Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
13-01-2025 19:22
Behavioral task
behavioral1
Sample
031fc43e40930165bceec81343f423e652adefc1e91e4a525c2348859c22ea25.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
031fc43e40930165bceec81343f423e652adefc1e91e4a525c2348859c22ea25.exe
Resource
win10v2004-20241007-en
General
-
Target
031fc43e40930165bceec81343f423e652adefc1e91e4a525c2348859c22ea25.exe
-
Size
758KB
-
MD5
0f26f5fd169878b2bffa2e359db64ca7
-
SHA1
91005b2391739d0355bfc4aa9b48378313ad80e3
-
SHA256
031fc43e40930165bceec81343f423e652adefc1e91e4a525c2348859c22ea25
-
SHA512
5526b5fc7f4f02d63ad7acf02f914355d4bb476344d9b2866e08d709ee25babdadae21fc314e68b0e07b476b211eac5efdf701d2e495795952cced34f4096935
-
SSDEEP
12288:mMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9ifj:mnsJ39LyjbJkQFMhmC+6GD9q
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
resource behavioral1/files/0x00060000000196a1-94.dat -
Executes dropped EXE 3 IoCs
pid Process 2804 ._cache_031fc43e40930165bceec81343f423e652adefc1e91e4a525c2348859c22ea25.exe 2740 Synaptics.exe 2780 ._cache_Synaptics.exe -
Loads dropped DLL 11 IoCs
pid Process 2236 031fc43e40930165bceec81343f423e652adefc1e91e4a525c2348859c22ea25.exe 2236 031fc43e40930165bceec81343f423e652adefc1e91e4a525c2348859c22ea25.exe 2236 031fc43e40930165bceec81343f423e652adefc1e91e4a525c2348859c22ea25.exe 2568 dw20.exe 2568 dw20.exe 2568 dw20.exe 2740 Synaptics.exe 2740 Synaptics.exe 2920 dw20.exe 2920 dw20.exe 2920 dw20.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 031fc43e40930165bceec81343f423e652adefc1e91e4a525c2348859c22ea25.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 031fc43e40930165bceec81343f423e652adefc1e91e4a525c2348859c22ea25.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_031fc43e40930165bceec81343f423e652adefc1e91e4a525c2348859c22ea25.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2336 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2336 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2804 2236 031fc43e40930165bceec81343f423e652adefc1e91e4a525c2348859c22ea25.exe 30 PID 2236 wrote to memory of 2804 2236 031fc43e40930165bceec81343f423e652adefc1e91e4a525c2348859c22ea25.exe 30 PID 2236 wrote to memory of 2804 2236 031fc43e40930165bceec81343f423e652adefc1e91e4a525c2348859c22ea25.exe 30 PID 2236 wrote to memory of 2804 2236 031fc43e40930165bceec81343f423e652adefc1e91e4a525c2348859c22ea25.exe 30 PID 2236 wrote to memory of 2740 2236 031fc43e40930165bceec81343f423e652adefc1e91e4a525c2348859c22ea25.exe 32 PID 2236 wrote to memory of 2740 2236 031fc43e40930165bceec81343f423e652adefc1e91e4a525c2348859c22ea25.exe 32 PID 2236 wrote to memory of 2740 2236 031fc43e40930165bceec81343f423e652adefc1e91e4a525c2348859c22ea25.exe 32 PID 2236 wrote to memory of 2740 2236 031fc43e40930165bceec81343f423e652adefc1e91e4a525c2348859c22ea25.exe 32 PID 2804 wrote to memory of 2568 2804 ._cache_031fc43e40930165bceec81343f423e652adefc1e91e4a525c2348859c22ea25.exe 33 PID 2804 wrote to memory of 2568 2804 ._cache_031fc43e40930165bceec81343f423e652adefc1e91e4a525c2348859c22ea25.exe 33 PID 