Overview
overview
10Static
static
10Zara+Perm_...ky.exe
windows7-x64
3Zara+Perm_...ky.exe
windows10-2004-x64
4Zara+Perm_...ms.dll
windows7-x64
1Zara+Perm_...ms.dll
windows10-2004-x64
1Zara+Perm_...I2.dll
windows7-x64
1Zara+Perm_...I2.dll
windows10-2004-x64
1Zara+Perm_...ky.exe
windows7-x64
10Zara+Perm_...ky.exe
windows10-2004-x64
10Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07-02-2025 14:49
Behavioral task
behavioral1
Sample
Zara+Perm_new_fix/._cache_Lucky.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Zara+Perm_new_fix/._cache_Lucky.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
Zara+Perm_new_fix/Bunifu.UI.WinForms.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
Zara+Perm_new_fix/Bunifu.UI.WinForms.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral5
Sample
Zara+Perm_new_fix/Guna.UI2.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Zara+Perm_new_fix/Guna.UI2.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral7
Sample
Zara+Perm_new_fix/Lucky.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
Zara+Perm_new_fix/Lucky.exe
Resource
win10v2004-20250129-en
General
-
Target
Zara+Perm_new_fix/Lucky.exe
-
Size
827KB
-
MD5
bd5b0d0e0d77e04b61310bc0acc12d84
-
SHA1
219d4315e4e548a96ecf0b79d3a1e9d1c0a54c2f
-
SHA256
06b0e5ab2523ee4fc585d3464a996de274d26a802eb64b8d04cef84d088f54c6
-
SHA512
217d8877a15d11b8cb5606aeecc63fa9f99d5882abe9b6ed26900e8d530348387639a8fa428a6942f15313daafc42b4c400550b2e588a66cd157e2fde51dce59
-
SSDEEP
12288:JMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9hHV9+qSsWGj:JnsJ39LyjbJkQFMhmC+6GD9B
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
resource behavioral7/files/0x000500000001a3f8-71.dat -
Executes dropped EXE 3 IoCs
pid Process 668 ._cache_Lucky.exe 2896 Synaptics.exe 2704 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 2344 Lucky.exe 2344 Lucky.exe 2344 Lucky.exe 2896 Synaptics.exe 2896 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" Lucky.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lucky.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Lucky.exe -
Enumerates system info in registry 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS ._cache_Lucky.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer ._cache_Lucky.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion ._cache_Lucky.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2728 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2728 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2344 wrote to memory of 668 2344 Lucky.exe 29 PID 2344 wrote to memory of 668 2344 Lucky.exe 29 PID 2344 wrote to memory of 668 2344 Lucky.exe 29 PID 2344 wrote to memory of 668 2344 Lucky.exe 29 PID 2344 wrote to memory of 2896 2344 Lucky.exe 30 PID 2344 wrote to memory of 2896 2344 Lucky.exe 30 PID 2344 wrote to memory of 2896 2344 Lucky.exe 30 PID 2344 wrote to memory of 2896 2344 Lucky.exe 30 PID 2896 wrote to memory of 2704 2896 Synaptics.exe 31 PID 2896 wrote to memory of 2704 2896 Synaptics.exe 31 PID 2896 wrote to memory of 2704 2896 Synaptics.exe 31 PID 2896 wrote to memory of 2704 2896 Synaptics.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Zara+Perm_new_fix\Lucky.exe"C:\Users\Admin\AppData\Local\Temp\Zara+Perm_new_fix\Lucky.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\Zara+Perm_new_fix\._cache_Lucky.exe"C:\Users\Admin\AppData\Local\Temp\Zara+Perm_new_fix\._cache_Lucky.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:668
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\Zara+Perm_new_fix\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\Zara+Perm_new_fix\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:2704
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
827KB
MD5bd5b0d0e0d77e04b61310bc0acc12d84
SHA1219d4315e4e548a96ecf0b79d3a1e9d1c0a54c2f
SHA25606b0e5ab2523ee4fc585d3464a996de274d26a802eb64b8d04cef84d088f54c6
SHA512217d8877a15d11b8cb5606aeecc63fa9f99d5882abe9b6ed26900e8d530348387639a8fa428a6942f15313daafc42b4c400550b2e588a66cd157e2fde51dce59
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
21KB
MD5d3b7fb37201e17527986233656ec22d4
SHA1eb7043b7018c82993597f3f32e17635eb9df090d
SHA256368281a4212020f0464f57fba66413fda878eeaaf235dda1074331ec02ac84b9
SHA5129784840591588036421034323240f8da711a5e938114e19ee69a5731d68f2f41dde708ef1c63fa629b79220be7cde15ec9a5ba00c71111dc6c1136f76b230213
-
Filesize
73KB
MD5bda7e3ae3b6d42fd2ae7fc727ed53cd7
SHA16c43aad175ab5754ea0aecede688c5ae87f946ba
SHA2562c54752c7dfc19485fa1e2f5193de64a74d61bcc485ffa33df95bff2b5fd8285
SHA512b9a11e2aba64bf29452010bde4035f3b3196b32da82392f60d56c76b133ca574fdfe51d0e1ba342e5678c9e403323fb292ee51523eb1637d13a1077134036722