Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2025 12:13
Behavioral task
behavioral1
Sample
ea664186805462511c1b2bb3eaefc2a8119b04b88ac6baac0657c1cac404ab51.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea664186805462511c1b2bb3eaefc2a8119b04b88ac6baac0657c1cac404ab51.exe
Resource
win10v2004-20241007-en
General
-
Target
ea664186805462511c1b2bb3eaefc2a8119b04b88ac6baac0657c1cac404ab51.exe
-
Size
817KB
-
MD5
8915302e4082ec0e7854fa766afded34
-
SHA1
910f009eb10337975efe135a1e287d32ad849254
-
SHA256
ea664186805462511c1b2bb3eaefc2a8119b04b88ac6baac0657c1cac404ab51
-
SHA512
a462ddcd2b8eaada98d27c8fe780aaee782d76f5e0847ee89ac8ca57a8bd7b56909888cd0f14828c096a0ff05309995c431443c5a6187559f59c10e25b3e1b40
-
SSDEEP
12288:JMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9i1xDSj:JnsJ39LyjbJkQFMhmC+6GD9WO
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation ea664186805462511c1b2bb3eaefc2a8119b04b88ac6baac0657c1cac404ab51.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 4308 ._cache_ea664186805462511c1b2bb3eaefc2a8119b04b88ac6baac0657c1cac404ab51.exe 2372 Synaptics.exe 1344 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" ea664186805462511c1b2bb3eaefc2a8119b04b88ac6baac0657c1cac404ab51.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea664186805462511c1b2bb3eaefc2a8119b04b88ac6baac0657c1cac404ab51.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_ea664186805462511c1b2bb3eaefc2a8119b04b88ac6baac0657c1cac404ab51.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ea664186805462511c1b2bb3eaefc2a8119b04b88ac6baac0657c1cac404ab51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3452 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3452 EXCEL.EXE 3452 EXCEL.EXE 3452 EXCEL.EXE 3452 EXCEL.EXE 3452 EXCEL.EXE 3452 EXCEL.EXE 3452 EXCEL.EXE 3452 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 852 wrote to memory of 4308 852 ea664186805462511c1b2bb3eaefc2a8119b04b88ac6baac0657c1cac404ab51.exe 83 PID 852 wrote to memory of 4308 852 ea664186805462511c1b2bb3eaefc2a8119b04b88ac6baac0657c1cac404ab51.exe 83 PID 852 wrote to memory of 4308 852 ea664186805462511c1b2bb3eaefc2a8119b04b88ac6baac0657c1cac404ab51.exe 83 PID 852 wrote to memory of 2372 852 ea664186805462511c1b2bb3eaefc2a8119b04b88ac6baac0657c1cac404ab51.exe 84 PID 852 wrote to memory of 2372 852 ea664186805462511c1b2bb3eaefc2a8119b04b88ac6baac0657c1cac404ab51.exe 84 PID 852 wrote to memory of 2372 852 ea664186805462511c1b2bb3eaefc2a8119b04b88ac6baac0657c1cac404ab51.exe 84 PID 2372 wrote to memory of 1344 2372 Synaptics.exe 85 PID 2372 wrote to memory of 1344 2372 Synaptics.exe 85 PID 2372 wrote to memory of 1344 2372 Synaptics.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea664186805462511c1b2bb3eaefc2a8119b04b88ac6baac0657c1cac404ab51.exe"C:\Users\Admin\AppData\Local\Temp\ea664186805462511c1b2bb3eaefc2a8119b04b88ac6baac0657c1cac404ab51.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\._cache_ea664186805462511c1b2bb3eaefc2a8119b04b88ac6baac0657c1cac404ab51.exe"C:\Users\Admin\AppData\Local\Temp\._cache_ea664186805462511c1b2bb3eaefc2a8119b04b88ac6baac0657c1cac404ab51.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4308
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1344
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
817KB
MD58915302e4082ec0e7854fa766afded34
SHA1910f009eb10337975efe135a1e287d32ad849254
SHA256ea664186805462511c1b2bb3eaefc2a8119b04b88ac6baac0657c1cac404ab51
SHA512a462ddcd2b8eaada98d27c8fe780aaee782d76f5e0847ee89ac8ca57a8bd7b56909888cd0f14828c096a0ff05309995c431443c5a6187559f59c10e25b3e1b40
-
C:\Users\Admin\AppData\Local\Temp\._cache_ea664186805462511c1b2bb3eaefc2a8119b04b88ac6baac0657c1cac404ab51.exe
Filesize63KB
MD515c6ae43df11f633fac0c344d6ddf54b
SHA1e3c991072a6b9685f7349fe6143ced5aee4a9216
SHA256113440545c6995ce39a3efc3a54b25b6493488acacebd09e038efd84cb29b8e4
SHA512b819504bb18bfc4df6ef5991a60925a4cbf3409811fd1dfa93f3b16629a4fed862e63c0190b7b88c4592ffb053962f68a5077fa4efc1dbd27077ac8f3e2ad6f7
-
Filesize
28KB
MD54fdf11518ee6d83cbab25102dc40a5e8
SHA1358114f1bc8549620b279f4ac638419424b92be3
SHA25673074b2822b476bd4730d1f2235c84e07db0c577e332991c52241a11f7cae73f
SHA51217176a1c8f05c0b317ab175af31b332873273f477b249dcad9b3bff12b5aa6e6d58ecd8404e9b678e35bde0c1363a9e4c6ca154c50b997f62ac78e1b4b8447b1
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04