Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/01/2025, 19:54
Behavioral task
behavioral1
Sample
0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe
Resource
win10v2004-20241007-en
General
-
Target
0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe
-
Size
762KB
-
MD5
67b4a3780079b555e4fe765bad26a9bf
-
SHA1
06486d084a7cf0c1741948b328f1b148a046f8ca
-
SHA256
0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3
-
SHA512
7319aec60718a79e0d4a55ee7650258e57401466448622b0397ceb69c45ba61aaf1b91381c2bf1c30ed8083419f7ed2dba830e2e39d6a66ef71ba8f7035019f4
-
SSDEEP
12288:aMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9sXj:ansJ39LyjbJkQFMhmC+6GD9k
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 520 ._cache_0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe 2104 Synaptics.exe 3148 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3816 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3816 EXCEL.EXE 3816 EXCEL.EXE 3816 EXCEL.EXE 3816 EXCEL.EXE 3816 EXCEL.EXE 3816 EXCEL.EXE 3816 EXCEL.EXE 3816 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5112 wrote to memory of 520 5112 0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe 85 PID 5112 wrote to memory of 520 5112 0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe 85 PID 5112 wrote to memory of 520 5112 0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe 85 PID 5112 wrote to memory of 2104 5112 0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe 87 PID 5112 wrote to memory of 2104 5112 0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe 87 PID 5112 wrote to memory of 2104 5112 0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe 87 PID 2104 wrote to memory of 3148 2104 Synaptics.exe 88 PID 2104 wrote to memory of 3148 2104 Synaptics.exe 88 PID 2104 wrote to memory of 3148 2104 Synaptics.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe"C:\Users\Admin\AppData\Local\Temp\0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\._cache_0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe"C:\Users\Admin\AppData\Local\Temp\._cache_0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:520
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3148
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
762KB
MD567b4a3780079b555e4fe765bad26a9bf
SHA106486d084a7cf0c1741948b328f1b148a046f8ca
SHA2560880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3
SHA5127319aec60718a79e0d4a55ee7650258e57401466448622b0397ceb69c45ba61aaf1b91381c2bf1c30ed8083419f7ed2dba830e2e39d6a66ef71ba8f7035019f4
-
C:\Users\Admin\AppData\Local\Temp\._cache_0880fd8ae12878c1f886651bcbf055aefc8f24a1e257e4662aa0ac31f23954a3.exe
Filesize8KB
MD511bd1145020f67ea33dcef971826e543
SHA11da0d5057dc112feb886f387a66995cd0c76329d
SHA256387d5880f7627ec10522a939f4c5307f6707573c2a2f1e4cce6ca29111296257
SHA512d08a2eccf555d94371cfdc9e6dac3c4bc78efc0049540037875d620038a5555e5d126d0f5c635d60e43003f27af1e908286a7f4d6e49f2417183ce0caa2269be
-
Filesize
23KB
MD5ea0fa946e7ac1167317c80a4600a14c4
SHA1226fcc84907ff0875a8c76be2e6c3899f53d2237
SHA256ea3d8133f1fa0d63d26bf9a221634ad97da7161e198167fe0ef123f0545e40a9
SHA512f34b5cdbad77cce5658e5a24e7e0f911904f4c906b7072da49493f14c0d279d2d4e303d07fa47e2b67b994153e1fb81cde204021532f08f9b80de14bd0d86fc5
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04