Analysis
-
max time kernel
111s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2025 23:43
Behavioral task
behavioral1
Sample
7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe
Resource
win10v2004-20241007-en
General
-
Target
7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe
-
Size
1.6MB
-
MD5
3b2a49feae089bcc362acba0c2755460
-
SHA1
cf18800bba227b25ef058063f6f7fa88cab60d78
-
SHA256
7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5
-
SHA512
9f12233afa29b4ab34f4fffaf2bf11760c4daf5bef80fc826ce0a13349a6d718f4ceaff1a3088517dbdeee280a6e023fd8159c036c0b6a0fa96c93d2284c71a3
-
SSDEEP
24576:YnsJ39LyjbJkQFMhmC+6GD9dxSpwADf3qN1Pvg:YnsHyjtk2MYC5GDdGDf3qN1ng
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 216 ._cache_7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe 3392 Synaptics.exe 5024 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\DPINST.LOG ._cache_7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe File opened for modification C:\Windows\DPINST.LOG ._cache_Synaptics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1176 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1176 EXCEL.EXE 1176 EXCEL.EXE 1176 EXCEL.EXE 1176 EXCEL.EXE 1176 EXCEL.EXE 1176 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 600 wrote to memory of 216 600 7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe 84 PID 600 wrote to memory of 216 600 7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe 84 PID 600 wrote to memory of 216 600 7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe 84 PID 600 wrote to memory of 3392 600 7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe 85 PID 600 wrote to memory of 3392 600 7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe 85 PID 600 wrote to memory of 3392 600 7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe 85 PID 3392 wrote to memory of 5024 3392 Synaptics.exe 86 PID 3392 wrote to memory of 5024 3392 Synaptics.exe 86 PID 3392 wrote to memory of 5024 3392 Synaptics.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe"C:\Users\Admin\AppData\Local\Temp\7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:600 -
C:\Users\Admin\AppData\Local\Temp\._cache_7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:216
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5024
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD53b2a49feae089bcc362acba0c2755460
SHA1cf18800bba227b25ef058063f6f7fa88cab60d78
SHA2567e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5
SHA5129f12233afa29b4ab34f4fffaf2bf11760c4daf5bef80fc826ce0a13349a6d718f4ceaff1a3088517dbdeee280a6e023fd8159c036c0b6a0fa96c93d2284c71a3
-
C:\Users\Admin\AppData\Local\Temp\._cache_7e76aa5ade41710695f7cac59c84075c0ae5fae4e76ca3f4f77debf30a1b19b5N.exe
Filesize899KB
MD52035756e0d5e446d019e6041ddd597be
SHA1ee1168c2f4106cf3de7740399ee08a274d71a42a
SHA256eafc922110ee7a02b5cebf060db4c6b69c4c5a47ecb98e881c4b28f1a66b395c
SHA51284994481fa001d5de76ba2bed1c1327c45193b008837157d5ac2247bbd2c0c40093fd04c4829baac92f5f130acac1e64f510c6f1cf4e7a034fdc3c319200e724
-
Filesize
23KB
MD5ce673497164ec1f14814dba158642f6f
SHA1cb31566b60c2179380a06a1b799cbf5a8218a3bc
SHA2564f70e3093831b4cfc26d000318032ded479c896fa6a05164081cb3bb258fcdf9
SHA51284f5d538a5c32cda38caa749ac2c5eeff73dd1036098b526d8d1b0ec8c6a867e4c8485932ab0908d6541e9d50f6fd0467bc6e10961f59238d0720f615dad3127
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
2KB
MD5a4d6eb45166b5773e38f0ec924ee9ad0
SHA1a35f38fecf176739d20e52a93a16fb2b24181239
SHA256238d6ad9f4246ab94566d77c45fbe099c7395a582240c21dfcfa252f4303d9b1
SHA5122030ceaaf6d760147ab13e783527b4dca47518bbba93a10204a77ed29bf0a04302ac84bbeca283ed2091c37de0cd895fc416c8a988c283ca17cb2b76341a0ac8