Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
01-02-2025 06:16
Behavioral task
behavioral1
Sample
chromedriver.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
chromedriver.exe
Resource
win10v2004-20250129-en
General
-
Target
chromedriver.exe
-
Size
12.4MB
-
MD5
bea3347c7c3091438f975697301ba879
-
SHA1
3c0ebf7bcc8f7c8e1be88f6cf9e31c869b51bd0b
-
SHA256
7aa910536ef6062c71acdf7b3b1cb7954fe94ca06c1d6a642ee25a4a02958864
-
SHA512
7d7751c0635599eb73abbf3a4b3d3a15a9ae0cd0e47119dd3b10067a9d087193dabe53bbdc65a47982aa5983a56dca6be32fb579b721ef883b4417ed5a524a62
-
SSDEEP
393216:fg/gfGhijo3hVoYYo/giRTxkS8uBb3V75rbQndRu23rR2kIiBRqGQ/VkCpuZj3Nr:vGhiGgwV75r4u239uvZoEo
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 1880 ._cache_chromedriver.exe 2344 Synaptics.exe 2864 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 1872 chromedriver.exe 1872 chromedriver.exe 1872 chromedriver.exe 2344 Synaptics.exe 2344 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" chromedriver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chromedriver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2672 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2672 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1872 wrote to memory of 1880 1872 chromedriver.exe 30 PID 1872 wrote to memory of 1880 1872 chromedriver.exe 30 PID 1872 wrote to memory of 1880 1872 chromedriver.exe 30 PID 1872 wrote to memory of 1880 1872 chromedriver.exe 30 PID 1872 wrote to memory of 2344 1872 chromedriver.exe 32 PID 1872 wrote to memory of 2344 1872 chromedriver.exe 32 PID 1872 wrote to memory of 2344 1872 chromedriver.exe 32 PID 1872 wrote to memory of 2344 1872 chromedriver.exe 32 PID 2344 wrote to memory of 2864 2344 Synaptics.exe 34 PID 2344 wrote to memory of 2864 2344 Synaptics.exe 34 PID 2344 wrote to memory of 2864 2344 Synaptics.exe 34 PID 2344 wrote to memory of 2864 2344 Synaptics.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\chromedriver.exe"C:\Users\Admin\AppData\Local\Temp\chromedriver.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\._cache_chromedriver.exe"C:\Users\Admin\AppData\Local\Temp\._cache_chromedriver.exe"2⤵
- Executes dropped EXE
PID:1880
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2864
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.4MB
MD5bea3347c7c3091438f975697301ba879
SHA13c0ebf7bcc8f7c8e1be88f6cf9e31c869b51bd0b
SHA2567aa910536ef6062c71acdf7b3b1cb7954fe94ca06c1d6a642ee25a4a02958864
SHA5127d7751c0635599eb73abbf3a4b3d3a15a9ae0cd0e47119dd3b10067a9d087193dabe53bbdc65a47982aa5983a56dca6be32fb579b721ef883b4417ed5a524a62
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
24KB
MD5be8ac060b3d935c08dbdbf20cc0801af
SHA13d629d2cca3d6ea86d5e5a331839c150e5a58701
SHA256a19e94d8f1c5b0cf3fba9c9f230871adcd0a90ecb9236a18ecf68ae83c1d9e44
SHA5123a66599e761d036aff82fd4edd7651a2a095214d7578914e778b01df737820ee570ed232d98c9f46627d6a7fe0fadbc801378e0daa06f2c272d0aa313ec1bd85
-
Filesize
11.7MB
MD57f45280701af0b75eab76f41a39cb6a8
SHA1e9c81ea041cd2187448f4e5560eafda1e229a0fd
SHA2560a80a3bb252a5ce730a384ddb71d73799bd82d89144a73da930ca296e10be67e
SHA512fd3487e8e65d5c86e06c38410d97030c47e3d8620eda36b92a60ee3234d3157989b40315e1eddfdcaae435d0f4386bdc8a97d6c2e703e25ce91319d72a07cc1e