Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2025, 04:22
Behavioral task
behavioral1
Sample
a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe
Resource
win10v2004-20241007-en
General
-
Target
a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe
-
Size
3.6MB
-
MD5
892455f16d36f0f80b04671ec11a04e8
-
SHA1
14d2dcbcd7917514900e30fa077df036aa41b1ce
-
SHA256
a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802
-
SHA512
94a96cf6ac180b66af105ece9b75cd2ee5a6c9bfba67fe4b9b7d41d97e54bb36c9d286e260a206199a525c851d33a3db722f2be100d68ede1c95222dc8a74424
-
SSDEEP
98304:Qnsmtk2arfsH5cZXXrKpVCbjkM5HLRDWUkUOR:uL3H5cZXXrKpVikM5TTc
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe -
Executes dropped EXE 3 IoCs
pid Process 4624 ._cache_a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe 2504 Synaptics.exe 4772 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5060 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 5060 EXCEL.EXE 5060 EXCEL.EXE 5060 EXCEL.EXE 5060 EXCEL.EXE 5060 EXCEL.EXE 5060 EXCEL.EXE 5060 EXCEL.EXE 5060 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2160 wrote to memory of 4624 2160 a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe 82 PID 2160 wrote to memory of 4624 2160 a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe 82 PID 2160 wrote to memory of 4624 2160 a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe 82 PID 2160 wrote to memory of 2504 2160 a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe 83 PID 2160 wrote to memory of 2504 2160 a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe 83 PID 2160 wrote to memory of 2504 2160 a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe 83 PID 2504 wrote to memory of 4772 2504 Synaptics.exe 84 PID 2504 wrote to memory of 4772 2504 Synaptics.exe 84 PID 2504 wrote to memory of 4772 2504 Synaptics.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe"C:\Users\Admin\AppData\Local\Temp\a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\._cache_a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe"C:\Users\Admin\AppData\Local\Temp\._cache_a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4624
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4772
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5892455f16d36f0f80b04671ec11a04e8
SHA114d2dcbcd7917514900e30fa077df036aa41b1ce
SHA256a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802
SHA51294a96cf6ac180b66af105ece9b75cd2ee5a6c9bfba67fe4b9b7d41d97e54bb36c9d286e260a206199a525c851d33a3db722f2be100d68ede1c95222dc8a74424
-
C:\Users\Admin\AppData\Local\Temp\._cache_a5281528ad1b30aaebc5ab1e6ff768690b4f35c0279c55879f42ec06c2918802.exe
Filesize2.9MB
MD564e7a516e313c355b14eb3bd98852711
SHA1157d81d82d5243c0a1d4dbeee17849bacdfe7d91
SHA256a5b1d25a5c5a4edb3d5bc5d7ae02ba15e97f2e536fb06bbf2d19265c2d675549
SHA51245def6f39310788d493ba0f54ec96b7cba42279cb76ff5d6845ba4b1d9a625b15d017e41eeebb12a9fa4bc085bb9636d58f9399d853e6406e77adb607b8aa1b7
-
Filesize
27KB
MD5928d5ab3f787a108248083ff3bec7103
SHA1949bd6b839c6b248c55f43fcf46e44f235641e51
SHA256d33df621969e5f35f12c675b9f2422b34c3095a38ef04070493771efafdd61e9
SHA5122ab64c7237e29d81ec031906f92df5a4d7f6d02e36186c742581af036ec58cc6b70ec3740597d350c2d400b77fdb7251e3c0b16c01ab1b0ca6731187f7d8752a
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04