Analysis
-
max time kernel
111s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 01:35
Behavioral task
behavioral1
Sample
56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe
Resource
win10v2004-20241007-en
General
-
Target
56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe
-
Size
1.1MB
-
MD5
9f30f28a1c7046b8c571d1079b9d7ad0
-
SHA1
7960f0def1260e15044bab06a2eb02cf91884259
-
SHA256
56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96
-
SHA512
261f031912a6f0759e57302447509962df9c2922496d5cd458fe74bb6518201f513e68e05210bcb3f904983c84b7783787806c4d3fdefbf184ced66918d4912d
-
SSDEEP
12288:4MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9gB+FT+ucrj:4nsJ39LyjbJkQFMhmC+6GD96y0X
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
resource behavioral1/files/0x000a000000019240-105.dat -
Executes dropped EXE 3 IoCs
pid Process 2860 ._cache_56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe 2816 Synaptics.exe 2888 ._cache_Synaptics.exe -
Loads dropped DLL 11 IoCs
pid Process 2840 56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe 2840 56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe 2840 56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe 2816 Synaptics.exe 2644 dw20.exe 2644 dw20.exe 2816 Synaptics.exe 2644 dw20.exe 1636 dw20.exe 1636 dw20.exe 1636 dw20.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1780 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1780 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2860 2840 56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe 30 PID 2840 wrote to memory of 2860 2840 56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe 30 PID 2840 wrote to memory of 2860 2840 56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe 30 PID 2840 wrote to memory of 2860 2840 56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe 30 PID 2840 wrote to memory of 2816 2840 56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe 31 PID 2840 wrote to memory of 2816 2840 56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe 31 PID 2840 wrote to memory of 2816 2840 56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe 31 PID 2840 wrote to memory of 2816 2840 56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe 31 PID 2860 wrote to memory of 2644 2860 ._cache_56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe 32 PID 2860 wrote to memory of 2644 2860 ._cache_56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe 32 PID 2860 wrote to memory of 2644 2860 ._cache_56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe 32 PID 2860 wrote to memory of 2644 2860 ._cache_56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe 32 PID 2816 wrote to memory of 2888 2816 Synaptics.exe 33 PID 2816 wrote to memory of 2888 2816 Synaptics.exe 33 PID 2816 wrote to memory of 2888 2816 Synaptics.exe 33 PID 2816 wrote to memory of 2888 2816 Synaptics.exe 33 PID 2888 wrote to memory of 1636 2888 ._cache_Synaptics.exe 35 PID 2888 wrote to memory of 1636 2888 ._cache_Synaptics.exe 35 PID 2888 wrote to memory of 1636 2888 ._cache_Synaptics.exe 35 PID 2888 wrote to memory of 1636 2888 ._cache_Synaptics.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe"C:\Users\Admin\AppData\Local\Temp\56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\._cache_56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 4083⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2644
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 4084⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1636
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD59f30f28a1c7046b8c571d1079b9d7ad0
SHA17960f0def1260e15044bab06a2eb02cf91884259
SHA25656fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96
SHA512261f031912a6f0759e57302447509962df9c2922496d5cd458fe74bb6518201f513e68e05210bcb3f904983c84b7783787806c4d3fdefbf184ced66918d4912d
-
Filesize
21KB
MD536a7956f54dac7136da68f7cfb54f651
SHA1a99ba7e8a2ea72e744af616e9e3ba51309fa3309
SHA256e01860d673b82e87bf2fcb35e1efb72343c5c9ca7cb663209efc24d89b85a529
SHA51213398a6645f35b0b746d57049ced48978c02c27eefd5fe56a71d89bddce061a952450e60f5e43f8b978c345e09c650902b82d5311c9dc8e5c9d4540262738209
-
Filesize
25KB
MD5f6c6ea0b401c82ed079a72b731d0e1a1
SHA15809c7ce06b56e45162c4b7ac98a662338b7eda1
SHA256a4f88ea8b78dcdc0722ca639e47d8c355fb96e48219b9c124b574eef13169625
SHA512ed6b83c0e7b11cf5741853bac5ec4fd5b8767e8c2547caf651b326574cd69a0a6b32efc4dfb6e08eed260e956dd9ee6329295a107548a9144c5cde042b4abeea
-
Filesize
25KB
MD53a40b1824d8413ea33f3fd88a1c22758
SHA178b0220f5abc43cfba4db06526b30795513fe3fc
SHA25616d78b3dd6a5ab9d5cc65dca569e9ecbaeb008b94380240b5defd396a4e91565
SHA51215ef41d0a32a6525c39bf190c0f448753acbddb49b563574c59cd879e33ab513caf56c228ff048e0e33f12f12f806a086b79e0bc39137193e49afe530ac224f2
-
Filesize
27KB
MD5b1cd66479a961d226e4c13c6b2a6a109
SHA16bf5bd2e14059fd2b80c9a7ab952429762275678
SHA256b0b3e4ccff2c63cde851f0d72a63c6e85ddf4f1dd56605cbcd83f093f65b53f3
SHA5123fecd80f5cefb6a04fab019a4d56cf66628a966142c6cbf0d15ea04d406a8d530a5d05931bb8b112aa63e289658d2a624c4d32a30888e06acf663f7a8cf08386
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
\Users\Admin\AppData\Local\Temp\._cache_56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe
Filesize390KB
MD5fb01ddbb2526e00dd1eb1e8a9a1bcd42
SHA1fc6205ba3c2cdf594fa96892028e409a4283c792
SHA256960d09544cdc2e1f655afed211900c5beed12b23a0853f79a504fe5fc0653912
SHA5127e31d6c032cbf75d68b30a4b73226f20f4ba48bf4184d90f17558e079641a77ed69a2c3d646ec0a211ae067691dd80787601e0f4a5d3a8abc49a2da8eabe3279