2804 wrote to memory of 2568 2804 ._cache_031fc43e40930165bceec81343f423e652adefc1e91e4a525c2348859c22ea25.exe 33 PID 2804 wrote to memory of 2568 2804 ._cache_031fc43e40930165bceec81343f423e652adefc1e91e4a525c2348859c22ea25.exe 33 PID 2740 wrote to memory of 2780 2740 Synaptics.exe 34 PID 2740 wrote to memory of 2780 2740 Synaptics.exe 34 PID 2740 wrote to memory of 2780 2740 Synaptics.exe 34 PID 2740 wrote to memory of 2780 2740 Synaptics.exe 34 PID 2780 wrote to memory of 2920 2780 ._cache_Synaptics.exe 36 PID 2780 wrote to memory of 2920 2780 ._cache_Synaptics.exe 36 PID 2780 wrote to memory of 2920 2780 ._cache_Synaptics.exe 36 PID 2780 wrote to memory of 2920 2780 ._cache_Synaptics.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\031fc43e40930165bceec81343f423e652adefc1e91e4a525c2348859c22ea25.exe"C:\Users\Admin\AppData\Local\Temp\031fc43e40930165bceec81343f423e652adefc1e91e4a525c2348859c22ea25.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\._cache_031fc43e40930165bceec81343f423e652adefc1e91e4a525c2348859c22ea25.exe"C:\Users\Admin\AppData\Local\Temp\._cache_031fc43e40930165bceec81343f423e652adefc1e91e4a525c2348859c22ea25.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 4003⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2568
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 4004⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2920
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
758KB
MD50f26f5fd169878b2bffa2e359db64ca7
SHA191005b2391739d0355bfc4aa9b48378313ad80e3
SHA256031fc43e40930165bceec81343f423e652adefc1e91e4a525c2348859c22ea25
SHA5125526b5fc7f4f02d63ad7acf02f914355d4bb476344d9b2866e08d709ee25babdadae21fc314e68b0e07b476b211eac5efdf701d2e495795952cced34f4096935
-
C:\Users\Admin\AppData\Local\Temp\._cache_031fc43e40930165bceec81343f423e652adefc1e91e4a525c2348859c22ea25.exe
Filesize5KB
MD5d1c2a3b371b2a3079c0626847473133a
SHA1148a8f4f9d164839106e6d8c975abefa9edd0930
SHA256179df48d01bce468c701a193a520918344bbe3d4415da237b19b43eef9ae1250
SHA512de11323a6c8d209ced36c28e1a4e7f62d248df031843107ad4c3365432c61d106a2c1f745a4388e65e5eed28aadfb7908eb97f1ac9d14e1bc15853e4f280bf4f
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
31KB
MD5acd856c34d7b9f3d18f204006f845000
SHA1b930ccc0a0f288cb1e2fc22e5f0bdaccd1be91dc
SHA2567782f1016445db937f62916296bbad498afedf4bf5e3fe95c6510e8893ed4509
SHA512687cab4e4abdd63f36f6bf1c4d47a73538c4a313a00d092f1a33f3cf485f44ece08b60b83c7f07c7d91b6e7b9e3dc3123fdf3ec1a592b2ed92ee5ff7b140ebae
-
Filesize
24KB
MD59e6fedfe2be2fdac167aa812121f69de
SHA17c6155a4d39126a3eaf34150577a39a181b28822
SHA2569192d85811f465babd402ce04a8555bfb170df76dcd7b37664548117bc1b89d8
SHA51222899af6c0ea5d0b8f3f4991cc0d2170a18495ce84779c6874476428f4f1051d65f9e18f5ddf299fa6ba80521d5d742a41eb6073f180a6dd0e4511fc3d57e45c
-
Filesize
28KB
MD5829962a8046dc6b79e2003ea9e9a6c8c
SHA117297fe760876aaf381cf9c403c656ce306a4c11
SHA256d31da3c32b65c8421ff4e2f98a4b95232f2ef305581928538fddafbda97ada9c
SHA512212047ceb7590911e7922054d482104b0d37551f5eb8d68a7cd9998fd18a99e5109f7ecc07111a8a95f2f58d8b0a82ab1be0164c1329e0de2a1e856c02f75dae