Analysis
-
max time kernel
110s -
max time network
106s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
01-02-2025 11:55
Behavioral task
behavioral1
Sample
f887ee2748139c260c1e4da149ac8f390555a5b5dc8f99480d294c5f9aed62eaN.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
f887ee2748139c260c1e4da149ac8f390555a5b5dc8f99480d294c5f9aed62eaN.exe
Resource
win10v2004-20250129-en
General
-
Target
f887ee2748139c260c1e4da149ac8f390555a5b5dc8f99480d294c5f9aed62eaN.exe
-
Size
761KB
-
MD5
f3eaba7fcd2a9952362af398280c4500
-
SHA1
9503d4c0d8e3f9747798c1cbb825b512c4414397
-
SHA256
f887ee2748139c260c1e4da149ac8f390555a5b5dc8f99480d294c5f9aed62ea
-
SHA512
b90ef10f3c2915f82c86e2868fbb6f9e1fe9e8cc63a4a5f1fc4ff3ca66abc5b5f7e873c9e520ecc56ac386d500498626cb7d4a65e3d579417c7304fd1dbff704
-
SSDEEP
12288:dMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9wguz:dnsJ39LyjbJkQFMhmC+6GD9pe
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 1904 ._cache_f887ee2748139c260c1e4da149ac8f390555a5b5dc8f99480d294c5f9aed62eaN.exe 2532 Synaptics.exe 1156 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 2040 f887ee2748139c260c1e4da149ac8f390555a5b5dc8f99480d294c5f9aed62eaN.exe 2040 f887ee2748139c260c1e4da149ac8f390555a5b5dc8f99480d294c5f9aed62eaN.exe 2040 f887ee2748139c260c1e4da149ac8f390555a5b5dc8f99480d294c5f9aed62eaN.exe 2532 Synaptics.exe 2532 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SS CRACK RETRIX = "C:\\ProgramData\\Synaptics\\Synaptics.exe" f887ee2748139c260c1e4da149ac8f390555a5b5dc8f99480d294c5f9aed62eaN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f887ee2748139c260c1e4da149ac8f390555a5b5dc8f99480d294c5f9aed62eaN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1308 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1308 EXCEL.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1904 2040 f887ee2748139c260c1e4da149ac8f390555a5b5dc8f99480d294c5f9aed62eaN.exe 30 PID 2040 wrote to memory of 1904 2040 f887ee2748139c260c1e4da149ac8f390555a5b5dc8f99480d294c5f9aed62eaN.exe 30 PID 2040 wrote to memory of 1904 2040 f887ee2748139c260c1e4da149ac8f390555a5b5dc8f99480d294c5f9aed62eaN.exe 30 PID 2040 wrote to memory of 1904 2040 f887ee2748139c260c1e4da149ac8f390555a5b5dc8f99480d294c5f9aed62eaN.exe 30 PID 2040 wrote to memory of 2532 2040 f887ee2748139c260c1e4da149ac8f390555a5b5dc8f99480d294c5f9aed62eaN.exe 32 PID 2040 wrote to memory of 2532 2040 f887ee2748139c260c1e4da149ac8f390555a5b5dc8f99480d294c5f9aed62eaN.exe 32 PID 2040 wrote to memory of 2532 2040 f887ee2748139c260c1e4da149ac8f390555a5b5dc8f99480d294c5f9aed62eaN.exe 32 PID 2040 wrote to memory of 2532 2040 f887ee2748139c260c1e4da149ac8f390555a5b5dc8f99480d294c5f9aed62eaN.exe 32 PID 2532 wrote to memory of 1156 2532 Synaptics.exe 33 PID 2532 wrote to memory of 1156 2532 Synaptics.exe 33 PID 2532 wrote to memory of 1156 2532 Synaptics.exe 33 PID 2532 wrote to memory of 1156 2532 Synaptics.exe 33 PID 1156 wrote to memory of 2728 1156 ._cache_Synaptics.exe 35 PID 1156 wrote to memory of 2728 1156 ._cache_Synaptics.exe 35 PID 1156 wrote to memory of 2728 1156 ._cache_Synaptics.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\f887ee2748139c260c1e4da149ac8f390555a5b5dc8f99480d294c5f9aed62eaN.exe"C:\Users\Admin\AppData\Local\Temp\f887ee2748139c260c1e4da149ac8f390555a5b5dc8f99480d294c5f9aed62eaN.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\._cache_f887ee2748139c260c1e4da149ac8f390555a5b5dc8f99480d294c5f9aed62eaN.exe"C:\Users\Admin\AppData\Local\Temp\._cache_f887ee2748139c260c1e4da149ac8f390555a5b5dc8f99480d294c5f9aed62eaN.exe"2⤵
- Executes dropped EXE
PID:1904
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1156 -s 5204⤵PID:2728
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
761KB
MD5f3eaba7fcd2a9952362af398280c4500
SHA19503d4c0d8e3f9747798c1cbb825b512c4414397
SHA256f887ee2748139c260c1e4da149ac8f390555a5b5dc8f99480d294c5f9aed62ea
SHA512b90ef10f3c2915f82c86e2868fbb6f9e1fe9e8cc63a4a5f1fc4ff3ca66abc5b5f7e873c9e520ecc56ac386d500498626cb7d4a65e3d579417c7304fd1dbff704
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
24KB
MD595997bd94d98fac053b974e7cdd2d9d0
SHA1159b7a533077978d8d0eae5e5f3a8d64715d76c6
SHA2564918489ac5f788051a34ab7f37bd04d36906dbc8817b59644510591a0f21ae8e
SHA512892e4d7728536777d65bff906415df61aafe5142080ff0cdec8a3d7bd91faa0259b0a70a686209d873e2b21621220f938b3bb1f884981ab9f1792734a22a953a
-
\Users\Admin\AppData\Local\Temp\._cache_f887ee2748139c260c1e4da149ac8f390555a5b5dc8f99480d294c5f9aed62eaN.exe
Filesize10KB
MD5b684686b29e80ca33f72dfc8d6e12fa4
SHA191e932e5a953c056082842baf8ffd6a4df863e65
SHA2562de6ad881cbd8f0e32a83817f3365e0d88a026541842e2d8abb0ea011e1f3f48
SHA512ee84216a8641758223bbead9f9511d8ccf9b9491a9d0fb9a54df779c2b56f896e588075e76a9af2f1be54e4a124a35d64c5e7838bbf46b70dd093054c1ca1ff7