Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 16:55
Behavioral task
behavioral1
Sample
159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exe
Resource
win7-20240903-en
General
-
Target
159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exe
-
Size
2.2MB
-
MD5
e2499d45781442f28937ca2eb24ff56c
-
SHA1
e22d6ac937ab8e99447ffc00a57d76c03e97df86
-
SHA256
159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73
-
SHA512
2efe9f3540312224b3b06ff4f3ce1f8ea2ffcf92e0147b81f3c88611ebc395805ad2da08cb768d95a4a86207c969b6d57dc8ebaf4a7e484601fcd60e65b09ad9
-
SSDEEP
49152:zEywVVvUji3TA3nsHyjtk2MYC5GDGisyn7dS:Q1VVv2883nsmtk2aQ7c
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023b74-5.dat family_gh0strat -
Gh0strat family
-
Xred family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\svchist\Parameters\ServiceDll = "C:\\Windows\\system32\\240612093.bat" GLk.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exe -
Executes dropped EXE 6 IoCs
pid Process 1984 GLk.exe 4756 HD_159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exe 3988 ._cache_HD_159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exe 4468 Synaptics.exe 1864 ._cache_Synaptics.exe 4284 svchist.exe -
Loads dropped DLL 5 IoCs
pid Process 1984 GLk.exe 4536 svchost.exe 4468 Synaptics.exe 4468 Synaptics.exe 4284 svchist.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" HD_159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\240612093.bat GLk.exe File opened for modification C:\Windows\SysWOW64\ini.ini GLk.exe File created C:\Windows\SysWOW64\svchist.exe svchost.exe File opened for modification C:\Windows\SysWOW64\svchist.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GLk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_HD_159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3296 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2160 159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exe 2160 159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2160 159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exe 2160 159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exe 3296 EXCEL.EXE 3296 EXCEL.EXE 3296 EXCEL.EXE 3296 EXCEL.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2160 wrote to memory of 1984 2160 159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exe 83 PID 2160 wrote to memory of 1984 2160 159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exe 83 PID 2160 wrote to memory of 1984 2160 159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exe 83 PID 2160 wrote to memory of 4756 2160 159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exe 86 PID 2160 wrote to memory of 4756 2160 159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exe 86 PID 2160 wrote to memory of 4756 2160 159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exe 86 PID 4756 wrote to memory of 3988 4756 HD_159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exe 87 PID 4756 wrote to memory of 3988 4756 HD_159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exe 87 PID 4756 wrote to memory of 3988 4756 HD_159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exe 87 PID 4756 wrote to memory of 4468 4756 HD_159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exe 89 PID 4756 wrote to memory of 4468 4756 HD_159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exe 89 PID 4756 wrote to memory of 4468 4756 HD_159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exe 89 PID 4468 wrote to memory of 1864 4468 Synaptics.exe 91 PID 4468 wrote to memory of 1864 4468 Synaptics.exe 91 PID 4468 wrote to memory of 1864 4468 Synaptics.exe 91 PID 4536 wrote to memory of 4284 4536 svchost.exe 98 PID 4536 wrote to memory of 4284 4536 svchost.exe 98 PID 4536 wrote to memory of 4284 4536 svchost.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exe"C:\Users\Admin\AppData\Local\Temp\159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\GLk.exeC:\Users\Admin\AppData\Local\Temp\\GLk.exe2⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1984
-
-
C:\Users\Admin\AppData\Local\Temp\HD_159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exeC:\Users\Admin\AppData\Local\Temp\\HD_159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\._cache_HD_159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exe"C:\Users\Admin\AppData\Local\Temp\._cache_HD_159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3988
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1864
-
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchist"1⤵PID:1076
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchist"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\svchist.exeC:\Windows\system32\svchist.exe "c:\windows\system32\240612093.bat",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4284
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3296
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\._cache_HD_159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exe
Filesize299KB
MD5430a5a0034d36d98ee100d97f58dd88d
SHA12a43f8663a21c8055b36521c49436bce535e9e9c
SHA256831ef3bd56fc1bab96d6310466fb4f3563cf008512572e7fc0027c70dafe51d7
SHA512d3b3101864ed9c1e01fcfabf47a08f64ee901227b107d2860a4bc96f44670870cf1a887bc7f4dfb9c0f0535a32a4fbc1aa1e4f183f1d5483f274a654cae1727a
-
Filesize
337KB
MD5b8e58a96761799f4ad0548dba39d650c
SHA1c00032d40cfbe4ccfd3ce3e4c8defb2a2ef9fc1f
SHA256334e8e7c65b087985766d652f70b710bdba6aea55a2fa17b97ba2961e8eee9df
SHA5121cd94994ed3f6594e37e6cd1d266ff96bb37c5e99d9ce6fd4637ed615ee8c6496b54a025fdccced6fca200f8f2da8011177c67c943676b30bfb0655393765fe3
-
C:\Users\Admin\AppData\Local\Temp\HD_159a23a4989271751002f8fcda260ff43cbbf8623d5cb27491091d5053561d73.exe
Filesize1.0MB
MD5075dd995c2750cdcf87eeb180a81ccb7
SHA1cae188c9e967765dbb7669ae094df2e6b7c2315b
SHA256ea3b6456775bd3e399f13257cf95d9b58c86e9929a8a8ad9e2212921834fa525
SHA512057f47499a8790da1eb8c944514b3d82d13c0f15a09f440c82fbcde433bf07f9212a730aa3176748ea8daddab0eb3b4d5eaf52d28a0adce1b01c86c76703275f
-
Filesize
1.2MB
MD5b4c74f141281b76cd65ab27730518aa0
SHA1341cad358dbbe7fefc60f8ee75589560ab31a825
SHA256b6006180bc5a72147e55d25139e7728cb43f92330d578116d765eaa900abfae6
SHA512200b362e1130702bb3e9eea26fea004af0c12c94eac9e1da5ee850c215deecc903c302c086c77302fd9a8b861ca65feb800793094b69676c462092c0584a6559
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
1.0MB
MD517095badc94be141bc91a0379fc68e16
SHA1ba81e6303cd28c912a84f7bc435388ee240a9408
SHA256c38cf02c36cb907d3153954e2561b4a0ddffb6f1e60be962d5602dc55511bf44
SHA512f57fc594cefd3eebde8c7f990294ba2581a7a713c9502fae912def65a2f6addb6b758cccfe10257a1778fb40cdde835544a7dd04332c4ed501b56ab733454244
-
Filesize
51KB
MD5de9ea3913b4f3fa936ffcf3138be90ed
SHA155ee9a42429518cc3feae63cb2821dd80a81af23
SHA256e8ede7d43baee88784df43ea51f1f824503ef12b22dec3df19e2bc1c44c8c7cc
SHA5127633ef3d1c4212296c633b94bc5cb10b11d651993ee9bb49295ad0840aa666f76ecc22a225d814571f581b8e4c95f78885688f74c48049ee4ad5acdeeed5649c
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641