Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/01/2025, 04:22
Behavioral task
behavioral1
Sample
a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe
Resource
win10v2004-20241007-en
General
-
Target
a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe
-
Size
3.6MB
-
MD5
892455f16d36f0f80b04671ec11a04e8
-
SHA1
14d2dcbcd7917514900e30fa077df036aa41b1ce
-
SHA256
a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802
-
SHA512
94a96cf6ac180b66af105ece9b75cd2ee5a6c9bfba67fe4b9b7d41d97e54bb36c9d286e260a206199a525c851d33a3db722f2be100d68ede1c95222dc8a74424
-
SSDEEP
98304:Qnsmtk2arfsH5cZXXrKpVCbjkM5HLRDWUkUOR:uL3H5cZXXrKpVikM5TTc
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 1992 ._cache_a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe 2816 Synaptics.exe 3044 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 2916 a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe 2916 a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe 2916 a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe 2916 a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe 2816 Synaptics.exe 2816 Synaptics.exe 2816 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2652 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2652 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2916 wrote to memory of 1992 2916 a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe 30 PID 2916 wrote to memory of 1992 2916 a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe 30 PID 2916 wrote to memory of 1992 2916 a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe 30 PID 2916 wrote to memory of 1992 2916 a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe 30 PID 2916 wrote to memory of 2816 2916 a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe 31 PID 2916 wrote to memory of 2816 2916 a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe 31 PID 2916 wrote to memory of 2816 2916 a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe 31 PID 2916 wrote to memory of 2816 2916 a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe 31 PID 2816 wrote to memory of 3044 2816 Synaptics.exe 32 PID 2816 wrote to memory of 3044 2816 Synaptics.exe 32 PID 2816 wrote to memory of 3044 2816 Synaptics.exe 32 PID 2816 wrote to memory of 3044 2816 Synaptics.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe"C:\Users\Admin\AppData\Local\Temp\a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\._cache_a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe"C:\Users\Admin\AppData\Local\Temp\._cache_a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe"2⤵
- Executes dropped EXE
PID:1992
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:3044
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5892455f16d36f0f80b04671ec11a04e8
SHA114d2dcbcd7917514900e30fa077df036aa41b1ce
SHA256a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802
SHA51294a96cf6ac180b66af105ece9b75cd2ee5a6c9bfba67fe4b9b7d41d97e54bb36c9d286e260a206199a525c851d33a3db722f2be100d68ede1c95222dc8a74424
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
\Users\Admin\AppData\Local\Temp\._cache_a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe
Filesize2.9MB
MD564e7a516e313c355b14eb3bd98852711
SHA1157d81d82d5243c0a1d4dbeee17849bacdfe7d91
SHA256a5b1d25a5c5a4edb3d5bc5d7ae02ba15e97f2e536fb06bbf2d19265c2d675549
SHA51245def6f39310788d493ba0f54ec96b7cba42279cb76ff5d6845ba4b1d9a625b15d017e41eeebb12a9fa4bc085bb9636d58f9399d853e6406e77adb607b8aa1b7