Analysis
-
max time kernel
119s -
max time network
109s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 20:22
Behavioral task
behavioral1
Sample
1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe
Resource
win10v2004-20241007-en
General
-
Target
1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe
-
Size
759KB
-
MD5
1af661345f8e3b066b61d0aad39cb190
-
SHA1
1ddc5585f84cbb317eb97dcaa9d5a89ab6221911
-
SHA256
1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993
-
SHA512
289f5fa06487a5e3add3b64b62cd9f00290836293b68d2d22d7f5e5021692c7a4f600d23facc1d1e9166dc48e663049869f86d0673481fb56734e7cd5af6d719
-
SSDEEP
12288:SMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9YQj:SnsJ39LyjbJkQFMhmC+6GD9X
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
resource behavioral1/files/0x0009000000017047-97.dat -
Executes dropped EXE 3 IoCs
pid Process 2696 ._cache_1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe 1948 Synaptics.exe 448 ._cache_Synaptics.exe -
Loads dropped DLL 11 IoCs
pid Process 2824 1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe 2824 1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe 2824 1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe 2700 dw20.exe 2700 dw20.exe 2700 dw20.exe 1948 Synaptics.exe 1948 Synaptics.exe 560 dw20.exe 560 dw20.exe 560 dw20.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2936 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2936 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2696 2824 1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe 30 PID 2824 wrote to memory of 2696 2824 1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe 30 PID 2824 wrote to memory of 2696 2824 1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe 30 PID 2824 wrote to memory of 2696 2824 1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe 30 PID 2824 wrote to memory of 1948 2824 1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe 32 PID 2824 wrote to memory of 1948 2824 1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe 32 PID 2824 wrote to memory of 1948 2824 1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe 32 PID 2824 wrote to memory of 1948 2824 1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe 32 PID 2696 wrote to memory of 2700 2696 ._cache_1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe 33 PID 2696 wrote to memory of 2700 2696 ._cache_1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe 33 PID 2696 wrote to memory of 2700 2696 ._cache_1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe 33 PID 2696 wrote to memory of 2700 2696 ._cache_1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe 33 PID 1948 wrote to memory of 448 1948 Synaptics.exe 34 PID 1948 wrote to memory of 448 1948 Synaptics.exe 34 PID 1948 wrote to memory of 448 1948 Synaptics.exe 34 PID 1948 wrote to memory of 448 1948 Synaptics.exe 34 PID 448 wrote to memory of 560 448 ._cache_Synaptics.exe 36 PID 448 wrote to memory of 560 448 ._cache_Synaptics.exe 36 PID 448 wrote to memory of 560 448 ._cache_Synaptics.exe 36 PID 448 wrote to memory of 560 448 ._cache_Synaptics.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe"C:\Users\Admin\AppData\Local\Temp\1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\._cache_1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 4003⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2700
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 3964⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:560
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
759KB
MD51af661345f8e3b066b61d0aad39cb190
SHA11ddc5585f84cbb317eb97dcaa9d5a89ab6221911
SHA2561599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993
SHA512289f5fa06487a5e3add3b64b62cd9f00290836293b68d2d22d7f5e5021692c7a4f600d23facc1d1e9166dc48e663049869f86d0673481fb56734e7cd5af6d719
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
20KB
MD524a97ba2a996f2aa365b33de6a0b35e2
SHA1ef45f3244b01244cfe1dc144e55b960b1237700a
SHA25692f334dbbf51a12f5ccb8f5c3d0ad662367b81426b5651e98b0059324cd7659f
SHA512a6c47c109141583dbad634851cabeef4c03f502ff51d9efef4fb33f76768cd5ec4945afe43c92c83b9b39e550b2521b4e6dbc2544c0ae23d91433dfc858996d5
-
Filesize
22KB
MD55875185076bd3d1769099f9f95b21d47
SHA1d8d2036aab2d72e9b8f721587bd1274cd7302cd5
SHA2569a0ce4556c99b8f4d990c8e2cd70b0e1f2bd3b1b2aae9fc827a6b2fe02fc3102
SHA51272d9d6718de07be4bb83410ccad24c6d70941bfc0a6949c5ad985346adf17e3d4905ee297e0b5ac1de52ca5f4ec7400c5d337dd495e3a72504f164a8002ffd9e
-
\Users\Admin\AppData\Local\Temp\._cache_1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe
Filesize5KB
MD57cf8491bc5ac58184cd684d1a088340a
SHA1ba61e1cad1c0187933213843001f75e2bb0259a9
SHA2567d261f5c5051519a5c0cf53e21e095e7e6984b16fa8929f0edbe8213f8441f8f
SHA512c42c355560ab5343f53ca46c50e3ae1803301920a5ce6d3ce991c457c8753595cb21bdfa1be205191eb4fef290bed15feaf0c3d16f0c040abed05f41d9a97d1b