Analysis
-
max time kernel
119s -
max time network
106s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 19:15
Behavioral task
behavioral1
Sample
89492c5c59664416f7f745a0d8e1a45045cacb61aa8a6b880ba179a51da05506N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
89492c5c59664416f7f745a0d8e1a45045cacb61aa8a6b880ba179a51da05506N.exe
Resource
win10v2004-20241007-en
General
-
Target
89492c5c59664416f7f745a0d8e1a45045cacb61aa8a6b880ba179a51da05506N.exe
-
Size
1.4MB
-
MD5
b08bf730de694f9eeffdd3bfdd549b70
-
SHA1
86d0c19f67761dd7b7c5e23c9fbd49327dcbfcaf
-
SHA256
89492c5c59664416f7f745a0d8e1a45045cacb61aa8a6b880ba179a51da05506
-
SHA512
71482d18c5d81bec89b658f150b689902321c72657a6f5412cafa0f7a3085ade7680e29fc2f8c6df3fec6791f9cfa75d524c866dd4097e15e92c8f5b1710930c
-
SSDEEP
12288:YMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V95MSlSnBxhgoSQj:YnsJ39LyjbJkQFMhmC+6GD98xhgS
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 536 ._cache_89492c5c59664416f7f745a0d8e1a45045cacb61aa8a6b880ba179a51da05506N.exe 3032 Synaptics.exe 2552 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 2208 89492c5c59664416f7f745a0d8e1a45045cacb61aa8a6b880ba179a51da05506N.exe 2208 89492c5c59664416f7f745a0d8e1a45045cacb61aa8a6b880ba179a51da05506N.exe 2208 89492c5c59664416f7f745a0d8e1a45045cacb61aa8a6b880ba179a51da05506N.exe 2208 89492c5c59664416f7f745a0d8e1a45045cacb61aa8a6b880ba179a51da05506N.exe 3032 Synaptics.exe 3032 Synaptics.exe 3032 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 89492c5c59664416f7f745a0d8e1a45045cacb61aa8a6b880ba179a51da05506N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89492c5c59664416f7f745a0d8e1a45045cacb61aa8a6b880ba179a51da05506N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2556 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2556 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2208 wrote to memory of 536 2208 89492c5c59664416f7f745a0d8e1a45045cacb61aa8a6b880ba179a51da05506N.exe 30 PID 2208 wrote to memory of 536 2208 89492c5c59664416f7f745a0d8e1a45045cacb61aa8a6b880ba179a51da05506N.exe 30 PID 2208 wrote to memory of 536 2208 89492c5c59664416f7f745a0d8e1a45045cacb61aa8a6b880ba179a51da05506N.exe 30 PID 2208 wrote to memory of 536 2208 89492c5c59664416f7f745a0d8e1a45045cacb61aa8a6b880ba179a51da05506N.exe 30 PID 2208 wrote to memory of 3032 2208 89492c5c59664416f7f745a0d8e1a45045cacb61aa8a6b880ba179a51da05506N.exe 32 PID 2208 wrote to memory of 3032 2208 89492c5c59664416f7f745a0d8e1a45045cacb61aa8a6b880ba179a51da05506N.exe 32 PID 2208 wrote to memory of 3032 2208 89492c5c59664416f7f745a0d8e1a45045cacb61aa8a6b880ba179a51da05506N.exe 32 PID 2208 wrote to memory of 3032 2208 89492c5c59664416f7f745a0d8e1a45045cacb61aa8a6b880ba179a51da05506N.exe 32 PID 3032 wrote to memory of 2552 3032 Synaptics.exe 33 PID 3032 wrote to memory of 2552 3032 Synaptics.exe 33 PID 3032 wrote to memory of 2552 3032 Synaptics.exe 33 PID 3032 wrote to memory of 2552 3032 Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\89492c5c59664416f7f745a0d8e1a45045cacb61aa8a6b880ba179a51da05506N.exe"C:\Users\Admin\AppData\Local\Temp\89492c5c59664416f7f745a0d8e1a45045cacb61aa8a6b880ba179a51da05506N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\._cache_89492c5c59664416f7f745a0d8e1a45045cacb61aa8a6b880ba179a51da05506N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_89492c5c59664416f7f745a0d8e1a45045cacb61aa8a6b880ba179a51da05506N.exe"2⤵
- Executes dropped EXE
PID:536
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2552
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5b08bf730de694f9eeffdd3bfdd549b70
SHA186d0c19f67761dd7b7c5e23c9fbd49327dcbfcaf
SHA25689492c5c59664416f7f745a0d8e1a45045cacb61aa8a6b880ba179a51da05506
SHA51271482d18c5d81bec89b658f150b689902321c72657a6f5412cafa0f7a3085ade7680e29fc2f8c6df3fec6791f9cfa75d524c866dd4097e15e92c8f5b1710930c
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
24KB
MD59f25a784cc73fd17cf94b5d3bf3f60b9
SHA1bf89c063bc3caef7da72504180bd486ecfd214b7
SHA2560351ae37b1f02901b83fc7dc0ddc14c85863ce351203ddbb44530bb515c96375
SHA51241d850a8fd29b5dff7ca52f9350708a51366f4f26059aa0b206ae9b962958e5e9264f3de2f79dee5d3991b424d8cb153973abbe3b6fcd15c29e066ea492de8ee
-
\Users\Admin\AppData\Local\Temp\._cache_89492c5c59664416f7f745a0d8e1a45045cacb61aa8a6b880ba179a51da05506N.exe
Filesize696KB
MD5d80374d60c23b1946cb3ecd13056b87a
SHA126a4bed988e9007b92b0fc375f3eabe330deccb0
SHA256be924aa58640e744cb8a57ed791129141d96ad1eac068839392eda40a57a705c
SHA5123204fe3128eca24f61d5d119a4f5e7842a5e1005ed34baf54dec7d1172dd548a4bb31edfd681338acc258bbac29bf18c7e153c1b81956c20f877cc991477c7cd