Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 03:04
Behavioral task
behavioral1
Sample
7f0d56ac6044835dea627cd0997520fc9c314cf508f966923593067b8d2b57d5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7f0d56ac6044835dea627cd0997520fc9c314cf508f966923593067b8d2b57d5.exe
Resource
win10v2004-20241007-en
General
-
Target
7f0d56ac6044835dea627cd0997520fc9c314cf508f966923593067b8d2b57d5.exe
-
Size
1.1MB
-
MD5
970271167de81bdd630c912265ba843c
-
SHA1
65aca5de62e377dcf2a760c47b2957a34c2eda73
-
SHA256
7f0d56ac6044835dea627cd0997520fc9c314cf508f966923593067b8d2b57d5
-
SHA512
fe9642e53e707522c631d26f75c89ffb07782e7b92046b2aef1f8656727bac4b1e554076eb8edb2b7c5cb3d42e10cf4adec3fa8ef4f4620110bd8a93261e3400
-
SSDEEP
24576:dnsJ39LyjbJkQFMhmC+6GD9wAlJx8Eporn:dnsHyjtk2MYC5GDCMCEOrn
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 7f0d56ac6044835dea627cd0997520fc9c314cf508f966923593067b8d2b57d5.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 3424 ._cache_7f0d56ac6044835dea627cd0997520fc9c314cf508f966923593067b8d2b57d5.exe 1120 Synaptics.exe 1332 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 7f0d56ac6044835dea627cd0997520fc9c314cf508f966923593067b8d2b57d5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7f0d56ac6044835dea627cd0997520fc9c314cf508f966923593067b8d2b57d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_7f0d56ac6044835dea627cd0997520fc9c314cf508f966923593067b8d2b57d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 7f0d56ac6044835dea627cd0997520fc9c314cf508f966923593067b8d2b57d5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1432 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1432 EXCEL.EXE 1432 EXCEL.EXE 1432 EXCEL.EXE 1432 EXCEL.EXE 1432 EXCEL.EXE 1432 EXCEL.EXE 1432 EXCEL.EXE 1432 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4684 wrote to memory of 3424 4684 7f0d56ac6044835dea627cd0997520fc9c314cf508f966923593067b8d2b57d5.exe 82 PID 4684 wrote to memory of 3424 4684 7f0d56ac6044835dea627cd0997520fc9c314cf508f966923593067b8d2b57d5.exe 82 PID 4684 wrote to memory of 3424 4684 7f0d56ac6044835dea627cd0997520fc9c314cf508f966923593067b8d2b57d5.exe 82 PID 4684 wrote to memory of 1120 4684 7f0d56ac6044835dea627cd0997520fc9c314cf508f966923593067b8d2b57d5.exe 83 PID 4684 wrote to memory of 1120 4684 7f0d56ac6044835dea627cd0997520fc9c314cf508f966923593067b8d2b57d5.exe 83 PID 4684 wrote to memory of 1120 4684 7f0d56ac6044835dea627cd0997520fc9c314cf508f966923593067b8d2b57d5.exe 83 PID 1120 wrote to memory of 1332 1120 Synaptics.exe 84 PID 1120 wrote to memory of 1332 1120 Synaptics.exe 84 PID 1120 wrote to memory of 1332 1120 Synaptics.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f0d56ac6044835dea627cd0997520fc9c314cf508f966923593067b8d2b57d5.exe"C:\Users\Admin\AppData\Local\Temp\7f0d56ac6044835dea627cd0997520fc9c314cf508f966923593067b8d2b57d5.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\._cache_7f0d56ac6044835dea627cd0997520fc9c314cf508f966923593067b8d2b57d5.exe"C:\Users\Admin\AppData\Local\Temp\._cache_7f0d56ac6044835dea627cd0997520fc9c314cf508f966923593067b8d2b57d5.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3424
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1332
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5970271167de81bdd630c912265ba843c
SHA165aca5de62e377dcf2a760c47b2957a34c2eda73
SHA2567f0d56ac6044835dea627cd0997520fc9c314cf508f966923593067b8d2b57d5
SHA512fe9642e53e707522c631d26f75c89ffb07782e7b92046b2aef1f8656727bac4b1e554076eb8edb2b7c5cb3d42e10cf4adec3fa8ef4f4620110bd8a93261e3400
-
C:\Users\Admin\AppData\Local\Temp\._cache_7f0d56ac6044835dea627cd0997520fc9c314cf508f966923593067b8d2b57d5.exe
Filesize333KB
MD5c6377c648ac8775fcc8302c1db14a8aa
SHA12b5faa68d1c9ff2572210a6420b39e9b2d4394c9
SHA256df6589654abfacb1490a9f19e9c0e32623e73f2a1b852e8a8379b7873d03a33a
SHA512dfb7ea7eb049847f0ebebbd74b4fe39b464b61ca0cb161186f5a40cb8e96978f73df200ce43b0e69a8707150f2026d6171109dbd60cb498aa74465e9d96e909f
-
Filesize
25KB
MD5048c8a66a2ca6e0da67fd1babf14d4d4
SHA1f468334b3eedecbd984322534b9ec61c291b1b58
SHA25616eed760d6539d3854223945eb3e19fcadf1480b4b5ed9b71e5fd46b25b103d2
SHA512fd3370d1f454dddff6a791e089e1a4a4e0edeeebb1f193fd4f5b088e9c4d8924fbe40d835e2b492e1b0571f4dee5581cea34f2f4c0f85ac05137e1dd8da0a8ff
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04