Overview
overview
10Static
static
10Zara+Perm_...ky.exe
windows7-x64
3Zara+Perm_...ky.exe
windows10-2004-x64
4Zara+Perm_...ms.dll
windows7-x64
1Zara+Perm_...ms.dll
windows10-2004-x64
1Zara+Perm_...I2.dll
windows7-x64
1Zara+Perm_...I2.dll
windows10-2004-x64
1Zara+Perm_...ky.exe
windows7-x64
10Zara+Perm_...ky.exe
windows10-2004-x64
10Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
07-02-2025 14:49
Behavioral task
behavioral1
Sample
Zara+Perm_new_fix/._cache_Lucky.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Zara+Perm_new_fix/._cache_Lucky.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
Zara+Perm_new_fix/Bunifu.UI.WinForms.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
Zara+Perm_new_fix/Bunifu.UI.WinForms.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral5
Sample
Zara+Perm_new_fix/Guna.UI2.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Zara+Perm_new_fix/Guna.UI2.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral7
Sample
Zara+Perm_new_fix/Lucky.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
Zara+Perm_new_fix/Lucky.exe
Resource
win10v2004-20250129-en
General
-
Target
Zara+Perm_new_fix/Lucky.exe
-
Size
827KB
-
MD5
bd5b0d0e0d77e04b61310bc0acc12d84
-
SHA1
219d4315e4e548a96ecf0b79d3a1e9d1c0a54c2f
-
SHA256
06b0e5ab2523ee4fc585d3464a996de274d26a802eb64b8d04cef84d088f54c6
-
SHA512
217d8877a15d11b8cb5606aeecc63fa9f99d5882abe9b6ed26900e8d530348387639a8fa428a6942f15313daafc42b4c400550b2e588a66cd157e2fde51dce59
-
SSDEEP
12288:JMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9hHV9+qSsWGj:JnsJ39LyjbJkQFMhmC+6GD9B
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4174397412-4125106315-2776226590-1000\Control Panel\International\Geo\Nation Lucky.exe Key value queried \REGISTRY\USER\S-1-5-21-4174397412-4125106315-2776226590-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 2764 ._cache_Lucky.exe 968 Synaptics.exe 2240 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" Lucky.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lucky.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Lucky.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer ._cache_Lucky.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion ._cache_Lucky.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS ._cache_Lucky.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Lucky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1880 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1880 EXCEL.EXE 1880 EXCEL.EXE 1880 EXCEL.EXE 1880 EXCEL.EXE 1880 EXCEL.EXE 1880 EXCEL.EXE 1880 EXCEL.EXE 1880 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1884 wrote to memory of 2764 1884 Lucky.exe 85 PID 1884 wrote to memory of 2764 1884 Lucky.exe 85 PID 1884 wrote to memory of 2764 1884 Lucky.exe 85 PID 1884 wrote to memory of 968 1884 Lucky.exe 86 PID 1884 wrote to memory of 968 1884 Lucky.exe 86 PID 1884 wrote to memory of 968 1884 Lucky.exe 86 PID 968 wrote to memory of 2240 968 Synaptics.exe 87 PID 968 wrote to memory of 2240 968 Synaptics.exe 87 PID 968 wrote to memory of 2240 968 Synaptics.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\Zara+Perm_new_fix\Lucky.exe"C:\Users\Admin\AppData\Local\Temp\Zara+Perm_new_fix\Lucky.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\Zara+Perm_new_fix\._cache_Lucky.exe"C:\Users\Admin\AppData\Local\Temp\Zara+Perm_new_fix\._cache_Lucky.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:2764
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Local\Temp\Zara+Perm_new_fix\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\Zara+Perm_new_fix\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:2240
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
827KB
MD5bd5b0d0e0d77e04b61310bc0acc12d84
SHA1219d4315e4e548a96ecf0b79d3a1e9d1c0a54c2f
SHA25606b0e5ab2523ee4fc585d3464a996de274d26a802eb64b8d04cef84d088f54c6
SHA512217d8877a15d11b8cb5606aeecc63fa9f99d5882abe9b6ed26900e8d530348387639a8fa428a6942f15313daafc42b4c400550b2e588a66cd157e2fde51dce59
-
Filesize
25KB
MD5488bf45a5d85ef73e315a00b1c96b5aa
SHA178f1f0dcfbd4cffa3d06ba6c759674d81100aaac
SHA256bce88be0f8b603c4045f864d9ffe48ea1251c1c7fcd7ee4377f700c45dbe3cf1
SHA5128ae73789e046573d31c8bb7774af05f1f8039d4b9c2e5c1da75f8c04300c9c699b0ba93f512513e3a1802aa7bb51f4cdbd133de022d345d7fa72cfde907019db
-
Filesize
73KB
MD5bda7e3ae3b6d42fd2ae7fc727ed53cd7
SHA16c43aad175ab5754ea0aecede688c5ae87f946ba
SHA2562c54752c7dfc19485fa1e2f5193de64a74d61bcc485ffa33df95bff2b5fd8285
SHA512b9a11e2aba64bf29452010bde4035f3b3196b32da82392f60d56c76b133ca574fdfe51d0e1ba342e5678c9e403323fb292ee51523eb1637d13a1077134036722
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04