Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13-01-2025 07:17
Behavioral task
behavioral1
Sample
db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe
Resource
win10v2004-20241007-en
General
-
Target
db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe
-
Size
980KB
-
MD5
a98bb278468370c572610865052def56
-
SHA1
b3f61627939e0899cf0208d8070e4a38e625bb06
-
SHA256
db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4
-
SHA512
87cf147589b1005891d78ea07f6596b3094d29b2fc812e63622f98f38ed068e02491ce143cc68b93a9015361f2e913f85b8edefb05b52bbd5c535ffe10e5aed1
-
SSDEEP
24576:nnsJ39LyjbJkQFMhmC+6GD975xolYQY6+I:nnsHyjtk2MYC5GDQYNI
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 5 IoCs
pid Process 3048 ._cache_db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe 2884 ._cache_db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe 2712 Synaptics.exe 1888 ._cache_Synaptics.exe 1880 ._cache_synaptics.exe -
Loads dropped DLL 19 IoCs
pid Process 2808 db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe 2808 db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe 3048 ._cache_db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe 2808 db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe 2808 db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe 2712 Synaptics.exe 2712 Synaptics.exe 2712 Synaptics.exe 1888 ._cache_Synaptics.exe 1684 WerFault.exe 1684 WerFault.exe 1684 WerFault.exe 1684 WerFault.exe 2728 WerFault.exe 2728 WerFault.exe 2728 WerFault.exe 2728 WerFault.exe 1684 WerFault.exe 2728 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1684 2884 WerFault.exe 31 2728 1880 WerFault.exe 35 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1996 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3048 ._cache_db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe 3048 ._cache_db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe 1888 ._cache_Synaptics.exe 1888 ._cache_Synaptics.exe 1996 EXCEL.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2808 wrote to memory of 3048 2808 db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe 30 PID 2808 wrote to memory of 3048 2808 db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe 30 PID 2808 wrote to memory of 3048 2808 db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe 30 PID 2808 wrote to memory of 3048 2808 db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe 30 PID 3048 wrote to memory of 2884 3048 ._cache_db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe 31 PID 3048 wrote to memory of 2884 3048 ._cache_db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe 31 PID 3048 wrote to memory of 2884 3048 ._cache_db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe 31 PID 3048 wrote to memory of 2884 3048 ._cache_db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe 31 PID 2808 wrote to memory of 2712 2808 db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe 32 PID 2808 wrote to memory of 2712 2808 db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe 32 PID 2808 wrote to memory of 2712 2808 db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe 32 PID 2808 wrote to memory of 2712 2808 db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe 32 PID 2712 wrote to memory of 1888 2712 Synaptics.exe 33 PID 2712 wrote to memory of 1888 2712 Synaptics.exe 33 PID 2712 wrote to memory of 1888 2712 Synaptics.exe 33 PID 2712 wrote to memory of 1888 2712 Synaptics.exe 33 PID 1888 wrote to memory of 1880 1888 ._cache_Synaptics.exe 35 PID 1888 wrote to memory of 1880 1888 ._cache_Synaptics.exe 35 PID 1888 wrote to memory of 1880 1888 ._cache_Synaptics.exe 35 PID 1888 wrote to memory of 1880 1888 ._cache_Synaptics.exe 35 PID 1880 wrote to memory of 2728 1880 ._cache_synaptics.exe 37 PID 1880 wrote to memory of 2728 1880 ._cache_synaptics.exe 37 PID 1880 wrote to memory of 2728 1880 ._cache_synaptics.exe 37 PID 1880 wrote to memory of 2728 1880 ._cache_synaptics.exe 37 PID 2884 wrote to memory of 1684 2884 ._cache_db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe 36 PID 2884 wrote to memory of 1684 2884 ._cache_db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe 36 PID 2884 wrote to memory of 1684 2884 ._cache_db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe 36 PID 2884 wrote to memory of 1684 2884 ._cache_db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe"C:\Users\Admin\AppData\Local\Temp\db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\._cache_db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe"C:\Users\Admin\AppData\Local\Temp\._cache_db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
\??\c:\users\admin\appdata\local\temp\._cache_db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exec:\users\admin\appdata\local\temp\._cache_db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2884 -s 5524⤵
- Loads dropped DLL
- Program crash
PID:1684
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1888 -
\??\c:\users\admin\appdata\local\temp\._cache_synaptics.exec:\users\admin\appdata\local\temp\._cache_synaptics.exe InjUpdate4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1880 -s 5525⤵
- Loads dropped DLL
- Program crash
PID:2728
-
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
980KB
MD5a98bb278468370c572610865052def56
SHA1b3f61627939e0899cf0208d8070e4a38e625bb06
SHA256db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4
SHA51287cf147589b1005891d78ea07f6596b3094d29b2fc812e63622f98f38ed068e02491ce143cc68b93a9015361f2e913f85b8edefb05b52bbd5c535ffe10e5aed1
-
C:\Users\Admin\AppData\Local\Temp\._cache_db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe
Filesize20KB
MD5f83e3d53d747b25e29df03c30eafcb1f
SHA1bf705087922f4c9ccf8cf4194c1ce67a7bfbd319
SHA25641b3a316dc3856ef958f3e9d7968f6fde0040e199fe61f85b00d188f24f50ba9
SHA51230d1c759e183ca054e03229b72f21878d906c8100be5c63fe1ba62a4926e7dabc3b0e71396a427671865f406135fa2a8d771ae919d8110fe592c95e3a589728f
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
206KB
MD5102899034e993b46a13a62d3ff2d9fdb
SHA1d784fd07ecdfe133fbeae14fd9785b6f4e490f76
SHA2564ea6b9830682272506a8ad0dd559379bbe8b5b7989609d14562353d34425d4f4
SHA51238faae6f4f267a0554d772cb99584f634d94b30e8769ae00a648011a82de16ac7cd725b094a6bc982c994f268da72caae9b2b880d8e8cf7a27f7e0e1fd73cca0
-
\Users\Admin\AppData\Local\Temp\._cache_db9fae14fff980af1185980403e8e5c65d757ebbf02732d1c46a9668898256f4.exe
Filesize226KB
MD5ebb8f5135ff7cb88580e27f9581ebc3f
SHA1e7a1e28ae53005278924c3a50df2da9037a4df02
SHA256831f7ca536139c61b78b3f02482994ea206d1c056dd12aabe3a3b8dcdc0a854c
SHA51222ebbf0f086ab3a9852ec7b0d783b30dbc2bcbb76401d379ff13538d3b452da8ad0b6fcb2b980168df2ef5643eeb5ab5da828c92697f96863c818cf734ab5046