Analysis
-
max time kernel
112s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 20:22
Behavioral task
behavioral1
Sample
1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe
Resource
win10v2004-20241007-en
General
-
Target
1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe
-
Size
759KB
-
MD5
1af661345f8e3b066b61d0aad39cb190
-
SHA1
1ddc5585f84cbb317eb97dcaa9d5a89ab6221911
-
SHA256
1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993
-
SHA512
289f5fa06487a5e3add3b64b62cd9f00290836293b68d2d22d7f5e5021692c7a4f600d23facc1d1e9166dc48e663049869f86d0673481fb56734e7cd5af6d719
-
SSDEEP
12288:SMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9YQj:SnsJ39LyjbJkQFMhmC+6GD9X
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 4936 ._cache_1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe 2080 Synaptics.exe 2496 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe -
Checks processor information in registry 2 TTPs 9 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe -
Enumerates system info in registry 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 648 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeRestorePrivilege 1848 dw20.exe Token: SeBackupPrivilege 1848 dw20.exe Token: SeBackupPrivilege 1848 dw20.exe Token: SeBackupPrivilege 1848 dw20.exe Token: SeBackupPrivilege 4196 dw20.exe Token: SeBackupPrivilege 4196 dw20.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 648 EXCEL.EXE 648 EXCEL.EXE 648 EXCEL.EXE 648 EXCEL.EXE 648 EXCEL.EXE 648 EXCEL.EXE 648 EXCEL.EXE 648 EXCEL.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4812 wrote to memory of 4936 4812 1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe 83 PID 4812 wrote to memory of 4936 4812 1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe 83 PID 4812 wrote to memory of 4936 4812 1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe 83 PID 4812 wrote to memory of 2080 4812 1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe 85 PID 4812 wrote to memory of 2080 4812 1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe 85 PID 4812 wrote to memory of 2080 4812 1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe 85 PID 4936 wrote to memory of 1848 4936 ._cache_1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe 86 PID 4936 wrote to memory of 1848 4936 ._cache_1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe 86 PID 4936 wrote to memory of 1848 4936 ._cache_1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe 86 PID 2080 wrote to memory of 2496 2080 Synaptics.exe 87 PID 2080 wrote to memory of 2496 2080 Synaptics.exe 87 PID 2080 wrote to memory of 2496 2080 Synaptics.exe 87 PID 2496 wrote to memory of 4196 2496 ._cache_Synaptics.exe 90 PID 2496 wrote to memory of 4196 2496 ._cache_Synaptics.exe 90 PID 2496 wrote to memory of 4196 2496 ._cache_Synaptics.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe"C:\Users\Admin\AppData\Local\Temp\1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\._cache_1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 8843⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1848
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 8604⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4196
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
759KB
MD51af661345f8e3b066b61d0aad39cb190
SHA11ddc5585f84cbb317eb97dcaa9d5a89ab6221911
SHA2561599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993
SHA512289f5fa06487a5e3add3b64b62cd9f00290836293b68d2d22d7f5e5021692c7a4f600d23facc1d1e9166dc48e663049869f86d0673481fb56734e7cd5af6d719
-
C:\Users\Admin\AppData\Local\Temp\._cache_1599fb0babbe3e8a7d44c1980402049e0d0a5c28d3d83587a61f7474553fe993N.exe
Filesize5KB
MD57cf8491bc5ac58184cd684d1a088340a
SHA1ba61e1cad1c0187933213843001f75e2bb0259a9
SHA2567d261f5c5051519a5c0cf53e21e095e7e6984b16fa8929f0edbe8213f8441f8f
SHA512c42c355560ab5343f53ca46c50e3ae1803301920a5ce6d3ce991c457c8753595cb21bdfa1be205191eb4fef290bed15feaf0c3d16f0c040abed05f41d9a97d1b
-
Filesize
22KB
MD5def45c72249b4e1b73ffb1abb5b56c4c
SHA16a519b29d3a1131377c6ce5c247d30ac59341ee6
SHA2569b2f306c1cb79e064d2709877ac741bb37c7f2b13d4b900b954121121615d69c
SHA512d4fc4d91ce8445602416c250bd9d7bb09e36d51715db239b03464380ace93bb54b893f2afb2450ec4f29bf6169f3f2bd8f16565ae5caf773d410788468d05fb9
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04