Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
04-02-2025 02:27
Behavioral task
behavioral1
Sample
9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe
Resource
win10v2004-20250129-en
General
-
Target
9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe
-
Size
900KB
-
MD5
e982f4be3294ca33f1be17c659c262d5
-
SHA1
5df5f09fc62adadec4ef6331f6466134027779c6
-
SHA256
9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68
-
SHA512
3aaa7f11b4972ccaec5f4f0cd23173e240649d78c16eb38b5540c5dbcc2d4dbd1fde0e115103cdecef7def7baebb9fd3185355dfd0aecdd5683490eda526e5de
-
SSDEEP
12288:8MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9jBFUNDaSx:8nsJ39LyjbJkQFMhmC+6GD9VFOa4
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
resource behavioral1/files/0x0007000000016d3a-104.dat behavioral1/files/0x0007000000016d43-117.dat behavioral1/files/0x0009000000016d3a-128.dat -
Executes dropped EXE 5 IoCs
pid Process 2608 ._cache_9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 2876 Synaptics.exe 2828 ._cache_9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 2796 ._cache_Synaptics.exe 2724 ._cache_synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 2016 9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 2016 9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 2016 9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 2608 ._cache_9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 2876 Synaptics.exe 2876 Synaptics.exe 2796 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe ._cache_Synaptics.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe ._cache_9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2824 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2608 ._cache_9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 2608 ._cache_9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 2608 ._cache_9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 2608 ._cache_9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 2608 ._cache_9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 2608 ._cache_9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 2608 ._cache_9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 2608 ._cache_9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 2608 ._cache_9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 2608 ._cache_9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 2608 ._cache_9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 2608 ._cache_9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 2608 ._cache_9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 2608 ._cache_9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 2608 ._cache_9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 2608 ._cache_9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 2796 ._cache_Synaptics.exe 2796 ._cache_Synaptics.exe 2796 ._cache_Synaptics.exe 2796 ._cache_Synaptics.exe 2796 ._cache_Synaptics.exe 2796 ._cache_Synaptics.exe 2796 ._cache_Synaptics.exe 2796 ._cache_Synaptics.exe 2796 ._cache_Synaptics.exe 2796 ._cache_Synaptics.exe 2796 ._cache_Synaptics.exe 2796 ._cache_Synaptics.exe 2796 ._cache_Synaptics.exe 2796 ._cache_Synaptics.exe 2796 ._cache_Synaptics.exe 2796 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2608 ._cache_9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 2608 ._cache_9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 2796 ._cache_Synaptics.exe 2796 ._cache_Synaptics.exe 2824 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2608 2016 9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 30 PID 2016 wrote to memory of 2608 2016 9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 30 PID 2016 wrote to memory of 2608 2016 9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 30 PID 2016 wrote to memory of 2608 2016 9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 30 PID 2016 wrote to memory of 2876 2016 9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 31 PID 2016 wrote to memory of 2876 2016 9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 31 PID 2016 wrote to memory of 2876 2016 9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 31 PID 2016 wrote to memory of 2876 2016 9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 31 PID 2608 wrote to memory of 2828 2608 ._cache_9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 