Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17-01-2025 01:29
Behavioral task
behavioral1
Sample
6022aa20e7b73b4d50c6ae8af3c0636cb3dbc25fbf887fb409b230762a5d193d.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
6022aa20e7b73b4d50c6ae8af3c0636cb3dbc25fbf887fb409b230762a5d193d.exe
Resource
win10v2004-20241007-en
General
-
Target
6022aa20e7b73b4d50c6ae8af3c0636cb3dbc25fbf887fb409b230762a5d193d.exe
-
Size
3.1MB
-
MD5
0b8a713e3a0f37a49aeb3092f658834b
-
SHA1
033e9440012bc7ad5e25b6f9ceb235956af73fc0
-
SHA256
6022aa20e7b73b4d50c6ae8af3c0636cb3dbc25fbf887fb409b230762a5d193d
-
SHA512
d7069bb707a8adc6c73f1dbc9da3b649129bfe3a4fa8e88ba4d9880d74dd40ae73aba2ec3860066f080db3be5ebdf432274c19e498ccfecc38f1a38baf7818df
-
SSDEEP
98304:lnsmtk2acn+j1wHzyb38mORkdtdCzdSsmHRTo:5LjK1wH+bM3ICQrHC
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 1916 ._cache_6022aa20e7b73b4d50c6ae8af3c0636cb3dbc25fbf887fb409b230762a5d193d.exe 2728 Synaptics.exe 2836 ._cache_Synaptics.exe -
Loads dropped DLL 9 IoCs
pid Process 2084 6022aa20e7b73b4d50c6ae8af3c0636cb3dbc25fbf887fb409b230762a5d193d.exe 1916 ._cache_6022aa20e7b73b4d50c6ae8af3c0636cb3dbc25fbf887fb409b230762a5d193d.exe 2084 6022aa20e7b73b4d50c6ae8af3c0636cb3dbc25fbf887fb409b230762a5d193d.exe 2084 6022aa20e7b73b4d50c6ae8af3c0636cb3dbc25fbf887fb409b230762a5d193d.exe 2728 Synaptics.exe 2728 Synaptics.exe 2836 ._cache_Synaptics.exe 1916 ._cache_6022aa20e7b73b4d50c6ae8af3c0636cb3dbc25fbf887fb409b230762a5d193d.exe 2836 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 6022aa20e7b73b4d50c6ae8af3c0636cb3dbc25fbf887fb409b230762a5d193d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6022aa20e7b73b4d50c6ae8af3c0636cb3dbc25fbf887fb409b230762a5d193d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_6022aa20e7b73b4d50c6ae8af3c0636cb3dbc25fbf887fb409b230762a5d193d.exe -
NSIS installer 3 IoCs
resource yara_rule behavioral1/files/0x0006000000018766-13.dat nsis_installer_2 behavioral1/files/0x000c00000001226d-7.dat nsis_installer_1 behavioral1/files/0x000c00000001226d-7.dat nsis_installer_2 -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2800 EXCEL.EXE -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2836 ._cache_Synaptics.exe 1916 ._cache_6022aa20e7b73b4d50c6ae8af3c0636cb3dbc25fbf887fb409b230762a5d193d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2800 EXCEL.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2084 wrote to memory of 1916 2084 6022aa20e7b73b4d50c6ae8af3c0636cb3dbc25fbf887fb409b230762a5d193d.exe 30 PID 2084 wrote to memory of 1916 2084 6022aa20e7b73b4d50c6ae8af3c0636cb3dbc25fbf887fb409b230762a5d193d.exe 30 PID 2084 wrote to memory of 1916 2084 6022aa20e7b73b4d50c6ae8af3c0636cb3dbc25fbf887fb409b230762a5d193d.exe 30 PID 2084 wrote to memory of 1916 2084 6022aa20e7b73b4d50c6ae8af3c0636cb3dbc25fbf887fb409b230762a5d193d.exe 30 PID 2084 wrote to memory of 1916 2084 6022aa20e7b73b4d50c6ae8af3c0636cb3dbc25fbf887fb409b230762a5d193d.exe 30 PID 2084 wrote to memory of 1916 2084 6022aa20e7b73b4d50c6ae8af3c0636cb3dbc25fbf887fb409b230762a5d193d.exe 30 PID 2084 wrote to memory of 1916 2084 6022aa20e7b73b4d50c6ae8af3c0636cb3dbc25fbf887fb409b230762a5d193d.exe 