Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
07-02-2025 01:03
Behavioral task
behavioral1
Sample
6d4103ecfcc1f55bb259d078f0d6c22741b941b8679d4f6e8844365402a11baf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6d4103ecfcc1f55bb259d078f0d6c22741b941b8679d4f6e8844365402a11baf.exe
Resource
win10v2004-20250129-en
General
-
Target
6d4103ecfcc1f55bb259d078f0d6c22741b941b8679d4f6e8844365402a11baf.exe
-
Size
1.6MB
-
MD5
08b22264a39ddc1c5762805d0baf147a
-
SHA1
0df9f801e92feadbf621341d91d30c3fc043f82c
-
SHA256
6d4103ecfcc1f55bb259d078f0d6c22741b941b8679d4f6e8844365402a11baf
-
SHA512
9d460c296eabf1ae66375f5b4049e65fdc0cde0f0b64ed188bceae6d2e1067eec9eb1c0e8492d43a3d1004fc0ccd6fc7b75d163c454a5c343149d28163728137
-
SSDEEP
24576:GnsJ39LyjbJkQFMhmC+6GD9fP0tJBTKWTd7AUPg3XvO58k10LnVDMiq:GnsHyjtk2MYC5GDCBd/10LVQiq
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation 6d4103ecfcc1f55bb259d078f0d6c22741b941b8679d4f6e8844365402a11baf.exe Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 1696 ._cache_6d4103ecfcc1f55bb259d078f0d6c22741b941b8679d4f6e8844365402a11baf.exe 4876 Synaptics.exe 4036 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 6d4103ecfcc1f55bb259d078f0d6c22741b941b8679d4f6e8844365402a11baf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6d4103ecfcc1f55bb259d078f0d6c22741b941b8679d4f6e8844365402a11baf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_6d4103ecfcc1f55bb259d078f0d6c22741b941b8679d4f6e8844365402a11baf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 6d4103ecfcc1f55bb259d078f0d6c22741b941b8679d4f6e8844365402a11baf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2348 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 1696 ._cache_6d4103ecfcc1f55bb259d078f0d6c22741b941b8679d4f6e8844365402a11baf.exe 1696 ._cache_6d4103ecfcc1f55bb259d078f0d6c22741b941b8679d4f6e8844365402a11baf.exe 4036 ._cache_Synaptics.exe 2348 EXCEL.EXE 2348 EXCEL.EXE 2348 EXCEL.EXE 2348 EXCEL.EXE 2348 EXCEL.EXE 2348 EXCEL.EXE 2348 EXCEL.EXE 2348 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3468 wrote to memory of 1696 3468 6d4103ecfcc1f55bb259d078f0d6c22741b941b8679d4f6e8844365402a11baf.exe 87 PID 3468 wrote to memory of 1696 3468 6d4103ecfcc1f55bb259d078f0d6c22741b941b8679d4f6e8844365402a11baf.exe 87 PID 3468 wrote to memory of 1696 3468 6d4103ecfcc1f55bb259d078f0d6c22741b941b8679d4f6e8844365402a11baf.exe 87 PID 3468 wrote to memory of 4876 3468 6d4103ecfcc1f55bb259d078f0d6c22741b941b8679d4f6e8844365402a11baf.exe 88 PID 3468 wrote to memory of 4876 3468 6d4103ecfcc1f55bb259d078f0d6c22741b941b8679d4f6e8844365402a11baf.exe 88 PID 3468 wrote to memory of 4876 3468 6d4103ecfcc1f55bb259d078f0d6c22741b941b8679d4f6e8844365402a11baf.exe 88 PID 4876 wrote to memory of 4036 4876 Synaptics.exe 89 PID 4876 wrote to memory of 4036 4876 Synaptics.exe 89 PID 4876 wrote to memory of 4036 4876 Synaptics.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d4103ecfcc1f55bb259d078f0d6c22741b941b8679d4f6e8844365402a11baf.exe"C:\Users\Admin\AppData\Local\Temp\6d4103ecfcc1f55bb259d078f0d6c22741b941b8679d4f6e8844365402a11baf.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\._cache_6d4103ecfcc1f55bb259d078f0d6c22741b941b8679d4f6e8844365402a11baf.exe"C:\Users\Admin\AppData\Local\Temp\._cache_6d4103ecfcc1f55bb259d078f0d6c22741b941b8679d4f6e8844365402a11baf.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1696
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4036
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD508b22264a39ddc1c5762805d0baf147a
SHA10df9f801e92feadbf621341d91d30c3fc043f82c
SHA2566d4103ecfcc1f55bb259d078f0d6c22741b941b8679d4f6e8844365402a11baf
SHA5129d460c296eabf1ae66375f5b4049e65fdc0cde0f0b64ed188bceae6d2e1067eec9eb1c0e8492d43a3d1004fc0ccd6fc7b75d163c454a5c343149d28163728137
-
C:\Users\Admin\AppData\Local\Temp\._cache_6d4103ecfcc1f55bb259d078f0d6c22741b941b8679d4f6e8844365402a11baf.exe
Filesize896KB
MD53a481cc1c9ada110e0101bb0c6570740
SHA1e1ce2ab9d5c0754b871349823fed13ce0fefd911
SHA256eb8cb9f1e55832cfe8c7feaf310650bd9ca2663c7ef96efb19d04a52efd78c0a
SHA512bb81a91e46e4f45000da29918b62c1243d61be8788023075f5d11a15edb1b9c2e8c93cb64da5218fb713b7370e46ba4b1e3f9b658a1ec65f1c0bfebca6203c9e
-
Filesize
25KB
MD51bdac108fead0f09cbd12c629b239fe5
SHA1798685b212e202ce264ba4f160c6fdf5f87d0001
SHA2560c857ac5c0d8e8aa48d7b739cb4aadb23e8c9d815f38ba1e12afdb14d4945bcf
SHA51250c85b570f908c32a69950a8ca4f9252622b9ae04d6c9e67235e6a5779ae22eacf88523f5ddd5a7c551737d46402d5a881005d7ee1ec6d32324193a0b186eb05
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04