Analysis
-
max time kernel
110s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-01-2025 21:58
Behavioral task
behavioral1
Sample
63de7eefa324c97a8f31c6d7adb6c795f3ae53517be4ef7e39218fd94d55e04dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
63de7eefa324c97a8f31c6d7adb6c795f3ae53517be4ef7e39218fd94d55e04dN.exe
Resource
win10v2004-20241007-en
General
-
Target
63de7eefa324c97a8f31c6d7adb6c795f3ae53517be4ef7e39218fd94d55e04dN.exe
-
Size
1.8MB
-
MD5
b8fb75331078770f7fbdf9d5154482f0
-
SHA1
7034b7ff7484102a84451a5f62997b631dddd8db
-
SHA256
63de7eefa324c97a8f31c6d7adb6c795f3ae53517be4ef7e39218fd94d55e04d
-
SHA512
0d047ebd748e1a57387d520407100447f53dbdb414e1d4f794df4915a45c43cbb46149a364d88ba65b4df4c17fa3c83a88fc9704b38bb03525537fc6cecb174f
-
SSDEEP
49152:xnsHyjtk2MYC5GDccykORxLrRtTn6GuYd:xnsmtk2a9kcrRp6GuYd
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2996 ._cache_63de7eefa324c97a8f31c6d7adb6c795f3ae53517be4ef7e39218fd94d55e04dN.exe 2744 Synaptics.exe 2240 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 1732 63de7eefa324c97a8f31c6d7adb6c795f3ae53517be4ef7e39218fd94d55e04dN.exe 1732 63de7eefa324c97a8f31c6d7adb6c795f3ae53517be4ef7e39218fd94d55e04dN.exe 1732 63de7eefa324c97a8f31c6d7adb6c795f3ae53517be4ef7e39218fd94d55e04dN.exe 2744 Synaptics.exe 2744 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 63de7eefa324c97a8f31c6d7adb6c795f3ae53517be4ef7e39218fd94d55e04dN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 63de7eefa324c97a8f31c6d7adb6c795f3ae53517be4ef7e39218fd94d55e04dN.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2780 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2780 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2996 1732 63de7eefa324c97a8f31c6d7adb6c795f3ae53517be4ef7e39218fd94d55e04dN.exe 31 PID 1732 wrote to memory of 2996 1732 63de7eefa324c97a8f31c6d7adb6c795f3ae53517be4ef7e39218fd94d55e04dN.exe 31 PID 1732 wrote to memory of 2996 1732 63de7eefa324c97a8f31c6d7adb6c795f3ae53517be4ef7e39218fd94d55e04dN.exe 31 PID 1732 wrote to memory of 2996 1732 63de7eefa324c97a8f31c6d7adb6c795f3ae53517be4ef7e39218fd94d55e04dN.exe 31 PID 1732 wrote to memory of 2744 1732 63de7eefa324c97a8f31c6d7adb6c795f3ae53517be4ef7e39218fd94d55e04dN.exe 32 PID 1732 wrote to memory of 2744 1732 63de7eefa324c97a8f31c6d7adb6c795f3ae53517be4ef7e39218fd94d55e04dN.exe 32 PID 1732 wrote to memory of 2744 1732 63de7eefa324c97a8f31c6d7adb6c795f3ae53517be4ef7e39218fd94d55e04dN.exe 32 PID 1732 wrote to memory of 2744 1732 63de7eefa324c97a8f31c6d7adb6c795f3ae53517be4ef7e39218fd94d55e04dN.exe 32 PID 2744 wrote to memory of 2240 2744 Synaptics.exe 33 PID 2744 wrote to memory of 2240 2744 Synaptics.exe 33 PID 2744 wrote to memory of 2240 2744 Synaptics.exe 33 PID 2744 wrote to memory of 2240 2744 Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\63de7eefa324c97a8f31c6d7adb6c795f3ae53517be4ef7e39218fd94d55e04dN.exe"C:\Users\Admin\AppData\Local\Temp\63de7eefa324c97a8f31c6d7adb6c795f3ae53517be4ef7e39218fd94d55e04dN.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\._cache_63de7eefa324c97a8f31c6d7adb6c795f3ae53517be4ef7e39218fd94d55e04dN.exe"C:\Users\Admin\AppData\Local\Temp\._cache_63de7eefa324c97a8f31c6d7adb6c795f3ae53517be4ef7e39218fd94d55e04dN.exe"2⤵
- Executes dropped EXE
PID:2996
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2240
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5b8fb75331078770f7fbdf9d5154482f0
SHA17034b7ff7484102a84451a5f62997b631dddd8db
SHA25663de7eefa324c97a8f31c6d7adb6c795f3ae53517be4ef7e39218fd94d55e04d
SHA5120d047ebd748e1a57387d520407100447f53dbdb414e1d4f794df4915a45c43cbb46149a364d88ba65b4df4c17fa3c83a88fc9704b38bb03525537fc6cecb174f
-
Filesize
21KB
MD5e4deddf04f9d314184070edf62dee82d
SHA10bce42dfce55ff28a8fcc49c765a1c8266e5aff9
SHA25663d23cfbed5aa8030e7f2a8bd8a4ac30fe9653f45b244f3ef0305fcaba91efed
SHA512f3309631ef47093a1626702913ef5cf5ae5753c23286600c5b7e93af24105ab63cf732fc77fbe1d9ca2940352a41f7bbbcd5b8320e77b5801ebe5386462c3469
-
Filesize
25KB
MD55f21d158321682d671e9aa41a1d01c84
SHA1c5001f6bb582bc4568985c10ce5086215bf0f521
SHA25601336f8b51b8eeb7457b917e557d74460e15b26862cd3630e25a24aa4cecab05
SHA5126ea94abd6c8cd950f02fada6df3d04353fdb60c57d356d6ff214b0bc5e5561e40811e7bc393bb8efce339ea85f8153edfb2709b2197594af412674c2473543d9
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
25KB
MD5eaa77bedef44ec55aa569d7f640ca4b0
SHA1a91ad005f5d40f918e8f166d98c639e5e42a0ad1
SHA256647bb581efa3658b2176009ff87810fb655e05f7ebe2666c199ce52e8c50e72b
SHA512033360add30278df1d457e8eca7c649e3c6e40464a344c0ff9312d41ca07f6e1e720c282bbfd5ec309011681cef0b25348e9a9139271e2f6088951a546665dfb
-
Filesize
27KB
MD548798fc9b188e4ea5612356d2c4d76da
SHA186edfbffdde4557b107661ed6df7ac802114c677
SHA256c222ece5e77c3a5ac4a5fd868ed9a0677c79289ef71b18628888ea609eab3cb6
SHA5129d7100b63541eabf63a4bfce6dadcc70de93d2709aa46d82d2482ef39a204b08cd24c76fa3b29acb3200ed923a2e3f1630cf4b0bc4858c9a643fce13bf017930
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
\Users\Admin\AppData\Local\Temp\._cache_63de7eefa324c97a8f31c6d7adb6c795f3ae53517be4ef7e39218fd94d55e04dN.exe
Filesize1.1MB
MD592b6f926e8c048fbd69ac84ab7683e94
SHA1bab4040dca7222537d26a007b246634486f03892
SHA256e4115906f2e6d880ea12e498310494403275018d87788ca7cc4bd48c8376ce6f
SHA51229adf1f7764c40e320fcf02636de1a546b850b16c451a87adacc3ab364fa2f8007c6f56a77674d36298a3113ccf45ecb4f337311c7c20601182193fbc152253b