Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 20:28
Behavioral task
behavioral1
Sample
10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe
Resource
win10v2004-20241007-en
General
-
Target
10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe
-
Size
2.6MB
-
MD5
f7a244f415b1beabe9799043ce0f30e9
-
SHA1
baa4e6962ec69b629823b96ad4c799821e94921c
-
SHA256
10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370
-
SHA512
1da5085a6ce1335a57f9d4b7502445e472cd1de095d7381d578b973f44f41871e7724ab4aa822ef17a6bc2b74a656b0c1802cdaf55fd55ebd6c85e31bfa2a776
-
SSDEEP
49152:MnsHyjtk2MYC5GDXtSQ3dAY26IVaID96yYbK:Mnsmtk2a8LI4IJ
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 4796 ._cache_10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe 2696 Synaptics.exe 348 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4440 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4440 EXCEL.EXE 4440 EXCEL.EXE 4440 EXCEL.EXE 4440 EXCEL.EXE 4440 EXCEL.EXE 4440 EXCEL.EXE 4440 EXCEL.EXE 4440 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2432 wrote to memory of 4796 2432 10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe 83 PID 2432 wrote to memory of 4796 2432 10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe 83 PID 2432 wrote to memory of 4796 2432 10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe 83 PID 2432 wrote to memory of 2696 2432 10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe 84 PID 2432 wrote to memory of 2696 2432 10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe 84 PID 2432 wrote to memory of 2696 2432 10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe 84 PID 2696 wrote to memory of 348 2696 Synaptics.exe 85 PID 2696 wrote to memory of 348 2696 Synaptics.exe 85 PID 2696 wrote to memory of 348 2696 Synaptics.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe"C:\Users\Admin\AppData\Local\Temp\10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\._cache_10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe"C:\Users\Admin\AppData\Local\Temp\._cache_10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4796
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:348
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5f7a244f415b1beabe9799043ce0f30e9
SHA1baa4e6962ec69b629823b96ad4c799821e94921c
SHA25610e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370
SHA5121da5085a6ce1335a57f9d4b7502445e472cd1de095d7381d578b973f44f41871e7724ab4aa822ef17a6bc2b74a656b0c1802cdaf55fd55ebd6c85e31bfa2a776
-
C:\Users\Admin\AppData\Local\Temp\._cache_10e26e58e8c1311fde4d16f720aba082b4a4048069bdcbb13da94cc9672ad370.exe
Filesize1.9MB
MD5082e0773603e43530deae070137ad143
SHA11689cb9d7a1dd20bcc1600ad5949ae9e639f9daa
SHA2561089e06348c9f81f02fed9066167c4aa46f6d33a51c7fe90880996157588a830
SHA512be8ff31dd76cacf865160ad1a6a291de5aed98155d689f7ffb5880f3b87253bbc25c0447662f3715722374ab30a6f1b26b7319e9f83ee4239701c0b11e85785b
-
Filesize
25KB
MD56470bf53ef9246503d600430c92d3f59
SHA155e27af21091cbc91f6b2a99d52c11518dd0f3fc
SHA256d2661f846ee732f27bf66f43884569963aae3d5bd9bbbbe3901d40aa12074861
SHA5122a3ff5cf765e046387a2229f4e4b999f3a1a94d5618fa9ff581b5d1cfdbca2022ee9352cb57a0aa4f8d3d4f7264bd9804756669961211fccd34a217baf4079a3
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04