Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-01-2025 22:35
Behavioral task
behavioral1
Sample
FileGrab.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
FileGrab.exe
Resource
win10v2004-20241007-en
General
-
Target
FileGrab.exe
-
Size
802KB
-
MD5
f4d902e70524666a52182720fe208ab1
-
SHA1
33774655d0fc10bccd652e95b18fb428dcd80a38
-
SHA256
6eb643eb56e8fbff11276d23354b6b473bc252464d3ef7b98ec8cbbd57792f8e
-
SHA512
5bf37506097654f384f12f2d90fc9888f0bb5eaa548033a616ed16cbc90fd7a6483aa1b74f7423925e11f7f826e42d5373ac1c88ab7b049e63e23288ac656d65
-
SSDEEP
12288:2MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V935lC6FOj:2nsJ39LyjbJkQFMhmC+6GD9q6Fq
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 1712 ._cache_FileGrab.exe 2256 Synaptics.exe 2444 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 2544 FileGrab.exe 2544 FileGrab.exe 2544 FileGrab.exe 2256 Synaptics.exe 2256 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" FileGrab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileGrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_FileGrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2892 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2892 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2544 wrote to memory of 1712 2544 FileGrab.exe 30 PID 2544 wrote to memory of 1712 2544 FileGrab.exe 30 PID 2544 wrote to memory of 1712 2544 FileGrab.exe 30 PID 2544 wrote to memory of 1712 2544 FileGrab.exe 30 PID 2544 wrote to memory of 2256 2544 FileGrab.exe 32 PID 2544 wrote to memory of 2256 2544 FileGrab.exe 32 PID 2544 wrote to memory of 2256 2544 FileGrab.exe 32 PID 2544 wrote to memory of 2256 2544 FileGrab.exe 32 PID 2256 wrote to memory of 2444 2256 Synaptics.exe 33 PID 2256 wrote to memory of 2444 2256 Synaptics.exe 33 PID 2256 wrote to memory of 2444 2256 Synaptics.exe 33 PID 2256 wrote to memory of 2444 2256 Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\FileGrab.exe"C:\Users\Admin\AppData\Local\Temp\FileGrab.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\._cache_FileGrab.exe"C:\Users\Admin\AppData\Local\Temp\._cache_FileGrab.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1712
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2444
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
802KB
MD5f4d902e70524666a52182720fe208ab1
SHA133774655d0fc10bccd652e95b18fb428dcd80a38
SHA2566eb643eb56e8fbff11276d23354b6b473bc252464d3ef7b98ec8cbbd57792f8e
SHA5125bf37506097654f384f12f2d90fc9888f0bb5eaa548033a616ed16cbc90fd7a6483aa1b74f7423925e11f7f826e42d5373ac1c88ab7b049e63e23288ac656d65
-
Filesize
23KB
MD53084e5d075eeb372a29f53952e6f0313
SHA10d12a0b7b448e25d83b9464c18a26d3887dabaa8
SHA25625a794b9a208716f1675449a06e8edea255826e9cfbec524e1649bbaa158a173
SHA512b9e123d388919af6026349be42132bfea062b44a762c47abd4087de0b273825e8833c31b3b56d5d3521ee551261829e47da5d981813ecd46e32a5115552ca9ec
-
Filesize
26KB
MD5500c8f7575a53620148c9022d16953f8
SHA178c7eb9c0b14714efdf43bb56dfefb8c8195d552
SHA256a336e979f9e74a46025ef0146f5644226a4cc247d8121bcffa2d1136d60337b0
SHA512cb3a742e8e48003083b8e5271717e0d97572b4d0d7cba06e60a14904d71213db9808ad8af509b8398de2142c8308a821e38a2fa073bb42c76cf763d6b750e06d
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
26KB
MD5894be771b69b0cb89f443a12fecde64e
SHA148d2d80472645ba00ee4b5bd99cbd0891a5a57f8
SHA25647d8a19569dc596b94110b91e4248e9ab88cbb4ff9af76315b2fe187f7b53263
SHA5124d4a6cce027c8edb78bdc36a50a7095aec8dd7ae27929849a65ac1c330b52a1b619a9a132939a98c26deb5e3f8b22f7c2fca1368a35ffb2a7fce0c32a5e56105
-
Filesize
25KB
MD50028915f90e45138f57de72a56486800
SHA10858ea3daf044c201263bf3f3a5ed83466bd4318
SHA256622c3bdc367826d282dc3882c3ca379e6eee1835eff9a46d56ca6dbd8406f1f2
SHA512d13a5b7dc2651dfc3d5b95796c549ac2a92162baa91a0d4d0c4c8b74864473adb70d2a982c9664df6b25ec5354d251dfa2d5366dfa1d0c2d96b1deb3d1d16dac
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
Filesize
49KB
MD527f87ebebb071afec1891e00fd0700a4
SHA1fbfc0a10ecf83da88df02356568bcac2399b3b9d
SHA25611b8cdd387370de1d162516b82376ecf28d321dc8f46ebcce389dccc2a5a4cc9
SHA5125386cae4eef9b767082d1143962851727479295b75321e07927bf7ebd60c5e051aeb78d6fa306ed6ef1c1d0182a16f1132a23263aefe9ed5d9d446b70b43a25d