Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
29-01-2025 23:41
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe
-
Size
6.6MB
-
MD5
f19be4307d4e92b4c63c10769de4fc2b
-
SHA1
fdda128bf119fd694a8f2a27bb106918b4331f57
-
SHA256
dc3191c2db33b0d07d84df6ac9cbe42b8fad690baf1cb18d9362eeaa902e4d45
-
SHA512
11411c200d24282aa8e39e7e365763b1f09706133894544f6d7ce9114c4796946a659bd89c5c14f9d7b1e76b61aaf0cd76fbe26a729dc6b1dfeb256556cdcaf3
-
SSDEEP
196608:jcvooVgSF3zajKNSPyTcvooVgSF3zajKNSPyqcvooVgSF3zajKNSPy0OrFV:iVHF3PSVHF3P7VHF3PBrFV
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 6 IoCs
pid Process 2816 ._cache_2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 2084 zmtrwm.exe 1256 Synaptics.exe 824 Synaptics.exe 684 ._cache_Synaptics.exe 2392 kkmiuy.exe -
Loads dropped DLL 11 IoCs
pid Process 2964 2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 2964 2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 2816 ._cache_2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 2816 ._cache_2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 2964 2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 2964 2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 824 Synaptics.exe 824 Synaptics.exe 824 Synaptics.exe 684 ._cache_Synaptics.exe 684 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\My App = "C:\\Users\\Admin\\AppData\\Roaming\\zmtrwm.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\My App = "C:\\Users\\Admin\\AppData\\Roaming\\kkmiuy.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3068 set thread context of 2964 3068 2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 30 PID 1256 set thread context of 824 1256 Synaptics.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zmtrwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kkmiuy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 zmtrwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz zmtrwm.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1036 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1036 EXCEL.EXE -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2964 3068 2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 30 PID 3068 wrote to memory of 2964 3068 2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 30 PID 3068 wrote to memory of 2964 3068 2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 30 PID 3068 wrote to memory of 2964 3068 2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 30 PID 3068 wrote to memory of 2964 3068 2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 30 PID 3068 wrote to memory of 2964 3068 2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 30 PID 3068 wrote to memory of 2964 3068 2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 30 PID 3068 wrote to memory of 2964 3068 2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 30 PID 3068 wrote to memory of 2964 3068 2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 30 PID 3068 wrote to memory of 2964 3068 2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 30 PID 3068 wrote to memory of 2964 3068 2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 30 PID 3068 wrote to memory of 2964 3068 2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 30 PID 2964 wrote to memory of 2816 2964 2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 31 PID 2964 wrote to memory of 2816 2964 2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 31 PID 2964 wrote to memory of 2816 2964 2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 31 PID 2964 wrote to memory of 2816 2964 2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 31 PID 2816 wrote to memory of 2356 2816 ._cache_2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 32 PID 2816 wrote to memory of 2356 2816 ._cache_2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 32 PID 2816 wrote to memory of 2356 2816 ._cache_2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 32 PID 2816 wrote to memory of 2356 2816 ._cache_2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 32 PID 2816 wrote to memory of 2084 2816 ._cache_2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 34 PID 2816 wrote to memory of 2084 2816 ._cache_2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 34 PID 2816 wrote to memory of 2084 2816 ._cache_2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 34 PID 2816 wrote to memory of 2084 2816 ._cache_2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 34 PID 2964 wrote to memory of 1256 2964 2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 36 PID 2964 wrote to memory of 1256 2964 2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 36 PID 2964 wrote to memory of 1256 2964 2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 36 PID 2964 wrote to memory of 1256 2964 2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe 36 PID 1256 wrote to memory of 824 1256 Synaptics.exe 37 PID 1256 wrote to memory of 824 1256 Synaptics.exe 37 PID 1256 wrote to memory of 824 1256 Synaptics.exe 37 PID 1256 wrote to memory of 824 1256 Synaptics.exe 37 PID 1256 wrote to memory of 824 1256 Synaptics.exe 37 PID 1256 wrote to memory of 824 1256 Synaptics.exe 37 PID 1256 wrote to memory of 824 1256 Synaptics.exe 37 PID 1256 wrote to memory of 824 1256 Synaptics.exe 37 PID 1256 wrote to memory of 824 1256 Synaptics.exe 37 PID 1256 wrote to memory of 824 1256 Synaptics.exe 37 PID 1256 wrote to memory of 824 1256 Synaptics.exe 37 PID 1256 wrote to memory of 824 1256 Synaptics.exe 37 PID 824 wrote to memory of 684 824 Synaptics.exe 38 PID 824 wrote to memory of 684 824 Synaptics.exe 38 PID 824 wrote to memory of 684 824 Synaptics.exe 38 PID 824 wrote to memory of 684 824 Synaptics.exe 38 PID 684 wrote to memory of 924 684 ._cache_Synaptics.exe 40 PID 684 wrote to memory of 924 684 ._cache_Synaptics.exe 40 PID 684 wrote to memory of 924 684 ._cache_Synaptics.exe 40 PID 684 wrote to memory of 924 684 ._cache_Synaptics.exe 40 PID 684 wrote to memory of 2392 684 ._cache_Synaptics.exe 42 PID 684 wrote to memory of 2392 684 ._cache_Synaptics.exe 42 PID 684 wrote to memory of 2392 684 ._cache_Synaptics.exe 42 PID 684 wrote to memory of 2392 684 ._cache_Synaptics.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\._cache_2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe"C:\Users\Admin\AppData\Local\Temp\._cache_2025-01-29_f19be4307d4e92b4c63c10769de4fc2b_mafia.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "My App" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\zmtrwm.exe"4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2356
-
-
C:\Users\Admin\AppData\Roaming\zmtrwm.exe"C:\Users\Admin\AppData\Roaming\zmtrwm.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2084
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "My App" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\kkmiuy.exe"6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:924
-
-
C:\Users\Admin\AppData\Roaming\kkmiuy.exe"C:\Users\Admin\AppData\Roaming\kkmiuy.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2392
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.6MB
MD5f19be4307d4e92b4c63c10769de4fc2b
SHA1fdda128bf119fd694a8f2a27bb106918b4331f57
SHA256dc3191c2db33b0d07d84df6ac9cbe42b8fad690baf1cb18d9362eeaa902e4d45
SHA51211411c200d24282aa8e39e7e365763b1f09706133894544f6d7ce9114c4796946a659bd89c5c14f9d7b1e76b61aaf0cd76fbe26a729dc6b1dfeb256556cdcaf3
-
Filesize
371KB
MD5ec47e9ac1304201739f03f7cef8ea1bd
SHA1fb138d78af34a373a849a0f5955479bba35704e0
SHA256a859fd7e1221e91bd0e1bdee2b9f07f947fd5d679086faf36edcc2e0075de539
SHA512c12900a403e448bcda9aee54a224d0a7c53e438bbe6fd7ea683bb46746c6f63758054bb50be22ea926addea821b9390a0a1e1f47e44b32a5dba4c6b84d6f6634
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04