Analysis
-
max time kernel
111s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 18:06
Behavioral task
behavioral1
Sample
669a6882f8eb838fa1d76ac2e8d1f652c41581d6ef54c47b5e165cf201c2c617N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
669a6882f8eb838fa1d76ac2e8d1f652c41581d6ef54c47b5e165cf201c2c617N.exe
Resource
win10v2004-20241007-en
General
-
Target
669a6882f8eb838fa1d76ac2e8d1f652c41581d6ef54c47b5e165cf201c2c617N.exe
-
Size
1.1MB
-
MD5
60a58fb1d15ebfed20e84a634367a850
-
SHA1
3042289e9f2c8163f0085712a2a58dd4bb6adce2
-
SHA256
669a6882f8eb838fa1d76ac2e8d1f652c41581d6ef54c47b5e165cf201c2c617
-
SHA512
0bce7f462880fe16d968948ad01bc5256d154a0b66788d41c338cae04eeea873c30da45d20884409ba930c1cadecde688b0d02b8cd1dbb6d512aed62b2b09a6b
-
SSDEEP
24576:tnsJ39LyjbJkQFMhmC+6GD9ICnzZSpz8Lkg:tnsHyjtk2MYC5GDHzk0v
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 669a6882f8eb838fa1d76ac2e8d1f652c41581d6ef54c47b5e165cf201c2c617N.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 3876 ._cache_669a6882f8eb838fa1d76ac2e8d1f652c41581d6ef54c47b5e165cf201c2c617N.exe 3632 Synaptics.exe 2160 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 669a6882f8eb838fa1d76ac2e8d1f652c41581d6ef54c47b5e165cf201c2c617N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 669a6882f8eb838fa1d76ac2e8d1f652c41581d6ef54c47b5e165cf201c2c617N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_669a6882f8eb838fa1d76ac2e8d1f652c41581d6ef54c47b5e165cf201c2c617N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 669a6882f8eb838fa1d76ac2e8d1f652c41581d6ef54c47b5e165cf201c2c617N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 624 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 624 EXCEL.EXE 624 EXCEL.EXE 624 EXCEL.EXE 624 EXCEL.EXE 624 EXCEL.EXE 624 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1980 wrote to memory of 3876 1980 669a6882f8eb838fa1d76ac2e8d1f652c41581d6ef54c47b5e165cf201c2c617N.exe 82 PID 1980 wrote to memory of 3876 1980 669a6882f8eb838fa1d76ac2e8d1f652c41581d6ef54c47b5e165cf201c2c617N.exe 82 PID 1980 wrote to memory of 3876 1980 669a6882f8eb838fa1d76ac2e8d1f652c41581d6ef54c47b5e165cf201c2c617N.exe 82 PID 1980 wrote to memory of 3632 1980 669a6882f8eb838fa1d76ac2e8d1f652c41581d6ef54c47b5e165cf201c2c617N.exe 84 PID 1980 wrote to memory of 3632 1980 669a6882f8eb838fa1d76ac2e8d1f652c41581d6ef54c47b5e165cf201c2c617N.exe 84 PID 1980 wrote to memory of 3632 1980 669a6882f8eb838fa1d76ac2e8d1f652c41581d6ef54c47b5e165cf201c2c617N.exe 84 PID 3632 wrote to memory of 2160 3632 Synaptics.exe 85 PID 3632 wrote to memory of 2160 3632 Synaptics.exe 85 PID 3632 wrote to memory of 2160 3632 Synaptics.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\669a6882f8eb838fa1d76ac2e8d1f652c41581d6ef54c47b5e165cf201c2c617N.exe"C:\Users\Admin\AppData\Local\Temp\669a6882f8eb838fa1d76ac2e8d1f652c41581d6ef54c47b5e165cf201c2c617N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\._cache_669a6882f8eb838fa1d76ac2e8d1f652c41581d6ef54c47b5e165cf201c2c617N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_669a6882f8eb838fa1d76ac2e8d1f652c41581d6ef54c47b5e165cf201c2c617N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3876
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2160
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD560a58fb1d15ebfed20e84a634367a850
SHA13042289e9f2c8163f0085712a2a58dd4bb6adce2
SHA256669a6882f8eb838fa1d76ac2e8d1f652c41581d6ef54c47b5e165cf201c2c617
SHA5120bce7f462880fe16d968948ad01bc5256d154a0b66788d41c338cae04eeea873c30da45d20884409ba930c1cadecde688b0d02b8cd1dbb6d512aed62b2b09a6b
-
C:\Users\Admin\AppData\Local\Temp\._cache_669a6882f8eb838fa1d76ac2e8d1f652c41581d6ef54c47b5e165cf201c2c617N.exe
Filesize369KB
MD55fcfe9a4da55421bda55959ebb67b1b2
SHA142cae4b098a43c725048036ba0eb65ac992254e5
SHA25650e22fd9d37c6b1e14a86b5e4440aaaa4d2a20d1dd8f83d2c9e19915f45b61ff
SHA512dfc69fa7508c1b08c233988eff0d4b4479c6548a1e489d3be8d2f185a4b8993cda159e4979ca94359e11c039e8bd7f2e660e6a7df5c032c64400b64e03ef4457
-
Filesize
26KB
MD5ece2abc1e906065460f52fdd131d045b
SHA1d7911f75775e1bc4c2ff42433a71d1a9d9e7c08a
SHA2562bb1cb7c4eb4b2557312c9a4389b3060968a02d6dff2f0e8e8822217564b4326
SHA512d2e93474169933023b9803915daff00f1ff9c2ea01ad781bccd62735d1cc233c0d8c2c923a4f8c2fc519cf987d5ceaabe3726c19b3ac28958c518462919c4b21
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04