Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
15-01-2025 23:43
Behavioral task
behavioral1
Sample
7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe
Resource
win10v2004-20241007-en
General
-
Target
7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe
-
Size
1.6MB
-
MD5
3b2a49feae089bcc362acba0c2755460
-
SHA1
cf18800bba227b25ef058063f6f7fa88cab60d78
-
SHA256
7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5
-
SHA512
9f12233afa29b4ab34f4fffaf2bf11760c4daf5bef80fc826ce0a13349a6d718f4ceaff1a3088517dbdeee280a6e023fd8159c036c0b6a0fa96c93d2284c71a3
-
SSDEEP
24576:YnsJ39LyjbJkQFMhmC+6GD9dxSpwADf3qN1Pvg:YnsHyjtk2MYC5GDdGDf3qN1ng
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2680 ._cache_7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe 2148 Synaptics.exe 2756 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 2564 7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe 2564 7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe 2564 7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe 2148 Synaptics.exe 2148 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\DPINST.LOG ._cache_7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe File opened for modification C:\Windows\DPINST.LOG ._cache_Synaptics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2772 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2772 EXCEL.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2680 2564 7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe 30 PID 2564 wrote to memory of 2680 2564 7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe 30 PID 2564 wrote to memory of 2680 2564 7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe 30 PID 2564 wrote to memory of 2680 2564 7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe 30 PID 2564 wrote to memory of 2680 2564 7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe 30 PID 2564 wrote to memory of 2680 2564 7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe 30 PID 2564 wrote to memory of 2680 2564 7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe 30 PID 2564 wrote to memory of 2148 2564 7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe 31 PID 2564 wrote to memory of 2148 2564 7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe 31 PID 2564 wrote to memory of 2148 2564 7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe 31 PID 2564 wrote to memory of 2148 2564 7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe 31 PID 2148 wrote to memory of 2756 2148 Synaptics.exe 32 PID 2148 wrote to memory of 2756 2148 Synaptics.exe 32 PID 2148 wrote to memory of 2756 2148 Synaptics.exe 32 PID 2148 wrote to memory of 2756 2148 Synaptics.exe 32 PID 2148 wrote to memory of 2756 2148 Synaptics.exe 32 PID 2148 wrote to memory of 2756 2148 Synaptics.exe 32 PID 2148 wrote to memory of 2756 2148 Synaptics.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe"C:\Users\Admin\AppData\Local\Temp\7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\._cache_7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2680
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2756
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD53b2a49feae089bcc362acba0c2755460
SHA1cf18800bba227b25ef058063f6f7fa88cab60d78
SHA2567e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5
SHA5129f12233afa29b4ab34f4fffaf2bf11760c4daf5bef80fc826ce0a13349a6d718f4ceaff1a3088517dbdeee280a6e023fd8159c036c0b6a0fa96c93d2284c71a3
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
1KB
MD5e4255cebf286328180fda2b8b47f0313
SHA1e266f9fe1bd9ea1579929b121ea97e4120289efa
SHA2568ee6193e088864741de6c09c02cf090c0103834adba9f70cb5847c459e2e15bf
SHA512cb9df70285c34dae98de0678dbd22c9126204e4bc0cab38c524157e7b2adffc8071ad9002ff437ba852016b4d7852bbfce55f6626338d7c6f91a65c306971b08
-
\Users\Admin\AppData\Local\Temp\._cache_7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe
Filesize899KB
MD52035756e0d5e446d019e6041ddd597be
SHA1ee1168c2f4106cf3de7740399ee08a274d71a42a
SHA256eafc922110ee7a02b5cebf060db4c6b69c4c5a47ecb98e881c4b28f1a66b395c
SHA51284994481fa001d5de76ba2bed1c1327c45193b008837157d5ac2247bbd2c0c40093fd04c4829baac92f5f130acac1e64f510c6f1cf4e7a034fdc3c319200e724