Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
14-01-2025 07:04
Behavioral task
behavioral1
Sample
af57a4b458a1b53fdc29e329853308a19111f35f5a5ae6589f4d411829f07713.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
af57a4b458a1b53fdc29e329853308a19111f35f5a5ae6589f4d411829f07713.exe
Resource
win10v2004-20241007-en
General
-
Target
af57a4b458a1b53fdc29e329853308a19111f35f5a5ae6589f4d411829f07713.exe
-
Size
759KB
-
MD5
46a9dd4365767c5dd4bc35e79f5b5771
-
SHA1
e1d5dbb373251150677c719c40122b3bf98f6e3a
-
SHA256
af57a4b458a1b53fdc29e329853308a19111f35f5a5ae6589f4d411829f07713
-
SHA512
dcd714f2fdd90d5f19f17ef5e41fc6f71cc60a11d628e8dc9b8263e8e1470f2b4af3ce3f69cba6673fd9f0ba33a3bea639a20ad0f7bb46fbecb7a63b6a859363
-
SSDEEP
12288:SMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9YAj:SnsJ39LyjbJkQFMhmC+6GD9n
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
resource behavioral1/files/0x000a000000016d43-104.dat -
Executes dropped EXE 3 IoCs
pid Process 1436 ._cache_af57a4b458a1b53fdc29e329853308a19111f35f5a5ae6589f4d411829f07713.exe 2536 Synaptics.exe 2712 ._cache_Synaptics.exe -
Loads dropped DLL 11 IoCs
pid Process 2592 af57a4b458a1b53fdc29e329853308a19111f35f5a5ae6589f4d411829f07713.exe 2592 af57a4b458a1b53fdc29e329853308a19111f35f5a5ae6589f4d411829f07713.exe 2592 af57a4b458a1b53fdc29e329853308a19111f35f5a5ae6589f4d411829f07713.exe 3032 dw20.exe 3032 dw20.exe 3032 dw20.exe 2536 Synaptics.exe 2536 Synaptics.exe 2848 dw20.exe 2848 dw20.exe 2848 dw20.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" af57a4b458a1b53fdc29e329853308a19111f35f5a5ae6589f4d411829f07713.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language af57a4b458a1b53fdc29e329853308a19111f35f5a5ae6589f4d411829f07713.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_af57a4b458a1b53fdc29e329853308a19111f35f5a5ae6589f4d411829f07713.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3000 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3000 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2592 wrote to memory of 1436 2592 af57a4b458a1b53fdc29e329853308a19111f35f5a5ae6589f4d411829f07713.exe 30 PID 2592 wrote to memory of 1436 2592 af57a4b458a1b53fdc29e329853308a19111f35f5a5ae6589f4d411829f07713.exe 30 PID 2592 wrote to memory of 1436 2592 af57a4b458a1b53fdc29e329853308a19111f35f5a5ae6589f4d411829f07713.exe 30 PID 2592 wrote to memory of 1436 2592 af57a4b458a1b53fdc29e329853308a19111f35f5a5ae6589f4d411829f07713.exe 30 PID 2592 wrote to memory of 2536 2592 af57a4b458a1b53fdc29e329853308a19111f35f5a5ae6589f4d411829f07713.exe 32 PID 2592 wrote to memory of 2536 2592 af57a4b458a1b53fdc29e329853308a19111f35f5a5ae6589f4d411829f07713.exe 32 PID 2592 wrote to memory of 2536 2592 af57a4b458a1b53fdc29e329853308a19111f35f5a5ae6589f4d411829f07713.exe 32 PID 2592 wrote to memory of 2536 2592 af57a4b458a1b53fdc29e329853308a19111f35f5a5ae6589f4d411829f07713.exe 32 PID 1436 wrote to memory of 3032 1436 ._cache_af57a4b458a1b53fdc29e329853308a19111f35f5a5ae6589f4d411829f07713.exe 33 PID 1436 wrote to memory of 3032 1436 ._cache_af57a4b458a1b53fdc29e329853308a19111f35f5a5ae6589f4d411829f07713.exe 33 PID 1436 wrote to memory of 3032 1436 ._cache_af57a4b458a1b53fdc29e329853308a19111f35f5a5ae6589f4d411829f07713.exe 33 PID 1436 wrote to memory of 3032 1436 ._cache_af57a4b458a1b53fdc29e329853308a19111f35f5a5ae6589f4d411829f07713.exe 33 PID 2536 wrote to memory of 2712 2536 Synaptics.exe 34 PID 2536 wrote to memory of 2712 2536 Synaptics.exe 34 PID 2536 wrote to memory of 2712 2536 Synaptics.exe 34 PID 2536 wrote to memory of 2712 2536 Synaptics.exe 34 PID 2712 wrote to memory of 2848 2712 ._cache_Synaptics.exe 36 PID 2712 wrote to memory of 2848 2712 ._cache_Synaptics.exe 36 PID 2712 wrote to memory of 2848 2712 ._cache_Synaptics.exe 36 PID 2712 wrote to memory of 2848 2712 ._cache_Synaptics.