Analysis
-
max time kernel
111s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-01-2025 04:07
Behavioral task
behavioral1
Sample
b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe
Resource
win10v2004-20241007-en
General
-
Target
b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe
-
Size
759KB
-
MD5
a72c9d1c461e2a339901007de52a99f0
-
SHA1
9e24d477162dd7249b0b3fd52aad09f7e30e1ef3
-
SHA256
b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb
-
SHA512
3388cbfeab2aae4f7e86dde9389594088e95745246e65079dc490717690e3e51ee45db6d4e884b5a1e3efa370d0ffd9883447e031cbceff081d9c7115f66e19e
-
SSDEEP
12288:SMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9YbB:SnsJ39LyjbJkQFMhmC+6GD90
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 3384 ._cache_b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe 2568 Synaptics.exe 2040 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe -
Checks processor information in registry 2 TTPs 9 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3192 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeRestorePrivilege 4560 dw20.exe Token: SeBackupPrivilege 4560 dw20.exe Token: SeBackupPrivilege 4560 dw20.exe Token: SeBackupPrivilege 4560 dw20.exe Token: SeBackupPrivilege 4516 dw20.exe Token: SeBackupPrivilege 4516 dw20.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3192 EXCEL.EXE 3192 EXCEL.EXE 3192 EXCEL.EXE 3192 EXCEL.EXE 3192 EXCEL.EXE 3192 EXCEL.EXE 3192 EXCEL.EXE 3192 EXCEL.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3240 wrote to memory of 3384 3240 b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe 83 PID 3240 wrote to memory of 3384 3240 b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe 83 PID 3240 wrote to memory of 3384 3240 b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe 83 PID 3240 wrote to memory of 2568 3240 b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe 85 PID 3240 wrote to memory of 2568 3240 b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe 85 PID 3240 wrote to memory of 2568 3240 b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe 85 PID 3384 wrote to memory of 4560 3384 ._cache_b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe 86 PID 3384 wrote to memory of 4560 3384 ._cache_b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe 86 PID 3384 wrote to memory of 4560 3384 ._cache_b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe 86 PID 2568 wrote to memory of 2040 2568 Synaptics.exe 88 PID 2568 wrote to memory of 2040 2568 Synaptics.exe 88 PID 2568 wrote to memory of 2040 2568 Synaptics.exe 88 PID 2040 wrote to memory of 4516 2040 ._cache_Synaptics.exe 91 PID 2040 wrote to memory of 4516 2040 ._cache_Synaptics.exe 91 PID 2040 wrote to memory of 4516 2040 ._cache_Synaptics.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe"C:\Users\Admin\AppData\Local\Temp\b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\._cache_b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe"C:\Users\Admin\AppData\Local\Temp\._cache_b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 8763⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4560
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 8604⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4516
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
759KB
MD5a72c9d1c461e2a339901007de52a99f0
SHA19e24d477162dd7249b0b3fd52aad09f7e30e1ef3
SHA256b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb
SHA5123388cbfeab2aae4f7e86dde9389594088e95745246e65079dc490717690e3e51ee45db6d4e884b5a1e3efa370d0ffd9883447e031cbceff081d9c7115f66e19e
-
C:\Users\Admin\AppData\Local\Temp\._cache_b35c08c5a87c855b7d8d681c7c169c9e7486010d758fe1e6ad2937766aed7fdb.exe
Filesize5KB
MD5b7901a211a6f945b74a0912d86992e5c
SHA1c4355b287439d29e242d3a2610579f72d6134f17
SHA256bc79724a5ffba941a81fa81ddf34cf805433fcc3c85e5502906c6ec0d82d727b
SHA512a5c6091752d742034273a1c1c984c76e8940ed2394dd8b26b2c4c4cc9a907c17f5ce7d538e55efc5fe1addce1c218f7409ff4dfbdeff1e87056979ef981162ff
-
Filesize
25KB
MD5d4efcb3ee115e23f6b52ac10d8f3dfc1
SHA143cbffd2233419ac6b5b5fab223f070f4b0c9669
SHA2566ccb9b676d6d657679486a00c6284b024750d6c2afb130727818e598abaeaa79
SHA51264b73e9c371e1ba2c4bc877e015738a4008cad5eebaa421b399c9c971dd8c31d4368d9d71043554e5cd7b518c7e5118d904c2569a415a22157a966027056cc0b
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04