32 PID 2608 wrote to memory of 2828 2608 ._cache_9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 32 PID 2608 wrote to memory of 2828 2608 ._cache_9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 32 PID 2608 wrote to memory of 2828 2608 ._cache_9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe 32 PID 2876 wrote to memory of 2796 2876 Synaptics.exe 33 PID 2876 wrote to memory of 2796 2876 Synaptics.exe 33 PID 2876 wrote to memory of 2796 2876 Synaptics.exe 33 PID 2876 wrote to memory of 2796 2876 Synaptics.exe 33 PID 2796 wrote to memory of 2724 2796 ._cache_Synaptics.exe 35 PID 2796 wrote to memory of 2724 2796 ._cache_Synaptics.exe 35 PID 2796 wrote to memory of 2724 2796 ._cache_Synaptics.exe 35 PID 2796 wrote to memory of 2724 2796 ._cache_Synaptics.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe"C:\Users\Admin\AppData\Local\Temp\9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\._cache_9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe"C:\Users\Admin\AppData\Local\Temp\._cache_9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
\??\c:\users\admin\appdata\local\temp\._cache_9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exec:\users\admin\appdata\local\temp\._cache_9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe3⤵
- Executes dropped EXE
PID:2828
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2796 -
\??\c:\users\admin\appdata\local\temp\._cache_synaptics.exec:\users\admin\appdata\local\temp\._cache_synaptics.exe InjUpdate4⤵
- Executes dropped EXE
PID:2724
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
900KB
MD5e982f4be3294ca33f1be17c659c262d5
SHA15df5f09fc62adadec4ef6331f6466134027779c6
SHA2569415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68
SHA5123aaa7f11b4972ccaec5f4f0cd23173e240649d78c16eb38b5540c5dbcc2d4dbd1fde0e115103cdecef7def7baebb9fd3185355dfd0aecdd5683490eda526e5de
-
C:\Users\Admin\AppData\Local\Temp\._cache_9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe
Filesize147KB
MD55709f37da09ff8cfe06b91a8d369fa21
SHA154d55606b527252b1852277fb2766a1d8503fb96
SHA2562c0de1143a89a879eb1ae1f3b4030af453cc017c3f298c52376f9615f29214eb
SHA5127ef5505e89c62188a61713054da153c84ff613ed8d3a4c28529195c2ac624d993b5fdfb957da119adaac8ee9d28088b89911756e1cae18c5525442a36db1165a
-
Filesize
23KB
MD5b597669dab8ea538e9e19f0cbf48fb95
SHA1b15f226706e244a709caaeba2138c5bca0a148d7
SHA2565f05cb5b10aa786bee3aa53f8548690185c9db8fd7086543a4a828ed8c5ecf5f
SHA5125dc3a7734235400883226131c3f7bbb12583c1367d4b02c71f2bbf315abab796e79ac963bc86367e2e9e5081bf58b4785de614ec90e8f15edcc326615401c8ed
-
Filesize
30KB
MD5b22f2944fcf3c55f67ba85acd1df3a6b
SHA1c8a5252a5e628b41f77d57aa4130d58619ba3dbf
SHA256cc0a690c77e39d958d0d34cc87076f670b2e1a3f71cc56d23975b415ec01073a
SHA512f8aadc307622c0546339c5c3f110d0ed922bed3692154cf393e3f457897f67725a68149b4032007908221f57bf6e7f4bf67e8cad84cb29e21b56368f453db5fe
-
Filesize
29KB
MD500d0d94c375280434fabacdfe4a3c631
SHA19782e5c5d71a6661482fcd4024965b5f32a3b127
SHA256447ffd9ccb22c3ad772f3dc70144e9b949a30fb09b5a30c0396a15b5a469b95d
SHA512de81ed7e31d57a6870046c7538e573fe1137602fe6feeb42483e832c5cd1f42fda9e7c9746da021ff0d5cab249a2f5530f3d6b20659d7927c7715077451914c8
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
27KB
MD5ea270a89429038a77175d34acc312888
SHA10c00ec5cb30c23d2de8378c3eb6b82b188f4f147
SHA2563862fb460a8c2539aaedd52c09e176fb4ce17d963b08e371945a4e68aca55104
SHA512eb24af1cbb52a2e424bfdc0b287ba5b7652cf61bcb2c0d7b7222c631f889d524eb4f7a2892c326886d055aa33175120cdb11a2e7b26db36ce851decaa60d4b29
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
Filesize
135KB
MD58c8444fbeb7cd8aed2edb25013aeb201
SHA146c9055fbee194cb16b3d492da0079c5097f1ff9
SHA2569ac2a97cb7e857535d3950de4e9baf774405359fd92438c7c0e5184e47a3e6e1
SHA5121f5f5515659bdd5f8181603275df96b8b6ab5c1578b50bf656274625bc1cbb2de9d49601a9e87af0bb2723615a942eaf16edb15140ee188c31ead505f1ab6fec
-
\Users\Admin\AppData\Local\Temp\._cache_9415d6f9d3f5e8b108523a3db1131b793777b2cd03b65d47d6f5c0d1ede65b68.exe
Filesize12KB
MD5868decf198eac73b07cc29551c737763
SHA1de1c7291eabfdda5a0a085424a9c0127db94093e
SHA256a98a9bd6ce8e4a1309d8d1594bc60f6d84ff69d0803091ee95519c0a6622570d
SHA51295bed54e6652a2fa29576bd9b3453c9518ec003e5a327fecd8044062e5110afac58aafb3cbeece7c3f930e3ef2fb597c2e94e3ea8a11a2aeec0063a362edab4d