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\af57a4b458a1b53fdc29e329853308a19111f35f5a5ae6589f4d411829f07713.exe"C:\Users\Admin\AppData\Local\Temp\af57a4b458a1b53fdc29e329853308a19111f35f5a5ae6589f4d411829f07713.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\._cache_af57a4b458a1b53fdc29e329853308a19111f35f5a5ae6589f4d411829f07713.exe"C:\Users\Admin\AppData\Local\Temp\._cache_af57a4b458a1b53fdc29e329853308a19111f35f5a5ae6589f4d411829f07713.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 4003⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3032
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 3964⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2848
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
759KB
MD546a9dd4365767c5dd4bc35e79f5b5771
SHA1e1d5dbb373251150677c719c40122b3bf98f6e3a
SHA256af57a4b458a1b53fdc29e329853308a19111f35f5a5ae6589f4d411829f07713
SHA512dcd714f2fdd90d5f19f17ef5e41fc6f71cc60a11d628e8dc9b8263e8e1470f2b4af3ce3f69cba6673fd9f0ba33a3bea639a20ad0f7bb46fbecb7a63b6a859363
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
25KB
MD58f96aaecc4f8b94c5d43fd6983b7023a
SHA105f242805c7e04ab0e96a9137496fc687fe002af
SHA2567705763f42fe7d63e6f375b831942724776b0da14f76a2a8915701b08df5b23e
SHA51276ded84518f0b69d3198bb22a63b353470102e4086877150bccb1a40c14f5514b4d0145708b1662e6b8adea21d3921f745dcb2834427eb70e4408b76474e4f91
-
Filesize
23KB
MD5a797e2f207f5505f91df975ffa38853c
SHA13fd5c51efae566e87255f4eb693fdda56a47ca93
SHA256d1a4de2a690c7d4e861ec6c44bad4d53b25ea95b40d688382e4526d06a47bda2
SHA51235253306a46a02959366a5dce1755f282744d5865bebb705e99c14038ce27737e982608e63770eb941fc8ca222e55d722b94bd5fad772764525b92ceb694ace5
-
Filesize
21KB
MD5f5b0cb7595379b93b6c7e5950367592b
SHA19f542c5edab6a0f6a8bf33f1990c4eb1a6f4576c
SHA2567005d2549dffa63ee5af111693e1d878919bb5aca4cf634c1192d1eab1884ffd
SHA5120f5aac750d9961253810abf2542bc68b6d6541a7c7eebadd80435c718fa777b63a3430a7ffa1234100ef78ece32f99f4af30fa37d603c6cdaea7156016fe4438
-
Filesize
21KB
MD54df4e3f805c9a426e62fad0fd75768e3
SHA1fba84dcce451239a91722f496c19248d2e9d04bf
SHA256d2490bbcdb36ba99325e7c070f0ef6cadeae1b807de0b135932037916adcd981
SHA512e3e6473d442395b03ba26a1c339bcb0ae343d3cfe5d7aaa2031cdecf420983b5414dc2c11603dec41d3b89587aae2aba022f5cc9c051dd5bd6ae586a5a987f7a
-
Filesize
26KB
MD5eb02e49110a9cb675e1b03645c33dc81
SHA13728ddfdcbb90a9c3f4ad94a9dced1cb85defdcc
SHA2566763541bc33cedc856ef7740838cda83b37d001670e3b7d531d1d1d4adc8789d
SHA5128a53b5388e2d95629addeb5eb000e5dd72287f2399ca98e873aad02ce9e56a50ce0e92460742e711a94694e5f9b2af7a38ed5cfc66caf53d2e37085079640e22
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
\Users\Admin\AppData\Local\Temp\._cache_af57a4b458a1b53fdc29e329853308a19111f35f5a5ae6589f4d411829f07713.exe
Filesize5KB
MD56c83def76e1a69dc06be936a915406c4
SHA1da780ae9b2650968a1ef7c8a8a65a1f7026fd553
SHA2567af9c62195b6da923bf0ebc94eaa5cacefc93c2044c8444e184c7b61a8988b63
SHA512c9f1264150ee3bf1bcdaa8abbd47e943f4899ec9e34311de6ed715948fa51b2a396c85add1832919fc2471bd0c50ff653cc5da18f2062e94163e2ccc2b3b17db