Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-02-2025 12:55
Behavioral task
behavioral1
Sample
b3f80a73013fb8e1ecf3aad0023ef23d0628f59cfa1f5e0fa807efbd05861699.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b3f80a73013fb8e1ecf3aad0023ef23d0628f59cfa1f5e0fa807efbd05861699.exe
Resource
win10v2004-20250129-en
General
-
Target
b3f80a73013fb8e1ecf3aad0023ef23d0628f59cfa1f5e0fa807efbd05861699.exe
-
Size
756KB
-
MD5
0bbc7e44176167427c43830894444e3d
-
SHA1
894c2a253c02928831887149bbb9fffb58b6c69a
-
SHA256
b3f80a73013fb8e1ecf3aad0023ef23d0628f59cfa1f5e0fa807efbd05861699
-
SHA512
7e93bb71ce41f101943cc1fd6dfee41f261dc197279ba0fbec1a0364c6c0cf2e51c180aa2080f75bb738d0626f0723516613f4e2c5c13081e0cc1a6ae52d00d7
-
SSDEEP
12288:NMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V98g0p:NnsJ39LyjbJkQFMhmC+6GD9lo
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2940 ._cache_b3f80a73013fb8e1ecf3aad0023ef23d0628f59cfa1f5e0fa807efbd05861699.exe 2676 Synaptics.exe 2548 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 2136 b3f80a73013fb8e1ecf3aad0023ef23d0628f59cfa1f5e0fa807efbd05861699.exe 2136 b3f80a73013fb8e1ecf3aad0023ef23d0628f59cfa1f5e0fa807efbd05861699.exe 2136 b3f80a73013fb8e1ecf3aad0023ef23d0628f59cfa1f5e0fa807efbd05861699.exe 2136 b3f80a73013fb8e1ecf3aad0023ef23d0628f59cfa1f5e0fa807efbd05861699.exe 2676 Synaptics.exe 2676 Synaptics.exe 2676 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SS CRACK RETRIX = "C:\\ProgramData\\Synaptics\\Synaptics.exe" b3f80a73013fb8e1ecf3aad0023ef23d0628f59cfa1f5e0fa807efbd05861699.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3f80a73013fb8e1ecf3aad0023ef23d0628f59cfa1f5e0fa807efbd05861699.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2784 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2784 EXCEL.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2940 2136 b3f80a73013fb8e1ecf3aad0023ef23d0628f59cfa1f5e0fa807efbd05861699.exe 31 PID 2136 wrote to memory of 2940 2136 b3f80a73013fb8e1ecf3aad0023ef23d0628f59cfa1f5e0fa807efbd05861699.exe 31 PID 2136 wrote to memory of 2940 2136 b3f80a73013fb8e1ecf3aad0023ef23d0628f59cfa1f5e0fa807efbd05861699.exe 31 PID 2136 wrote to memory of 2940 2136 b3f80a73013fb8e1ecf3aad0023ef23d0628f59cfa1f5e0fa807efbd05861699.exe 31 PID 2136 wrote to memory of 2676 2136 b3f80a73013fb8e1ecf3aad0023ef23d0628f59cfa1f5e0fa807efbd05861699.exe 33 PID 2136 wrote to memory of 2676 2136 b3f80a73013fb8e1ecf3aad0023ef23d0628f59cfa1f5e0fa807efbd05861699.exe 33 PID 2136 wrote to memory of 2676 2136 b3f80a73013fb8e1ecf3aad0023ef23d0628f59cfa1f5e0fa807efbd05861699.exe 33 PID 2136 wrote to memory of 2676 2136 b3f80a73013fb8e1ecf3aad0023ef23d0628f59cfa1f5e0fa807efbd05861699.exe 33 PID 2940 wrote to memory of 2700 2940 ._cache_b3f80a73013fb8e1ecf3aad0023ef23d0628f59cfa1f5e0fa807efbd05861699.exe 34 PID 2940 wrote to memory of 2700 2940 ._cache_b3f80a73013fb8e1ecf3aad0023ef23d0628f59cfa1f5e0fa807efbd05861699.exe 34 PID 2940 wrote to memory of 2700 2940 ._cache_b3f80a73013fb8e1ecf3aad0023ef23d0628f59cfa1f5e0fa807efbd05861699.exe 34 PID 2676 wrote to memory of 2548 2676 Synaptics.exe 35 PID 2676 wrote to memory of 2548 2676 Synaptics.exe 35 PID 2676 wrote to memory of 2548 2676 Synaptics.exe 35 PID 2676 wrote to memory of 2548 2676 Synaptics.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3f80a73013fb8e1ecf3aad0023ef23d0628f59cfa1f5e0fa807efbd05861699.exe"C:\Users\Admin\AppData\Local\Temp\b3f80a73013fb8e1ecf3aad0023ef23d0628f59cfa1f5e0fa807efbd05861699.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\._cache_b3f80a73013fb8e1ecf3aad0023ef23d0628f59cfa1f5e0fa807efbd05861699.exe"C:\Users\Admin\AppData\Local\Temp\._cache_b3f80a73013fb8e1ecf3aad0023ef23d0628f59cfa1f5e0fa807efbd05861699.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2940 -s 5643⤵PID:2700
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2548
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
756KB
MD50bbc7e44176167427c43830894444e3d
SHA1894c2a253c02928831887149bbb9fffb58b6c69a
SHA256b3f80a73013fb8e1ecf3aad0023ef23d0628f59cfa1f5e0fa807efbd05861699
SHA5127e93bb71ce41f101943cc1fd6dfee41f261dc197279ba0fbec1a0364c6c0cf2e51c180aa2080f75bb738d0626f0723516613f4e2c5c13081e0cc1a6ae52d00d7
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
\Users\Admin\AppData\Local\Temp\._cache_b3f80a73013fb8e1ecf3aad0023ef23d0628f59cfa1f5e0fa807efbd05861699.exe
Filesize5KB
MD52820ec99c7ed6d29f68e08381fc65fa6
SHA18c0d1d9942425b4ca511cafd4b510779e1f86fd5
SHA256d2865ffd831dd4cec42b6c8f54e437512b38edaf1d5c75e8b4a80b82d3c3f906
SHA512cab7a52416d4336ea8fa6ee5f6d65b579c4c383dc1754e17c9a79468098c9189d3c55f7cef9d0e225449746568c5249c93ef8205d62a095978252db294315cb4