Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 23:18
Behavioral task
behavioral1
Sample
7dc8175e7ef0d0b31776b5c645c66d898e2c55bdc16fe82444e836658900327eN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7dc8175e7ef0d0b31776b5c645c66d898e2c55bdc16fe82444e836658900327eN.exe
Resource
win10v2004-20241007-en
General
-
Target
7dc8175e7ef0d0b31776b5c645c66d898e2c55bdc16fe82444e836658900327eN.exe
-
Size
869KB
-
MD5
10d4d567c9c1f2eb3009cb5f54cc08b0
-
SHA1
5eff551e4388028df3fe6a363df975d0a2c6083c
-
SHA256
7dc8175e7ef0d0b31776b5c645c66d898e2c55bdc16fe82444e836658900327e
-
SHA512
99913a233a16e4c957b1cf6aeae1fc6f0de4def217948a01072179c9f50d0dc948ce1f9bb3b9b894ff916b320a1a538d203c1191dd1b3aff3ecc4ac4feb696b0
-
SSDEEP
12288:xMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9Iy0JUdhj:xnsJ39LyjbJkQFMhmC+6GD9R68
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2708 ._cache_7dc8175e7ef0d0b31776b5c645c66d898e2c55bdc16fe82444e836658900327eN.exe 2544 Synaptics.exe 2508 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 3040 7dc8175e7ef0d0b31776b5c645c66d898e2c55bdc16fe82444e836658900327eN.exe 3040 7dc8175e7ef0d0b31776b5c645c66d898e2c55bdc16fe82444e836658900327eN.exe 3040 7dc8175e7ef0d0b31776b5c645c66d898e2c55bdc16fe82444e836658900327eN.exe 2544 Synaptics.exe 2544 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 7dc8175e7ef0d0b31776b5c645c66d898e2c55bdc16fe82444e836658900327eN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7dc8175e7ef0d0b31776b5c645c66d898e2c55bdc16fe82444e836658900327eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2984 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2984 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2708 3040 7dc8175e7ef0d0b31776b5c645c66d898e2c55bdc16fe82444e836658900327eN.exe 30 PID 3040 wrote to memory of 2708 3040 7dc8175e7ef0d0b31776b5c645c66d898e2c55bdc16fe82444e836658900327eN.exe 30 PID 3040 wrote to memory of 2708 3040 7dc8175e7ef0d0b31776b5c645c66d898e2c55bdc16fe82444e836658900327eN.exe 30 PID 3040 wrote to memory of 2708 3040 7dc8175e7ef0d0b31776b5c645c66d898e2c55bdc16fe82444e836658900327eN.exe 30 PID 3040 wrote to memory of 2544 3040 7dc8175e7ef0d0b31776b5c645c66d898e2c55bdc16fe82444e836658900327eN.exe 32 PID 3040 wrote to memory of 2544 3040 7dc8175e7ef0d0b31776b5c645c66d898e2c55bdc16fe82444e836658900327eN.exe 32 PID 3040 wrote to memory of 2544 3040 7dc8175e7ef0d0b31776b5c645c66d898e2c55bdc16fe82444e836658900327eN.exe 32 PID 3040 wrote to memory of 2544 3040 7dc8175e7ef0d0b31776b5c645c66d898e2c55bdc16fe82444e836658900327eN.exe 32 PID 2544 wrote to memory of 2508 2544 Synaptics.exe 33 PID 2544 wrote to memory of 2508 2544 Synaptics.exe 33 PID 2544 wrote to memory of 2508 2544 Synaptics.exe 33 PID 2544 wrote to memory of 2508 2544 Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\7dc8175e7ef0d0b31776b5c645c66d898e2c55bdc16fe82444e836658900327eN.exe"C:\Users\Admin\AppData\Local\Temp\7dc8175e7ef0d0b31776b5c645c66d898e2c55bdc16fe82444e836658900327eN.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\._cache_7dc8175e7ef0d0b31776b5c645c66d898e2c55bdc16fe82444e836658900327eN.exe"C:\Users\Admin\AppData\Local\Temp\._cache_7dc8175e7ef0d0b31776b5c645c66d898e2c55bdc16fe82444e836658900327eN.exe"2⤵
- Executes dropped EXE
PID:2708
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2508
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
869KB
MD510d4d567c9c1f2eb3009cb5f54cc08b0
SHA15eff551e4388028df3fe6a363df975d0a2c6083c
SHA2567dc8175e7ef0d0b31776b5c645c66d898e2c55bdc16fe82444e836658900327e
SHA51299913a233a16e4c957b1cf6aeae1fc6f0de4def217948a01072179c9f50d0dc948ce1f9bb3b9b894ff916b320a1a538d203c1191dd1b3aff3ecc4ac4feb696b0
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
30KB
MD585822cf28dd340e9eff716bb9088a665
SHA1f92fd76e831b95f731721aeaf649ee12d261acdc
SHA25646b0ab331bc42cb676f6b95b8dd8dc8278740172f7c5bdecb865aa603e32b128
SHA5125f5ccab4a1bdfa8123f74b77be09809e875a869a2c26da359b90411a59190c66d4d6fb984a449a23d60cf9ec8e158ef89254e763f7c3f0837256374f604bf9ca
-
Filesize
28KB
MD5d98a361cbd1a2f4fcabc22dbe9a4cdba
SHA1b6e3c3858a27a6f0ed071f747b62d937cb4f6162
SHA256c740f5a8e42d00e0bf1b15d7333e0472229ea4409f4428abeac321528ef8214b
SHA512ae065251432241cb4e09f9a462063ef09db9f623abcac7cddc860ed628f9acffe5277177b175f9f82e027ffcfa1a90ccf882aa452de699865a01c3b4c0afbb04
-
Filesize
22KB
MD527f597dbe4c4879ca079e726b4cfee36
SHA18afc558b7fd6be7365fecf13b9f0cbc51985ac42
SHA256bc86c390c8c3f1f65103b9e491c0423a597ef77c9fb9c7c09dfae4538012579a
SHA51248fcf7dc89ad05ea08da68c1b6e8208c5cd723206c4260de5efc1422c23bbd022510364eea3a54dc8d4368ba9da8dc3dd9335b14c6da7118fc84f27f1da5adbb
-
Filesize
26KB
MD5d1c76821af6c3baa0b8a6878be8350bd
SHA1bf664a689e56b9bc84b5713d1c2b5448059fde29
SHA25678fc469665586d1e70e2bff311522113315022c2a505e2a3396dd740314a4f18
SHA512d0bf0e5c1e1e396483bee00f82940a95ca560df277ac450e4322b4fe46085714a02526748fd43a5c5f98f788b04864624e2725857cd8e74bd6a52b034a52cd2d
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
\Users\Admin\AppData\Local\Temp\._cache_7dc8175e7ef0d0b31776b5c645c66d898e2c55bdc16fe82444e836658900327eN.exe
Filesize116KB
MD518ca9f4ef89d64e460ae69bf5526359b
SHA139622e60fbd7a2af3f051a488415539b4fca5805
SHA25621e77bbbc0932674fa8b7d9331c88ab2a6bb6edf1fb3e9c44a9dfde1a293f14e
SHA512d32782541169221d14edf47c403f67a67ed0536cb83fbd02988c1637551563ad58ce84d643069bf3f881728d5e93d2cdafd44093ed3d3dc69e9c6a07f3f9cadc