Analysis
-
max time kernel
111s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 01:35
Behavioral task
behavioral1
Sample
56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe
Resource
win10v2004-20241007-en
General
-
Target
56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe
-
Size
1.1MB
-
MD5
9f30f28a1c7046b8c571d1079b9d7ad0
-
SHA1
7960f0def1260e15044bab06a2eb02cf91884259
-
SHA256
56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96
-
SHA512
261f031912a6f0759e57302447509962df9c2922496d5cd458fe74bb6518201f513e68e05210bcb3f904983c84b7783787806c4d3fdefbf184ced66918d4912d
-
SSDEEP
12288:4MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9gB+FT+ucrj:4nsJ39LyjbJkQFMhmC+6GD96y0X
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 1136 ._cache_56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe 4040 Synaptics.exe 3640 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe -
Checks processor information in registry 2 TTPs 9 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 7 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1696 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeRestorePrivilege 692 dw20.exe Token: SeBackupPrivilege 692 dw20.exe Token: SeBackupPrivilege 692 dw20.exe Token: SeBackupPrivilege 692 dw20.exe Token: SeBackupPrivilege 4252 dw20.exe Token: SeBackupPrivilege 4252 dw20.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1696 EXCEL.EXE 1696 EXCEL.EXE 1696 EXCEL.EXE 1696 EXCEL.EXE 1696 EXCEL.EXE 1696 EXCEL.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2468 wrote to memory of 1136 2468 56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe 83 PID 2468 wrote to memory of 1136 2468 56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe 83 PID 2468 wrote to memory of 1136 2468 56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe 83 PID 2468 wrote to memory of 4040 2468 56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe 84 PID 2468 wrote to memory of 4040 2468 56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe 84 PID 2468 wrote to memory of 4040 2468 56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe 84 PID 1136 wrote to memory of 692 1136 ._cache_56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe 85 PID 1136 wrote to memory of 692 1136 ._cache_56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe 85 PID 1136 wrote to memory of 692 1136 ._cache_56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe 85 PID 4040 wrote to memory of 3640 4040 Synaptics.exe 86 PID 4040 wrote to memory of 3640 4040 Synaptics.exe 86 PID 4040 wrote to memory of 3640 4040 Synaptics.exe 86 PID 3640 wrote to memory of 4252 3640 ._cache_Synaptics.exe 89 PID 3640 wrote to memory of 4252 3640 ._cache_Synaptics.exe 89 PID 3640 wrote to memory of 4252 3640 ._cache_Synaptics.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe"C:\Users\Admin\AppData\Local\Temp\56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\._cache_56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 8363⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:692
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 8244⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4252
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD59f30f28a1c7046b8c571d1079b9d7ad0
SHA17960f0def1260e15044bab06a2eb02cf91884259
SHA25656fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96
SHA512261f031912a6f0759e57302447509962df9c2922496d5cd458fe74bb6518201f513e68e05210bcb3f904983c84b7783787806c4d3fdefbf184ced66918d4912d
-
C:\Users\Admin\AppData\Local\Temp\._cache_56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe
Filesize390KB
MD5fb01ddbb2526e00dd1eb1e8a9a1bcd42
SHA1fc6205ba3c2cdf594fa96892028e409a4283c792
SHA256960d09544cdc2e1f655afed211900c5beed12b23a0853f79a504fe5fc0653912
SHA5127e31d6c032cbf75d68b30a4b73226f20f4ba48bf4184d90f17558e079641a77ed69a2c3d646ec0a211ae067691dd80787601e0f4a5d3a8abc49a2da8eabe3279
-
Filesize
22KB
MD5c0f9170a26666254cffb73c92ed52e7f
SHA1bc2b2cbb0da5a22e1167ef1e8d409cdc50d66778
SHA256138b871547647d9080569922afd73cee0b10e67173fad7795c9954682680f9e1
SHA512f87ec3b18aadb908243dc55e661a1a8e1c402b8938c5fc2ab3d89e97a657dfc1dfc9a12669a00e968d896179a3217ee964838657d7138addd52d138826df13cd
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04