Analysis
-
max time kernel
119s -
max time network
100s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 21:20
Behavioral task
behavioral1
Sample
c0285ef4894e7e30574368be7dab3e02041c522408817880508d49c49485d0b9N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
c0285ef4894e7e30574368be7dab3e02041c522408817880508d49c49485d0b9N.exe
Resource
win10v2004-20241007-en
General
-
Target
c0285ef4894e7e30574368be7dab3e02041c522408817880508d49c49485d0b9N.exe
-
Size
760KB
-
MD5
163ea8da0bfeece2fb082c994e5af190
-
SHA1
f2b4613ef22c8c629e277c8d110d9989179da90a
-
SHA256
c0285ef4894e7e30574368be7dab3e02041c522408817880508d49c49485d0b9
-
SHA512
d27770b9e75bc8df1e3e0c901e6cece54fe2e35026ae1fa4d9c2aa27a65813e2bdfa09e0412c15616f93ecb5bcf910f61856aed8e0017462f1c7199f2b19a04b
-
SSDEEP
12288:qMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9kwj:qnsJ39LyjbJkQFMhmC+6GD9X
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2900 ._cache_c0285ef4894e7e30574368be7dab3e02041c522408817880508d49c49485d0b9N.exe 2868 Synaptics.exe 2692 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 1604 c0285ef4894e7e30574368be7dab3e02041c522408817880508d49c49485d0b9N.exe 1604 c0285ef4894e7e30574368be7dab3e02041c522408817880508d49c49485d0b9N.exe 1604 c0285ef4894e7e30574368be7dab3e02041c522408817880508d49c49485d0b9N.exe 2868 Synaptics.exe 2868 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" c0285ef4894e7e30574368be7dab3e02041c522408817880508d49c49485d0b9N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c0285ef4894e7e30574368be7dab3e02041c522408817880508d49c49485d0b9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2380 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2380 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1604 wrote to memory of 2900 1604 c0285ef4894e7e30574368be7dab3e02041c522408817880508d49c49485d0b9N.exe 30 PID 1604 wrote to memory of 2900 1604 c0285ef4894e7e30574368be7dab3e02041c522408817880508d49c49485d0b9N.exe 30 PID 1604 wrote to memory of 2900 1604 c0285ef4894e7e30574368be7dab3e02041c522408817880508d49c49485d0b9N.exe 30 PID 1604 wrote to memory of 2900 1604 c0285ef4894e7e30574368be7dab3e02041c522408817880508d49c49485d0b9N.exe 30 PID 1604 wrote to memory of 2868 1604 c0285ef4894e7e30574368be7dab3e02041c522408817880508d49c49485d0b9N.exe 32 PID 1604 wrote to memory of 2868 1604 c0285ef4894e7e30574368be7dab3e02041c522408817880508d49c49485d0b9N.exe 32 PID 1604 wrote to memory of 2868 1604 c0285ef4894e7e30574368be7dab3e02041c522408817880508d49c49485d0b9N.exe 32 PID 1604 wrote to memory of 2868 1604 c0285ef4894e7e30574368be7dab3e02041c522408817880508d49c49485d0b9N.exe 32 PID 2868 wrote to memory of 2692 2868 Synaptics.exe 33 PID 2868 wrote to memory of 2692 2868 Synaptics.exe 33 PID 2868 wrote to memory of 2692 2868 Synaptics.exe 33 PID 2868 wrote to memory of 2692 2868 Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0285ef4894e7e30574368be7dab3e02041c522408817880508d49c49485d0b9N.exe"C:\Users\Admin\AppData\Local\Temp\c0285ef4894e7e30574368be7dab3e02041c522408817880508d49c49485d0b9N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\._cache_c0285ef4894e7e30574368be7dab3e02041c522408817880508d49c49485d0b9N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_c0285ef4894e7e30574368be7dab3e02041c522408817880508d49c49485d0b9N.exe"2⤵
- Executes dropped EXE
PID:2900
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2692
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
760KB
MD5163ea8da0bfeece2fb082c994e5af190
SHA1f2b4613ef22c8c629e277c8d110d9989179da90a
SHA256c0285ef4894e7e30574368be7dab3e02041c522408817880508d49c49485d0b9
SHA512d27770b9e75bc8df1e3e0c901e6cece54fe2e35026ae1fa4d9c2aa27a65813e2bdfa09e0412c15616f93ecb5bcf910f61856aed8e0017462f1c7199f2b19a04b
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
20KB
MD50c3f5022f4dece612b17d04756e7ade5
SHA12daa835257c0454bcc168541d33680dff58f2544
SHA2560753ebce1a4f822c494501e1fec768548d15396fad30d94810bc5fcea382d482
SHA5128f7071bace72e6096db14f55617e201360b819bc6d4e92831f2ee226ea29fca3cbdc89458d7269b43679faf9a539cfc9377063b852e9f555020969fc72113041
-
Filesize
22KB
MD52d53ff90b3a7817310a03dad25ca58d9
SHA14602711376fe33427b0a66320c1455f6f8811c91
SHA256465852abb2a78663ce681dacd3becfc7d3167a3a99fc7d7416b7ba04aea4767f
SHA5127c42eb4561fb914c7601dd194c757b7c156736e31c867860df5f954e2d5b30c50a25964cf2358c2cc05ab751d5e5fba7fbb5961dffab9c8664848694d2a5e8e5
-
\Users\Admin\AppData\Local\Temp\._cache_c0285ef4894e7e30574368be7dab3e02041c522408817880508d49c49485d0b9N.exe
Filesize6KB
MD51c1ed9cb960d3f83894c6fe7338454a1
SHA1d992fa7e3f2f6c0047af7d6547686b0eb615d500
SHA256d1dabe9689eb3eb171cba233c700186016b0cd179db1b08f07338dbcd050d60c
SHA512bca8b7dd25cb66a8a84fc7d71ed53c63f97998924d20b9818267fed70d7b882155fd340fe1e4c25441d13aee7bcf95f5deb47391ec4c0203dd5feee3ad82913c