Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-01-2025 03:32
Behavioral task
behavioral1
Sample
75d2c849a066d4eb96beeb6ccde6e5116c38d88af480abdad29b38c37fc7dd06.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
75d2c849a066d4eb96beeb6ccde6e5116c38d88af480abdad29b38c37fc7dd06.exe
Resource
win10v2004-20241007-en
General
-
Target
75d2c849a066d4eb96beeb6ccde6e5116c38d88af480abdad29b38c37fc7dd06.exe
-
Size
759KB
-
MD5
c01d5a8990c1e1f3cd8d5c30c32e39ab
-
SHA1
85ed1aeb5a38d1a0b598ce60924e0a8996a75b76
-
SHA256
75d2c849a066d4eb96beeb6ccde6e5116c38d88af480abdad29b38c37fc7dd06
-
SHA512
70f31f12a914fa181cf1fb05660e54742c6b7f8d2562b141d3f7da2076694e17ae77f6182a1bcc32c8465d9b6242503851f7419cd3f8f0d1a5f96fa4e0fef04f
-
SSDEEP
12288:SMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9Ymj:SnsJ39LyjbJkQFMhmC+6GD9x
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2904 ._cache_75d2c849a066d4eb96beeb6ccde6e5116c38d88af480abdad29b38c37fc7dd06.exe 2616 Synaptics.exe 1084 ._cache_Synaptics.exe -
Loads dropped DLL 15 IoCs
pid Process 2896 75d2c849a066d4eb96beeb6ccde6e5116c38d88af480abdad29b38c37fc7dd06.exe 2896 75d2c849a066d4eb96beeb6ccde6e5116c38d88af480abdad29b38c37fc7dd06.exe 2896 75d2c849a066d4eb96beeb6ccde6e5116c38d88af480abdad29b38c37fc7dd06.exe 2664 WerFault.exe 2664 WerFault.exe 2664 WerFault.exe 2664 WerFault.exe 2616 Synaptics.exe 2616 Synaptics.exe 2920 WerFault.exe 2920 WerFault.exe 2920 WerFault.exe 2920 WerFault.exe 2664 WerFault.exe 2920 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 75d2c849a066d4eb96beeb6ccde6e5116c38d88af480abdad29b38c37fc7dd06.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2664 2904 WerFault.exe 30 2920 1084 WerFault.exe 34 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 75d2c849a066d4eb96beeb6ccde6e5116c38d88af480abdad29b38c37fc7dd06.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_75d2c849a066d4eb96beeb6ccde6e5116c38d88af480abdad29b38c37fc7dd06.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2720 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2720 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2904 2896 75d2c849a066d4eb96beeb6ccde6e5116c38d88af480abdad29b38c37fc7dd06.exe 30 PID 2896 wrote to memory of 2904 2896 75d2c849a066d4eb96beeb6ccde6e5116c38d88af480abdad29b38c37fc7dd06.exe 30 PID 2896 wrote to memory of 2904 2896 75d2c849a066d4eb96beeb6ccde6e5116c38d88af480abdad29b38c37fc7dd06.exe 30 PID 2896 wrote to memory of 2904 2896 75d2c849a066d4eb96beeb6ccde6e5116c38d88af480abdad29b38c37fc7dd06.exe 30 PID 2896 wrote to memory of 2616 2896 75d2c849a066d4eb96beeb6ccde6e5116c38d88af480abdad29b38c37fc7dd06.exe 32 PID 2896 wrote to memory of 2616 2896 75d2c849a066d4eb96beeb6ccde6e5116c38d88af480abdad29b38c37fc7dd06.exe 32 PID 2896 wrote to memory of 2616 2896 75d2c849a066d4eb96beeb6ccde6e5116c38d88af480abdad29b38c37fc7dd06.exe 32 PID 2896 wrote to memory of 2616 2896 75d2c849a066d4eb96beeb6ccde6e5116c38d88af480abdad29b38c37fc7dd06.exe 32 PID 2904 wrote to memory of 2664 2904 ._cache_75d2c849a066d4eb96beeb6ccde6e5116c38d88af480abdad29b38c37fc7dd06.exe 33 PID 2904 wrote to memory of 2664 2904 ._cache_75d2c849a066d4eb96beeb6ccde6e5116c38d88af480abdad29b38c37fc7dd06.exe 33 PID 2904 wrote to memory of 2664 2904 ._cache_75d2c849a066d4eb96beeb6ccde6e5116c38d88af480abdad29b38c37fc7dd06.exe 33 PID 2904 wrote to memory of 2664 2904 ._cache_75d2c849a066d4eb96beeb6ccde6e5116c38d88af480abdad29b38c37fc7dd06.exe 33 PID 2616 wrote to memory of 1084 2616 Synaptics.exe 34 PID 2616 wrote to memory of 1084 2616 Synaptics.exe 34 PID 2616 wrote to memory of 1084 2616 Synaptics.exe 34 PID 2616 wrote to memory of 1084 2616 Synaptics.exe 34 PID 1084 wrote to memory of 2920 1084 ._cache_Synaptics.exe 36 PID 1084 wrote to memory of 2920 1084 ._cache_Synaptics.exe 36 PID 1084 wrote to memory of 2920 1084 ._cache_Synaptics.exe 36 PID 1084 wrote to memory of 2920 1084 ._cache_Synaptics.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\75d2c849a066d4eb96beeb6ccde6e5116c38d88af480abdad29b38c37fc7dd06.exe"C:\Users\Admin\AppData\Local\Temp\75d2c849a066d4eb96beeb6ccde6e5116c38d88af480abdad29b38c37fc7dd06.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\._cache_75d2c849a066d4eb96beeb6ccde6e5116c38d88af480abdad29b38c37fc7dd06.exe"C:\Users\Admin\AppData\Local\Temp\._cache_75d2c849a066d4eb96beeb6ccde6e5116c38d88af480abdad29b38c37fc7dd06.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 5403⤵
- Loads dropped DLL
- Program crash
PID:2664
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1084 -s 5444⤵
- Loads dropped DLL
- Program crash
PID:2920
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
759KB
MD5c01d5a8990c1e1f3cd8d5c30c32e39ab
SHA185ed1aeb5a38d1a0b598ce60924e0a8996a75b76
SHA25675d2c849a066d4eb96beeb6ccde6e5116c38d88af480abdad29b38c37fc7dd06
SHA51270f31f12a914fa181cf1fb05660e54742c6b7f8d2562b141d3f7da2076694e17ae77f6182a1bcc32c8465d9b6242503851f7419cd3f8f0d1a5f96fa4e0fef04f
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
\Users\Admin\AppData\Local\Temp\._cache_75d2c849a066d4eb96beeb6ccde6e5116c38d88af480abdad29b38c37fc7dd06.exe
Filesize5KB
MD590b46feef74ffda7b7da1d49aa004e72
SHA114e9f342653af9cc3a61731c9db2ffc2f7cf9495
SHA256ecc898a54d85706ba73d674445639a53f54340766203104b47dd1541d9fae6f9
SHA5126221393ae59954d044dc47d91fc45acb10b0f721aed11fcf7ff82544e751128b9145c3433b1a98115c844cf7f44f6bc2d9a7c8d9297be25d9e705d1be7fba424