Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-01-2025 20:28
Behavioral task
behavioral1
Sample
10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe
Resource
win10v2004-20241007-en
General
-
Target
10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe
-
Size
2.6MB
-
MD5
f7a244f415b1beabe9799043ce0f30e9
-
SHA1
baa4e6962ec69b629823b96ad4c799821e94921c
-
SHA256
10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370
-
SHA512
1da5085a6ce1335a57f9d4b7502445e472cd1de095d7381d578b973f44f41871e7724ab4aa822ef17a6bc2b74a656b0c1802cdaf55fd55ebd6c85e31bfa2a776
-
SSDEEP
49152:MnsHyjtk2MYC5GDXtSQ3dAY26IVaID96yYbK:Mnsmtk2a8LI4IJ
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 1168 ._cache_10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe 2376 Synaptics.exe 2644 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 1936 10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe 1936 10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe 1936 10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe 2376 Synaptics.exe 2376 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2632 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2632 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1936 wrote to memory of 1168 1936 10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe 30 PID 1936 wrote to memory of 1168 1936 10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe 30 PID 1936 wrote to memory of 1168 1936 10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe 30 PID 1936 wrote to memory of 1168 1936 10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe 30 PID 1936 wrote to memory of 2376 1936 10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe 31 PID 1936 wrote to memory of 2376 1936 10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe 31 PID 1936 wrote to memory of 2376 1936 10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe 31 PID 1936 wrote to memory of 2376 1936 10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe 31 PID 2376 wrote to memory of 2644 2376 Synaptics.exe 32 PID 2376 wrote to memory of 2644 2376 Synaptics.exe 32 PID 2376 wrote to memory of 2644 2376 Synaptics.exe 32 PID 2376 wrote to memory of 2644 2376 Synaptics.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe"C:\Users\Admin\AppData\Local\Temp\10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\._cache_10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe"C:\Users\Admin\AppData\Local\Temp\._cache_10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe"2⤵
- Executes dropped EXE
PID:1168
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2644
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5f7a244f415b1beabe9799043ce0f30e9
SHA1baa4e6962ec69b629823b96ad4c799821e94921c
SHA25610e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370
SHA5121da5085a6ce1335a57f9d4b7502445e472cd1de095d7381d578b973f44f41871e7724ab4aa822ef17a6bc2b74a656b0c1802cdaf55fd55ebd6c85e31bfa2a776
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
23KB
MD57754cb558de045d012a7c9c4f254cfa3
SHA1ef20384b013d6f9de20bdde3ffa66de5c5fab686
SHA256167abc4c6a12c7f54be832406aef57c5037aa16b2804a592040baf15eff79d29
SHA512cfc54a77d4b2fe5f4b432b2fdf817a033acf7d17aaf9078737fe9e2556f784ee0a12281b1767eeda325a65c7968ece63ae07156cedb9046610621ff309a7092d
-
\Users\Admin\AppData\Local\Temp\._cache_10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe
Filesize1.9MB
MD5082e0773603e43530deae070137ad143
SHA11689cb9d7a1dd20bcc1600ad5949ae9e639f9daa
SHA2561089e06348c9f81f02fed9066167c4aa46f6d33a51c7fe90880996157588a830
SHA512be8ff31dd76cacf865160ad1a6a291de5aed98155d689f7ffb5880f3b87253bbc25c0447662f3715722374ab30a6f1b26b7319e9f83ee4239701c0b11e85785b