Analysis
-
max time kernel
112s -
max time network
113s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-01-2025 04:07
Behavioral task
behavioral1
Sample
b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe
Resource
win10v2004-20241007-en
General
-
Target
b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe
-
Size
759KB
-
MD5
a72c9d1c461e2a339901007de52a99f0
-
SHA1
9e24d477162dd7249b0b3fd52aad09f7e30e1ef3
-
SHA256
b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb
-
SHA512
3388cbfeab2aae4f7e86dde9389594088e95745246e65079dc490717690e3e51ee45db6d4e884b5a1e3efa370d0ffd9883447e031cbceff081d9c7115f66e19e
-
SSDEEP
12288:SMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9YbB:SnsJ39LyjbJkQFMhmC+6GD90
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2604 ._cache_b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe 2804 Synaptics.exe 2564 ._cache_Synaptics.exe -
Loads dropped DLL 11 IoCs
pid Process 2692 b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe 2916 dw20.exe 2916 dw20.exe 2692 b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe 2692 b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe 2916 dw20.exe 2804 Synaptics.exe 2804 Synaptics.exe 2180 dw20.exe 2180 dw20.exe 2180 dw20.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2728 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2728 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2604 2692 b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe 28 PID 2692 wrote to memory of 2604 2692 b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe 28 PID 2692 wrote to memory of 2604 2692 b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe 28 PID 2692 wrote to memory of 2604 2692 b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe 28 PID 2604 wrote to memory of 2916 2604 ._cache_b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe 30 PID 2604 wrote to memory of 2916 2604 ._cache_b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe 30 PID 2604 wrote to memory of 2916 2604 ._cache_b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe 30 PID 2604 wrote to memory of 2916 2604 ._cache_b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe 30 PID 2692 wrote to memory of 2804 2692 b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe 31 PID 2692 wrote to memory of 2804 2692 b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe 31 PID 2692 wrote to memory of 2804 2692 b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe 31 PID 2692 wrote to memory of 2804 2692 b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe 31 PID 2804 wrote to memory of 2564 2804 Synaptics.exe 32 PID 2804 wrote to memory of 2564 2804 Synaptics.exe 32 PID 2804 wrote to memory of 2564 2804 Synaptics.exe 32 PID 2804 wrote to memory of 2564 2804 Synaptics.exe 32 PID 2564 wrote to memory of 2180 2564 ._cache_Synaptics.exe 34 PID 2564 wrote to memory of 2180 2564 ._cache_Synaptics.exe 34 PID 2564 wrote to memory of 2180 2564 ._cache_Synaptics.exe 34 PID 2564 wrote to memory of 2180 2564 ._cache_Synaptics.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe"C:\Users\Admin\AppData\Local\Temp\b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\._cache_b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe"C:\Users\Admin\AppData\Local\Temp\._cache_b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 3963⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2916
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 3964⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2180
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
759KB
MD5a72c9d1c461e2a339901007de52a99f0
SHA19e24d477162dd7249b0b3fd52aad09f7e30e1ef3
SHA256b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb
SHA5123388cbfeab2aae4f7e86dde9389594088e95745246e65079dc490717690e3e51ee45db6d4e884b5a1e3efa370d0ffd9883447e031cbceff081d9c7115f66e19e
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
20KB
MD5550db888cd274ca9de69d38238fe6aff
SHA1c38f830fb925f3558f0e0371becf2d796d7e4449
SHA256823031ca43eee43f5ced5487f56d935245f3acb5c5cfa8486cc008f625932494
SHA5123aaa11c285a2e2acb4cc9536a5a96c2edc4c33ecdf74a84b920e9228076b1bf2902046e9e596caf782a90d9cdffcd467e75948959e89405841ae93fc179c6970
-
Filesize
23KB
MD5c0d5d64e46adb24bfaa184185058cb1b
SHA13a6945109fc5a3c813770639524d15b26a759de5
SHA25625da4b3956809af7dedac9051c306b9e594de2bd239b0362cb33403cd4520627
SHA5127e09fce20b92037f2fe2296296abe77987236db148bd93e57680c1807b722ef7b98706aa0e7ef5bf2e6d93acf143a5effe65278c1089cfadee299ef0da89db77
-
Filesize
24KB
MD5ec2bf955b1d8dc5f62984cb58534f34d
SHA10591927bd2e8b05c8644de171af67968a3b2d76f
SHA256c03f89d49b58039d757df973a146ee9e28cef98436ae472315214de758a79ab0
SHA512ef5c0c5a0db48fa1b3f66fda60ce4efd0039b070fbe9f56777952462250f61083152514d86748261d8cca71f4f41cbbed1913a8ad09fb6c4d6e5d6b7c3b7c00c
-
\Users\Admin\AppData\Local\Temp\._cache_b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe
Filesize5KB
MD5b7901a211a6f945b74a0912d86992e5c
SHA1c4355b287439d29e242d3a2610579f72d6134f17
SHA256bc79724a5ffba941a81fa81ddf34cf805433fcc3c85e5502906c6ec0d82d727b
SHA512a5c6091752d742034273a1c1c984c76e8940ed2394dd8b26b2c4c4cc9a907c17f5ce7d538e55efc5fe1addce1c218f7409ff4dfbdeff1e87056979ef981162ff