Analysis
-
max time kernel
112s -
max time network
113s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17-01-2025 06:35
Behavioral task
behavioral1
Sample
dbd531a9415ce90c131ffff9e509d5c99823fe80646d1cca498194252e6556beN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
dbd531a9415ce90c131ffff9e509d5c99823fe80646d1cca498194252e6556beN.exe
Resource
win10v2004-20241007-en
General
-
Target
dbd531a9415ce90c131ffff9e509d5c99823fe80646d1cca498194252e6556beN.exe
-
Size
759KB
-
MD5
ba28c06a2ed9f82c132afc1520905150
-
SHA1
d018d7e188fee3689c146e11b32d26609fa5ca27
-
SHA256
dbd531a9415ce90c131ffff9e509d5c99823fe80646d1cca498194252e6556be
-
SHA512
da49c9cbeb8430aef9acb757f309910b23c78a765f63ee931e548edcecc2e1595d9fc3903299e40dcd4534ba59123a90b48ff01a8ab5c1e5b4ca0fc2b4972b87
-
SSDEEP
12288:SMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9Ybj:SnsJ39LyjbJkQFMhmC+6GD9M
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2956 ._cache_dbd531a9415ce90c131ffff9e509d5c99823fe80646d1cca498194252e6556beN.exe 2656 Synaptics.exe 1804 ._cache_Synaptics.exe -
Loads dropped DLL 11 IoCs
pid Process 2904 dbd531a9415ce90c131ffff9e509d5c99823fe80646d1cca498194252e6556beN.exe 2904 dbd531a9415ce90c131ffff9e509d5c99823fe80646d1cca498194252e6556beN.exe 2904 dbd531a9415ce90c131ffff9e509d5c99823fe80646d1cca498194252e6556beN.exe 2740 dw20.exe 2740 dw20.exe 2656 Synaptics.exe 2656 Synaptics.exe 2740 dw20.exe 1132 dw20.exe 1132 dw20.exe 1132 dw20.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" dbd531a9415ce90c131ffff9e509d5c99823fe80646d1cca498194252e6556beN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbd531a9415ce90c131ffff9e509d5c99823fe80646d1cca498194252e6556beN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_dbd531a9415ce90c131ffff9e509d5c99823fe80646d1cca498194252e6556beN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2232 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2232 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2956 2904 dbd531a9415ce90c131ffff9e509d5c99823fe80646d1cca498194252e6556beN.exe 30 PID 2904 wrote to memory of 2956 2904 dbd531a9415ce90c131ffff9e509d5c99823fe80646d1cca498194252e6556beN.exe 30 PID 2904 wrote to memory of 2956 2904 dbd531a9415ce90c131ffff9e509d5c99823fe80646d1cca498194252e6556beN.exe 30 PID 2904 wrote to memory of 2956 2904 dbd531a9415ce90c131ffff9e509d5c99823fe80646d1cca498194252e6556beN.exe 30 PID 2904 wrote to memory of 2656 2904 dbd531a9415ce90c131ffff9e509d5c99823fe80646d1cca498194252e6556beN.exe 32 PID 2904 wrote to memory of 2656 2904 dbd531a9415ce90c131ffff9e509d5c99823fe80646d1cca498194252e6556beN.exe 32 PID 2904 wrote to memory of 2656 2904 dbd531a9415ce90c131ffff9e509d5c99823fe80646d1cca498194252e6556beN.exe 32 PID 2904 wrote to memory of 2656 2904 dbd531a9415ce90c131ffff9e509d5c99823fe80646d1cca498194252e6556beN.exe 32 PID 2956 wrote to memory of 2740 2956 ._cache_dbd531a9415ce90c131ffff9e509d5c99823fe80646d1cca498194252e6556beN.exe 33 PID 2956 wrote to memory of 2740 2956 ._cache_dbd531a9415ce90c131ffff9e509d5c99823fe80646d1cca498194252e6556beN.exe 33 PID 2956 wrote to memory of 2740 2956 ._cache_dbd531a9415ce90c131ffff9e509d5c99823fe80646d1cca498194252e6556beN.exe 33 PID 2956 wrote to memory of 2740 2956 ._cache_dbd531a9415ce90c131ffff9e509d5c99823fe80646d1cca498194252e6556beN.exe 33 PID 2656 wrote to memory of 1804 2656 Synaptics.exe 34 PID 2656 wrote to memory of 1804 2656 Synaptics.exe 34 PID 2656 wrote to memory of 1804 2656 Synaptics.exe 34 PID 2656 wrote to memory of 1804 2656 Synaptics.exe 34 PID 1804 wrote to memory of 1132 1804 ._cache_Synaptics.exe 36 PID 1804 wrote to memory of 1132 1804 ._cache_Synaptics.exe 36 PID 1804 wrote to memory of 1132 1804 ._cache_Synaptics.exe 36 PID 1804 wrote to memory of 1132 1804 ._cache_Synaptics.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbd531a9415ce90c131ffff9e509d5c99823fe80646d1cca498194252e6556beN.exe"C:\Users\Admin\AppData\Local\Temp\dbd531a9415ce90c131ffff9e509d5c99823fe80646d1cca498194252e6556beN.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\._cache_dbd531a9415ce90c131ffff9e509d5c99823fe80646d1cca498194252e6556beN.exe"C:\Users\Admin\AppData\Local\Temp\._cache_dbd531a9415ce90c131ffff9e509d5c99823fe80646d1cca498194252e6556beN.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 4083⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2740
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 4004⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1132
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
759KB
MD5ba28c06a2ed9f82c132afc1520905150
SHA1d018d7e188fee3689c146e11b32d26609fa5ca27
SHA256dbd531a9415ce90c131ffff9e509d5c99823fe80646d1cca498194252e6556be
SHA512da49c9cbeb8430aef9acb757f309910b23c78a765f63ee931e548edcecc2e1595d9fc3903299e40dcd4534ba59123a90b48ff01a8ab5c1e5b4ca0fc2b4972b87
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
29KB
MD56aa03bc65d991c49aca1965859e33ae9
SHA1f717f983953f8e09b19940ef98e4ac0844a27a7d
SHA2563d0bc3d5c5318d100dceab6abf1b80415175aeb548959411cac92f13909c61fe
SHA512a63b57cfe16d1c8f2a6bab0fc6c2d397c26e569af6574245eb8e9ebf48d4116f498f087346ff05236b2f27411936b5dbef5c341c6c29c8df6cdc57e97ac4df52
-
Filesize
23KB
MD55c6f3b0fb0034d7239373ce41dde4460
SHA1899cbe4e0cdd61823935268a153689e2b067ce9b
SHA25633017feff0b3bfb7f240db91ac3327d448ac500facc6a11202cb5606a43f2242
SHA51248a795f72cf4f92716d93930dbb6652d4edf2f0d9d3763d69431ff7052a0def2a7966f6bfe5ed5880c9d162239f10b69410828644049afcbc3f8e22638c214b2
-
\Users\Admin\AppData\Local\Temp\._cache_dbd531a9415ce90c131ffff9e509d5c99823fe80646d1cca498194252e6556beN.exe
Filesize5KB
MD5b7901a211a6f945b74a0912d86992e5c
SHA1c4355b287439d29e242d3a2610579f72d6134f17
SHA256bc79724a5ffba941a81fa81ddf34cf805433fcc3c85e5502906c6ec0d82d727b
SHA512a5c6091752d742034273a1c1c984c76e8940ed2394dd8b26b2c4c4cc9a907c17f5ce7d538e55efc5fe1addce1c218f7409ff4dfbdeff1e87056979ef981162ff