acb63c94201cd1abe20b
-
SHA512
99b599a00757c1ffe5360d1c9c5c81b2eced256d75c3c9b6c6a5f39bfdc96b849dc6029a0939b4bc46cc26cb21d9adee475524e2629b12579476772cd008c960
-
SSDEEP
24576:8nsJ39LyjbJkQFMhmC+6GD9anLQf4atyCMonupIV0U8emWO:8nsHyjtk2MYC5GDrf4aVndf8BF
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 6f33f5e52b8e2075b40126880a8e9b92653a4c5bcea1acb63c94201cd1abe20b.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 4260 ._cache_6f33f5e52b8e2075b40126880a8e9b92653a4c5bcea1acb63c94201cd1abe20b.exe 2764 Synaptics.exe 424 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 6f33f5e52b8e2075b40126880a8e9b92653a4c5bcea1acb63c94201cd1abe20b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f33f5e52b8e2075b40126880a8e9b92653a4c5bcea1acb63c94201cd1abe20b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_6f33f5e52b8e2075b40126880a8e9b92653a4c5bcea1acb63c94201cd1abe20b.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 6f33f5e52b8e2075b40126880a8e9b92653a4c5bcea1acb63c94201cd1abe20b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2024 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2024 EXCEL.EXE 2024 EXCEL.EXE 2024 EXCEL.EXE 2024 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3592 wrote to memory of 4260 3592 6f33f5e52b8e2075b40126880a8e9b92653a4c5bcea1acb63c94201cd1abe20b.exe 82 PID 3592 wrote to memory of 4260 3592 6f33f5e52b8e2075b40126880a8e9b92653a4c5bcea1acb63c94201cd1abe20b.exe 82 PID 3592 wrote to memory of 4260 3592 6f33f5e52b8e2075b40126880a8e9b92653a4c5bcea1acb63c94201cd1abe20b.exe 82 PID 3592 wrote to memory of 2764 3592 6f33f5e52b8e2075b40126880a8e9b92653a4c5bcea1acb63c94201cd1abe20b.exe 84 PID 3592 wrote to memory of 2764 3592 6f33f5e52b8e2075b40126880a8e9b92653a4c5bcea1acb63c94201cd1abe20b.exe 84 PID 3592 wrote to memory of 2764 3592 6f33f5e52b8e2075b40126880a8e9b92653a4c5bcea1acb63c94201cd1abe20b.exe 84 PID 2764 wrote to memory of 424 2764 Synaptics.exe 85 PID 2764 wrote to memory of 424 2764 Synaptics.exe 85 PID 2764 wrote to memory of 424 2764 Synaptics.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f33f5e52b8e2075b40126880a8e9b92653a4c5bcea1acb63c94201cd1abe20b.exe"C:\Users\Admin\AppData\Local\Temp\6f33f5e52b8e2075b40126880a8e9b92653a4c5bcea1acb63c94201cd1abe20b.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\._cache_6f33f5e52b8e2075b40126880a8e9b92653a4c5bcea1acb63c94201cd1abe20b.exe"C:\Users\Admin\AppData\Local\Temp\._cache_6f33f5e52b8e2075b40126880a8e9b92653a4c5bcea1acb63c94201cd1abe20b.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4260
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:424
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD56902f16523321ed96b8adbb09ebf2444
SHA1fbb1f43c96863e99789d18c7dbe9979293151a69
SHA2566f33f5e52b8e2075b40126880a8e9b92653a4c5bcea1acb63c94201cd1abe20b
SHA51299b599a00757c1ffe5360d1c9c5c81b2eced256d75c3c9b6c6a5f39bfdc96b849dc6029a0939b4bc46cc26cb21d9adee475524e2629b12579476772cd008c960
-
C:\Users\Admin\AppData\Local\Temp\._cache_6f33f5e52b8e2075b40126880a8e9b92653a4c5bcea1acb63c94201cd1abe20b.exe
Filesize660KB
MD546f93188124d8370661a1fecf1a7bed8
SHA186aa54e55e7a2e5863e14bacc999241d476a96ea
SHA2564d5af0a2ebc9f2044d79bf544e8b3b98ee03dd9ae70f3d2be48bd138f068abcb
SHA5126169d0929f8224ff4027d1c1d3be302f011e1e1a87f71b2221735d613a3741e8f7fe5c6fc5003963f22890c7ee4ed25287a6015e312651ad0b7bcbcc76622969
-
Filesize
17KB
MD5af4d37aad8b34471da588360a43e768a
SHA183ed64667d4e68ea531b8bcf58aab3ed4a5ca998
SHA256e7550c3453156531308fda255a198c3710aa4bc7412819c180b103c11e85cef1
SHA51274f5000038c47b7c909c4ee5740e0e87cac12c9c96fff8b1c7ec749541ee3d4b7efd80f9ac02cd39809dca3f2707d0063fa852a3a541342d93a9d03de08823da