30 PID 2084 wrote to memory of 2728 2084 6022aa20e7b73b4d50c6ae8af3c0636cb3dbc25fbf887fb409b230762a5d193d.exe 31 PID 2084 wrote to memory of 2728 2084 6022aa20e7b73b4d50c6ae8af3c0636cb3dbc25fbf887fb409b230762a5d193d.exe 31 PID 2084 wrote to memory of 2728 2084 6022aa20e7b73b4d50c6ae8af3c0636cb3dbc25fbf887fb409b230762a5d193d.exe 31 PID 2084 wrote to memory of 2728 2084 6022aa20e7b73b4d50c6ae8af3c0636cb3dbc25fbf887fb409b230762a5d193d.exe 31 PID 2728 wrote to memory of 2836 2728 Synaptics.exe 32 PID 2728 wrote to memory of 2836 2728 Synaptics.exe 32 PID 2728 wrote to memory of 2836 2728 Synaptics.exe 32 PID 2728 wrote to memory of 2836 2728 Synaptics.exe 32 PID 2728 wrote to memory of 2836 2728 Synaptics.exe 32 PID 2728 wrote to memory of 2836 2728 Synaptics.exe 32 PID 2728 wrote to memory of 2836 2728 Synaptics.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\6022aa20e7b73b4d50c6ae8af3c0636cb3dbc25fbf887fb409b230762a5d193d.exe"C:\Users\Admin\AppData\Local\Temp\6022aa20e7b73b4d50c6ae8af3c0636cb3dbc25fbf887fb409b230762a5d193d.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\._cache_6022aa20e7b73b4d50c6ae8af3c0636cb3dbc25fbf887fb409b230762a5d193d.exe"C:\Users\Admin\AppData\Local\Temp\._cache_6022aa20e7b73b4d50c6ae8af3c0636cb3dbc25fbf887fb409b230762a5d193d.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:1916
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2836
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD50b8a713e3a0f37a49aeb3092f658834b
SHA1033e9440012bc7ad5e25b6f9ceb235956af73fc0
SHA2566022aa20e7b73b4d50c6ae8af3c0636cb3dbc25fbf887fb409b230762a5d193d
SHA512d7069bb707a8adc6c73f1dbc9da3b649129bfe3a4fa8e88ba4d9880d74dd40ae73aba2ec3860066f080db3be5ebdf432274c19e498ccfecc38f1a38baf7818df
-
C:\Users\Admin\AppData\Local\Temp\._cache_6022aa20e7b73b4d50c6ae8af3c0636cb3dbc25fbf887fb409b230762a5d193d.exe
Filesize2.4MB
MD5d1be561690e1d91e515faf9581cf81a6
SHA19fed9a02c3845ca78bd72319bbfcf5140e64a36a
SHA2567213f30970c9764e1e0f85f15125f9241cf2619fb4724d322b5fe6f8ee3d9da0
SHA512919e7bd14b65bf4fc778ce3409a92fdb5a59516cdb43d5dd3626ff2d18be9389951a289afe7453aeb6f8b9e314007c007a6f3bb7137f4fd167ce5688cebf28f5
-
Filesize
386KB
MD51ac1185d0e10ef4d48f5ee334b4c6a6d
SHA1611dd2b48b544522c93320ed1dc8f74bdce63b29
SHA2560bf79b0b07c1da6b6183da39378b32953d7e5c3ba42449a03ec742b597c5c181
SHA512b8d312f5b289e7a28a1d45f6c074b0935e15bbbe7df047b287e46e2395b53a333a86e02ff27aecfd7812cbf9acce0c8616287fca0b5f49832505206790fd200b
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
7KB
MD5a4173b381625f9f12aadb4e1cdaefdb8
SHA1cf1680c2bc970d5675adbf5e89292a97e6724713
SHA2567755ff2707ca19344d489a5acec02d9e310425fa6e100d2f13025761676b875b
SHA512fcac79d42862da6bdd3ecad9d887a975cdff2301a8322f321be58f754a26b27077b452faa4751bbd09cd3371b4afce65255fbbb443e2c93dd2cba0ba652f4a82
-
Filesize
6KB
MD513cc92f90a299f5b2b2f795d0d2e47dc
SHA1aa69ead8520876d232c6ed96021a4825e79f542f
SHA256eb1ca2b3a6e564c32677d0cdc388e26b74ef686e071d7dbca44d0bfa10488feb
SHA512ff4e6e6e7104568fc85ef3a3f0494a5c7822a4ceaf65c584ad534f08f9a472a8d86f0a62f1f86343c61e2540b2254714b7ea43e4b312ff13d8271ff069386fa3