Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 16:15
Behavioral task
behavioral1
Sample
8ec1d3b1705ddf0a6148602e29bf815db9cf25bbf058662c79018ed60f2f237cN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8ec1d3b1705ddf0a6148602e29bf815db9cf25bbf058662c79018ed60f2f237cN.exe
Resource
win10v2004-20241007-en
General
-
Target
8ec1d3b1705ddf0a6148602e29bf815db9cf25bbf058662c79018ed60f2f237cN.exe
-
Size
767KB
-
MD5
f28297af9fb9f8848faf151cd8608090
-
SHA1
73283932e1794ae42c7a90fba10f1c93a0f3fa0b
-
SHA256
8ec1d3b1705ddf0a6148602e29bf815db9cf25bbf058662c79018ed60f2f237c
-
SHA512
1a4500c84ff4b9c0aed509a412cee3000d3c1961d5e45f78c4d28d1c1f053a825a1d81f29277d502f7eb20d3773925fcb418387cfcd8310fc85ad6a389101512
-
SSDEEP
12288:2MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9vzj:2nsJ39LyjbJkQFMhmC+6GD93
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2684 ._cache_8ec1d3b1705ddf0a6148602e29bf815db9cf25bbf058662c79018ed60f2f237cN.exe 2700 Synaptics.exe 2652 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 3068 8ec1d3b1705ddf0a6148602e29bf815db9cf25bbf058662c79018ed60f2f237cN.exe 3068 8ec1d3b1705ddf0a6148602e29bf815db9cf25bbf058662c79018ed60f2f237cN.exe 3068 8ec1d3b1705ddf0a6148602e29bf815db9cf25bbf058662c79018ed60f2f237cN.exe 3068 8ec1d3b1705ddf0a6148602e29bf815db9cf25bbf058662c79018ed60f2f237cN.exe 2700 Synaptics.exe 2700 Synaptics.exe 2700 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 8ec1d3b1705ddf0a6148602e29bf815db9cf25bbf058662c79018ed60f2f237cN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ec1d3b1705ddf0a6148602e29bf815db9cf25bbf058662c79018ed60f2f237cN.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1296 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 2684 ._cache_8ec1d3b1705ddf0a6148602e29bf815db9cf25bbf058662c79018ed60f2f237cN.exe Token: SeBackupPrivilege 2652 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1296 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2684 3068 8ec1d3b1705ddf0a6148602e29bf815db9cf25bbf058662c79018ed60f2f237cN.exe 28 PID 3068 wrote to memory of 2684 3068 8ec1d3b1705ddf0a6148602e29bf815db9cf25bbf058662c79018ed60f2f237cN.exe 28 PID 3068 wrote to memory of 2684 3068 8ec1d3b1705ddf0a6148602e29bf815db9cf25bbf058662c79018ed60f2f237cN.exe 28 PID 3068 wrote to memory of 2684 3068 8ec1d3b1705ddf0a6148602e29bf815db9cf25bbf058662c79018ed60f2f237cN.exe 28 PID 3068 wrote to memory of 2700 3068 8ec1d3b1705ddf0a6148602e29bf815db9cf25bbf058662c79018ed60f2f237cN.exe 30 PID 3068 wrote to memory of 2700 3068 8ec1d3b1705ddf0a6148602e29bf815db9cf25bbf058662c79018ed60f2f237cN.exe 30 PID 3068 wrote to memory of 2700 3068 8ec1d3b1705ddf0a6148602e29bf815db9cf25bbf058662c79018ed60f2f237cN.exe 30 PID 3068 wrote to memory of 2700 3068 8ec1d3b1705ddf0a6148602e29bf815db9cf25bbf058662c79018ed60f2f237cN.exe 30 PID 2700 wrote to memory of 2652 2700 Synaptics.exe 31 PID 2700 wrote to memory of 2652 2700 Synaptics.exe 31 PID 2700 wrote to memory of 2652 2700 Synaptics.exe 31 PID 2700 wrote to memory of 2652 2700 Synaptics.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ec1d3b1705ddf0a6148602e29bf815db9cf25bbf058662c79018ed60f2f237cN.exe"C:\Users\Admin\AppData\Local\Temp\8ec1d3b1705ddf0a6148602e29bf815db9cf25bbf058662c79018ed60f2f237cN.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\._cache_8ec1d3b1705ddf0a6148602e29bf815db9cf25bbf058662c79018ed60f2f237cN.exe"C:\Users\Admin\AppData\Local\Temp\._cache_8ec1d3b1705ddf0a6148602e29bf815db9cf25bbf058662c79018ed60f2f237cN.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
767KB
MD5f28297af9fb9f8848faf151cd8608090
SHA173283932e1794ae42c7a90fba10f1c93a0f3fa0b
SHA2568ec1d3b1705ddf0a6148602e29bf815db9cf25bbf058662c79018ed60f2f237c
SHA5121a4500c84ff4b9c0aed509a412cee3000d3c1961d5e45f78c4d28d1c1f053a825a1d81f29277d502f7eb20d3773925fcb418387cfcd8310fc85ad6a389101512
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
20KB
MD5c3d86a0035568630d8f51c567342080f
SHA167841549ce0631f03fab42423c9bc128948507a2
SHA2566bea928cda5f3db75dc34d2e12164ff191d0d349afba4ee98453058dd29f12e9
SHA5124599068ed9d61a1eec629cc9e988ee2fc8613899ad1080614de313b85962950377d03c9dba7b562bb0f17d3fb8d345baeda721e5ee5b2b4fb492f9b23ec59e8e
-
Filesize
24KB
MD56e621626f7ce30fb6d5fdde2708f4d80
SHA1de3843a03f89f6468ea31bac2166fa4c0d223aea
SHA25676f5782a16451c28e702066225f0b89050456c7e9d609f5ee810a9f46dd36f9e
SHA51201d44692c0b78bd1dce1868457d9a3cc49623b05f6b219a61d190ee70d007715c42b008d8aac49c258682666109a38aaa0056cb00d7f5ba2035e28d4dc9f033e
-
Filesize
23KB
MD53c833df555fcc90fe003dd260bbd0a1f
SHA1a7c2bde926167343480c635d99d09dc33e55d38b
SHA256957d73c55a98d17adb29d237a4bcebaccd2f93f11eb2ee1b4f77a8df08aaa2a9
SHA51260e26eb84700295b2019b45c2cc1169ae1434d5af49bcc9008a89c5479b56f8b64911fdbcc5b1133617b1bcf6baac9a1e09f783edfb37da2f91aa9926145d6a2
-
\Users\Admin\AppData\Local\Temp\._cache_8ec1d3b1705ddf0a6148602e29bf815db9cf25bbf058662c79018ed60f2f237cN.exe
Filesize14KB
MD5f8aeb6e06cc807722b79785243f32c02
SHA1472e9a557f8b8712b2fafd4519e0606e04ab4494
SHA2560ff33155d9f99a20f7e401e2b9cf11ab1511ede365334bbaab2428e079913b9b
SHA51270f0f5c208ef6a8a5f677ba5b55dbe7253adfe25a92392a1a7c528c30b4963f839aeb425c163008456970a6789357c5a7df688b42bedf3f66e8222a7122147f3