Analysis
-
max time kernel
112s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-01-2025 04:57
Behavioral task
behavioral1
Sample
86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe
Resource
win10v2004-20241007-en
General
-
Target
86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe
-
Size
834KB
-
MD5
97d1c2ce9873b22b3d29eb228298e4e0
-
SHA1
b0888c1f4233296ae77d5d7ec244a63b26ddecab
-
SHA256
86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcec
-
SHA512
1f2a66016656e6b15ae36b12457663773a10b21aa9a572a21b8e3c1647dab2a9fc7d6b12169e19efb9bb8c3cf713db235b60f11602e21d55c67a30b622ad7ac1
-
SSDEEP
12288:BMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9yqOEgkEmtEn5/bP2Izaio:BnsJ39LyjbJkQFMhmC+6GD9AHo
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe -
Executes dropped EXE 3 IoCs
pid Process 4996 ._cache_86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe 4972 Synaptics.exe 4296 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4400 4996 WerFault.exe 83 900 4296 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1132 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1132 EXCEL.EXE 1132 EXCEL.EXE 1132 EXCEL.EXE 1132 EXCEL.EXE 1132 EXCEL.EXE 1132 EXCEL.EXE 1132 EXCEL.EXE 1132 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1336 wrote to memory of 4996 1336 86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe 83 PID 1336 wrote to memory of 4996 1336 86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe 83 PID 1336 wrote to memory of 4996 1336 86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe 83 PID 1336 wrote to memory of 4972 1336 86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe 85 PID 1336 wrote to memory of 4972 1336 86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe 85 PID 1336 wrote to memory of 4972 1336 86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe 85 PID 4972 wrote to memory of 4296 4972 Synaptics.exe 88 PID 4972 wrote to memory of 4296 4972 Synaptics.exe 88 PID 4972 wrote to memory of 4296 4972 Synaptics.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe"C:\Users\Admin\AppData\Local\Temp\86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\._cache_86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe"C:\Users\Admin\AppData\Local\Temp\._cache_86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 8243⤵
- Program crash
PID:4400
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4296 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 8244⤵
- Program crash
PID:900
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4996 -ip 49961⤵PID:2188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4296 -ip 42961⤵PID:3408
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
834KB
MD597d1c2ce9873b22b3d29eb228298e4e0
SHA1b0888c1f4233296ae77d5d7ec244a63b26ddecab
SHA25686bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcec
SHA5121f2a66016656e6b15ae36b12457663773a10b21aa9a572a21b8e3c1647dab2a9fc7d6b12169e19efb9bb8c3cf713db235b60f11602e21d55c67a30b622ad7ac1
-
C:\Users\Admin\AppData\Local\Temp\._cache_86bf1326102dd796a8e9c45ce57f1edc57cab089ebb02bea6877794b8e29fcecN.exe
Filesize80KB
MD5c95b6580705503f3c46855586558d8a7
SHA117036b3447bd1835672c93a5c49698d49155b260
SHA256da8ca7f99904a8fc7fe47f4bcbafa20694106eeecd52051e0901741a0adef269
SHA512d1a26ccfb21f006a865dd6760d50c2f3a0f4698bfcc6b7ee78f04fd36b0624c27317cc9262a487d51184ab3429a19649f9abbf6fffc7c8924cce4962b79884cf
-
Filesize
22KB
MD503920a2284804ca73b41add4af0a4f26
SHA1097581b5af6133bcb5029cfd750be5b0d96f1e57
SHA2565f00ff363cbadf3a3cec1f5272be738c7273ba5c9beee75afced436151f45012
SHA5121c53686adf2aa7f62747bcce8e133ca4f402d0f1076af58c72cf1ec1a41af74af9d9c2362fd22764258cad73d9a4db674128bab11be4d8a96804f3f61433e8b3
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04