Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
22/01/2025, 19:54
Behavioral task
behavioral1
Sample
0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe
Resource
win10v2004-20241007-en
General
-
Target
0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe
-
Size
762KB
-
MD5
67b4a3780079b555e4fe765bad26a9bf
-
SHA1
06486d084a7cf0c1741948b328f1b148a046f8ca
-
SHA256
0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3
-
SHA512
7319aec60718a79e0d4a55ee7650258e57401466448622b0397ceb69c45ba61aaf1b91381c2bf1c30ed8083419f7ed2dba830e2e39d6a66ef71ba8f7035019f4
-
SSDEEP
12288:aMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9sXj:ansJ39LyjbJkQFMhmC+6GD9k
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2392 ._cache_0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe 2824 Synaptics.exe 2732 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 1916 0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe 1916 0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe 1916 0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe 1916 0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe 2824 Synaptics.exe 2824 Synaptics.exe 2824 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3044 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3044 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2392 1916 0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe 30 PID 1916 wrote to memory of 2392 1916 0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe 30 PID 1916 wrote to memory of 2392 1916 0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe 30 PID 1916 wrote to memory of 2392 1916 0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe 30 PID 1916 wrote to memory of 2824 1916 0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe 32 PID 1916 wrote to memory of 2824 1916 0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe 32 PID 1916 wrote to memory of 2824 1916 0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe 32 PID 1916 wrote to memory of 2824 1916 0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe 32 PID 2824 wrote to memory of 2732 2824 Synaptics.exe 33 PID 2824 wrote to memory of 2732 2824 Synaptics.exe 33 PID 2824 wrote to memory of 2732 2824 Synaptics.exe 33 PID 2824 wrote to memory of 2732 2824 Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe"C:\Users\Admin\AppData\Local\Temp\0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\._cache_0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe"C:\Users\Admin\AppData\Local\Temp\._cache_0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe"2⤵
- Executes dropped EXE
PID:2392
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2732
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
762KB
MD567b4a3780079b555e4fe765bad26a9bf
SHA106486d084a7cf0c1741948b328f1b148a046f8ca
SHA2560880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3
SHA5127319aec60718a79e0d4a55ee7650258e57401466448622b0397ceb69c45ba61aaf1b91381c2bf1c30ed8083419f7ed2dba830e2e39d6a66ef71ba8f7035019f4
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
\Users\Admin\AppData\Local\Temp\._cache_0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe
Filesize8KB
MD511bd1145020f67ea33dcef971826e543
SHA11da0d5057dc112feb886f387a66995cd0c76329d
SHA256387d5880f7627ec10522a939f4c5307f6707573c2a2f1e4cce6ca29111296257
SHA512d08a2eccf555d94371cfdc9e6dac3c4bc78efc0049540037875d620038a5555e5d126d0f5c635d60e43003f27af1e908286a7f4d6e49f2417183ce0caa2269be