Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-01-2025 04:57
Behavioral task
behavioral1
Sample
86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe
Resource
win10v2004-20241007-en
General
-
Target
86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe
-
Size
834KB
-
MD5
97d1c2ce9873b22b3d29eb228298e4e0
-
SHA1
b0888c1f4233296ae77d5d7ec244a63b26ddecab
-
SHA256
86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcec
-
SHA512
1f2a66016656e6b15ae36b12457663773a10b21aa9a572a21b8e3c1647dab2a9fc7d6b12169e19efb9bb8c3cf713db235b60f11602e21d55c67a30b622ad7ac1
-
SSDEEP
12288:BMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9yqOEgkEmtEn5/bP2Izaio:BnsJ39LyjbJkQFMhmC+6GD9AHo
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 1552 ._cache_86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe 2156 Synaptics.exe 2768 ._cache_Synaptics.exe -
Loads dropped DLL 17 IoCs
pid Process 2356 86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe 2356 86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe 2356 86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe 2356 86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe 2156 Synaptics.exe 2856 WerFault.exe 2856 WerFault.exe 2856 WerFault.exe 2856 WerFault.exe 2156 Synaptics.exe 2156 Synaptics.exe 2672 WerFault.exe 2672 WerFault.exe 2672 WerFault.exe 2672 WerFault.exe 2672 WerFault.exe 2856 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2856 1552 WerFault.exe 30 2672 2768 WerFault.exe 34 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2780 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2780 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2356 wrote to memory of 1552 2356 86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe 30 PID 2356 wrote to memory of 1552 2356 86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe 30 PID 2356 wrote to memory of 1552 2356 86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe 30 PID 2356 wrote to memory of 1552 2356 86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe 30 PID 2356 wrote to memory of 2156 2356 86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe 32 PID 2356 wrote to memory of 2156 2356 86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe 32 PID 2356 wrote to memory of 2156 2356 86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe 32 PID 2356 wrote to memory of 2156 2356 86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe 32 PID 1552 wrote to memory of 2856 1552 ._cache_86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe 33 PID 1552 wrote to memory of 2856 1552 ._cache_86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe 33 PID 1552 wrote to memory of 2856 1552 ._cache_86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe 33 PID 1552 wrote to memory of 2856 1552 ._cache_86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe 33 PID 2156 wrote to memory of 2768 2156 Synaptics.exe 34 PID 2156 wrote to memory of 2768 2156 Synaptics.exe 34 PID 2156 wrote to memory of 2768 2156 Synaptics.exe 34 PID 2156 wrote to memory of 2768 2156 Synaptics.exe 34 PID 2768 wrote to memory of 2672 2768 ._cache_Synaptics.exe 37 PID 2768 wrote to memory of 2672 2768 ._cache_Synaptics.exe 37 PID 2768 wrote to memory of 2672 2768 ._cache_Synaptics.exe 37 PID 2768 wrote to memory of 2672 2768 ._cache_Synaptics.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe"C:\Users\Admin\AppData\Local\Temp\86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\._cache_86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe"C:\Users\Admin\AppData\Local\Temp\._cache_86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 5403⤵
- Loads dropped DLL
- Program crash
PID:2856
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 5404⤵
- Loads dropped DLL
- Program crash
PID:2672
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
834KB
MD597d1c2ce9873b22b3d29eb228298e4e0
SHA1b0888c1f4233296ae77d5d7ec244a63b26ddecab
SHA25686bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcec
SHA5121f2a66016656e6b15ae36b12457663773a10b21aa9a572a21b8e3c1647dab2a9fc7d6b12169e19efb9bb8c3cf713db235b60f11602e21d55c67a30b622ad7ac1
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
23KB
MD5884e31eca1d367a4b41942f196004f26
SHA1ce7cb23acb93693a9adefd4fc2150e57b0435041
SHA25621cf5de078707a767c6c526976e6c20d73250cb3bf00bd1f5e03b6697a03ae52
SHA512af0cc7c607a2055516fe5574e713dc2df37d266dedd53e9898d2dec673577c94273fb6a1b7234d4d72ffbbff49c184601216e51bc36a1d1a8ff1bd768c77e207
-
\Users\Admin\AppData\Local\Temp\._cache_86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe
Filesize80KB
MD5c95b6580705503f3c46855586558d8a7
SHA117036b3447bd1835672c93a5c49698d49155b260
SHA256da8ca7f99904a8fc7fe47f4bcbafa20694106eeecd52051e0901741a0adef269
SHA512d1a26ccfb21f006a865dd6760d50c2f3a0f4698bfcc6b7ee78f04fd36b0624c27317cc9262a487d51184ab3429a19649f9abbf6fffc7c8924cce4962b79884cf