Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
92s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16/01/2025, 17:30
Behavioral task
behavioral1
Sample
1527271d50042d008402767c032625c5f40aea85d2dda5cf576cc921fc76270c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1527271d50042d008402767c032625c5f40aea85d2dda5cf576cc921fc76270c.exe
Resource
win10v2004-20241007-en
General
-
Target
1527271d50042d008402767c032625c5f40aea85d2dda5cf576cc921fc76270c.exe
-
Size
1.4MB
-
MD5
9d2bfadaa8820965b05fea147a08a677
-
SHA1
8d790b8c7d6d0e785cdd3af410187c8e92c7a794
-
SHA256
1527271d50042d008402767c032625c5f40aea85d2dda5cf576cc921fc76270c
-
SHA512
ed4562e55b47d59d617a9c87c66c63392ab916cded56d88e87f0dc2123209ef75e36586f4e486f453c083557b3b35f20cc371cd581be8d4f19a7337599dceb94
-
SSDEEP
12288:YMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V95MSlSnBxhgoSQD:YnsJ39LyjbJkQFMhmC+6GD98xhgS
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2616 ._cache_1527271d50042d008402767c032625c5f40aea85d2dda5cf576cc921fc76270c.exe 2844 Synaptics.exe 1052 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 2792 1527271d50042d008402767c032625c5f40aea85d2dda5cf576cc921fc76270c.exe 2792 1527271d50042d008402767c032625c5f40aea85d2dda5cf576cc921fc76270c.exe 2792 1527271d50042d008402767c032625c5f40aea85d2dda5cf576cc921fc76270c.exe 2792 1527271d50042d008402767c032625c5f40aea85d2dda5cf576cc921fc76270c.exe 2844 Synaptics.exe 2844 Synaptics.exe 2844 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 1527271d50042d008402767c032625c5f40aea85d2dda5cf576cc921fc76270c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1527271d50042d008402767c032625c5f40aea85d2dda5cf576cc921fc76270c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 864 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 864 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2616 2792 1527271d50042d008402767c032625c5f40aea85d2dda5cf576cc921fc76270c.exe 28 PID 2792 wrote to memory of 2616 2792 1527271d50042d008402767c032625c5f40aea85d2dda5cf576cc921fc76270c.exe 28 PID 2792 wrote to memory of 2616 2792 1527271d50042d008402767c032625c5f40aea85d2dda5cf576cc921fc76270c.exe 28 PID 2792 wrote to memory of 2616 2792 1527271d50042d008402767c032625c5f40aea85d2dda5cf576cc921fc76270c.exe 28 PID 2792 wrote to memory of 2844 2792 1527271d50042d008402767c032625c5f40aea85d2dda5cf576cc921fc76270c.exe 29 PID 2792 wrote to memory of 2844 2792 1527271d50042d008402767c032625c5f40aea85d2dda5cf576cc921fc76270c.exe 29 PID 2792 wrote to memory of 2844 2792 1527271d50042d008402767c032625c5f40aea85d2dda5cf576cc921fc76270c.exe 29 PID 2792 wrote to memory of 2844 2792 1527271d50042d008402767c032625c5f40aea85d2dda5cf576cc921fc76270c.exe 29 PID 2844 wrote to memory of 1052 2844 Synaptics.exe 30 PID 2844 wrote to memory of 1052 2844 Synaptics.exe 30 PID 2844 wrote to memory of 1052 2844 Synaptics.exe 30 PID 2844 wrote to memory of 1052 2844 Synaptics.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1527271d50042d008402767c032625c5f40aea85d2dda5cf576cc921fc76270c.exe"C:\Users\Admin\AppData\Local\Temp\1527271d50042d008402767c032625c5f40aea85d2dda5cf576cc921fc76270c.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\._cache_1527271d50042d008402767c032625c5f40aea85d2dda5cf576cc921fc76270c.exe"C:\Users\Admin\AppData\Local\Temp\._cache_1527271d50042d008402767c032625c5f40aea85d2dda5cf576cc921fc76270c.exe"2⤵
- Executes dropped EXE
PID:2616
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:1052
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD59d2bfadaa8820965b05fea147a08a677
SHA18d790b8c7d6d0e785cdd3af410187c8e92c7a794
SHA2561527271d50042d008402767c032625c5f40aea85d2dda5cf576cc921fc76270c
SHA512ed4562e55b47d59d617a9c87c66c63392ab916cded56d88e87f0dc2123209ef75e36586f4e486f453c083557b3b35f20cc371cd581be8d4f19a7337599dceb94
-
Filesize
20KB
MD508c85b8e78f29b8d73fe6873454d0509
SHA1d9a7d5b8668ce5c32f60a34948ed971373386459
SHA2563270631c372bc9edc50ea9f671b9e8486f4dc1e277157027df4353dd40298067
SHA512c2054689706181e6743cbef2a7417af706bb61f91c5c4e08a606b3e3e7c84176299b380096c0deb735baeead10670f66bd8caec2ca0e1053176fb0fa6faa108a
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
23KB
MD58b4b54ebfb38a0fe8abe85c4fd79a8af
SHA1a782af2b5f159feaa01c5f31d4a2fa58290f15ca
SHA256561a91babb5fb37b1defe73272c1a29b2d7f664a4a46eb1ac4c5418edfdb2929
SHA512ca76212ee95e51dfc237d6afc75a48b2f2c07d339997c0407be87ae3d2cdf77e0771cea88400218ddfcf535cd02c198f15cc49b8dfde4ac18c0a545112a11332
-
Filesize
24KB
MD5a81303c9989a0b43db8bd3bbfabe74b9
SHA1a4d082086ddf2133f79d627c3496ce96474affc3
SHA256d84d5a0371de1725ff68c615a2359d40bb4422c44a15c9eff589db0502c7d672
SHA5129e15bf28212fa05e6908368cdae8e8d2f5880ad6e0df5a130de178538632879ce47b122d9471a57a09309d20c947f6d35204a13f97b1fa8a7e8ae0211dcb0379
-
\Users\Admin\AppData\Local\Temp\._cache_1527271d50042d008402767c032625c5f40aea85d2dda5cf576cc921fc76270c.exe
Filesize696KB
MD5d80374d60c23b1946cb3ecd13056b87a
SHA126a4bed988e9007b92b0fc375f3eabe330deccb0
SHA256be924aa58640e744cb8a57ed791129141d96ad1eac068839392eda40a57a705c
SHA5123204fe3128eca24f61d5d119a4f5e7842a5e1005ed34baf54dec7d1172dd548a4bb31edfd681338acc258bbac29bf18c7e153c1b81956c20f877cc991477c7cd