Analysis
-
max time kernel
119s -
max time network
106s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-02-2025 11:54
Behavioral task
behavioral1
Sample
5fa010217999b84efa71b58139b944d9cb81ba0ae4c7b50da20f5944d80ee83fN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5fa010217999b84efa71b58139b944d9cb81ba0ae4c7b50da20f5944d80ee83fN.exe
Resource
win10v2004-20250129-en
General
-
Target
5fa010217999b84efa71b58139b944d9cb81ba0ae4c7b50da20f5944d80ee83fN.exe
-
Size
765KB
-
MD5
b18ae5bac763d7e67af72fa868541e90
-
SHA1
142a884cd7c8841d79d2fd0d58d226bd1b33d1c1
-
SHA256
5fa010217999b84efa71b58139b944d9cb81ba0ae4c7b50da20f5944d80ee83f
-
SHA512
76ab77c12b99e26752924a51e42988b237c8caf6c7f3fc52f6a73397907a782c29fe62295731557e3ce15b311c0226f1fee7a6b8072b177347806b776915f40a
-
SSDEEP
12288:pMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9lgx2:pnsJ39LyjbJkQFMhmC+6GD9CE
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2736 ._cache_5fa010217999b84efa71b58139b944d9cb81ba0ae4c7b50da20f5944d80ee83fN.exe 2624 Synaptics.exe 2192 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 2900 5fa010217999b84efa71b58139b944d9cb81ba0ae4c7b50da20f5944d80ee83fN.exe 2900 5fa010217999b84efa71b58139b944d9cb81ba0ae4c7b50da20f5944d80ee83fN.exe 2900 5fa010217999b84efa71b58139b944d9cb81ba0ae4c7b50da20f5944d80ee83fN.exe 2900 5fa010217999b84efa71b58139b944d9cb81ba0ae4c7b50da20f5944d80ee83fN.exe 2624 Synaptics.exe 2624 Synaptics.exe 2624 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SS CRACK RETRIX = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 5fa010217999b84efa71b58139b944d9cb81ba0ae4c7b50da20f5944d80ee83fN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5fa010217999b84efa71b58139b944d9cb81ba0ae4c7b50da20f5944d80ee83fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2052 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2052 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2736 2900 5fa010217999b84efa71b58139b944d9cb81ba0ae4c7b50da20f5944d80ee83fN.exe 30 PID 2900 wrote to memory of 2736 2900 5fa010217999b84efa71b58139b944d9cb81ba0ae4c7b50da20f5944d80ee83fN.exe 30 PID 2900 wrote to memory of 2736 2900 5fa010217999b84efa71b58139b944d9cb81ba0ae4c7b50da20f5944d80ee83fN.exe 30 PID 2900 wrote to memory of 2736 2900 5fa010217999b84efa71b58139b944d9cb81ba0ae4c7b50da20f5944d80ee83fN.exe 30 PID 2900 wrote to memory of 2624 2900 5fa010217999b84efa71b58139b944d9cb81ba0ae4c7b50da20f5944d80ee83fN.exe 31 PID 2900 wrote to memory of 2624 2900 5fa010217999b84efa71b58139b944d9cb81ba0ae4c7b50da20f5944d80ee83fN.exe 31 PID 2900 wrote to memory of 2624 2900 5fa010217999b84efa71b58139b944d9cb81ba0ae4c7b50da20f5944d80ee83fN.exe 31 PID 2900 wrote to memory of 2624 2900 5fa010217999b84efa71b58139b944d9cb81ba0ae4c7b50da20f5944d80ee83fN.exe 31 PID 2624 wrote to memory of 2192 2624 Synaptics.exe 32 PID 2624 wrote to memory of 2192 2624 Synaptics.exe 32 PID 2624 wrote to memory of 2192 2624 Synaptics.exe 32 PID 2624 wrote to memory of 2192 2624 Synaptics.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fa010217999b84efa71b58139b944d9cb81ba0ae4c7b50da20f5944d80ee83fN.exe"C:\Users\Admin\AppData\Local\Temp\5fa010217999b84efa71b58139b944d9cb81ba0ae4c7b50da20f5944d80ee83fN.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\._cache_5fa010217999b84efa71b58139b944d9cb81ba0ae4c7b50da20f5944d80ee83fN.exe"C:\Users\Admin\AppData\Local\Temp\._cache_5fa010217999b84efa71b58139b944d9cb81ba0ae4c7b50da20f5944d80ee83fN.exe"2⤵
- Executes dropped EXE
PID:2736
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2192
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
765KB
MD5b18ae5bac763d7e67af72fa868541e90
SHA1142a884cd7c8841d79d2fd0d58d226bd1b33d1c1
SHA2565fa010217999b84efa71b58139b944d9cb81ba0ae4c7b50da20f5944d80ee83f
SHA51276ab77c12b99e26752924a51e42988b237c8caf6c7f3fc52f6a73397907a782c29fe62295731557e3ce15b311c0226f1fee7a6b8072b177347806b776915f40a
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
\Users\Admin\AppData\Local\Temp\._cache_5fa010217999b84efa71b58139b944d9cb81ba0ae4c7b50da20f5944d80ee83fN.exe
Filesize13KB
MD59f585ec40c93a39deec4bcdcefffff3c
SHA1f43a93bafa2ce8627ac72294561240612787d769
SHA256c6b60dd67f95bb2a6111425a7c9c64f03ee98a64983f648b39596ad1d9375e89
SHA51277c24b8cb3a603063c9cd7cd204318461b323d00e0c1079c6c3f9feff067810326700ad27c07581c5bc073fa4c28db30d56c7fc3902b3b7807b3080aa27cbf50