Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-02-2025 05:55
Behavioral task
behavioral1
Sample
Synaptics.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Synaptics.exe
Resource
win10v2004-20250211-en
General
-
Target
Synaptics.exe
-
Size
744KB
-
MD5
9fced1c3eab7b34e214925e885a25bb8
-
SHA1
e6daaf0725df45794e1e8e654420ac2ea995694b
-
SHA256
1e9ca01052b0b4acbc82b71eb7ce1445e7356eeb9404d529a6c1b47b181274f6
-
SHA512
d92f06c78123709755108e3907a2e3f59f204135eb50a1c5f9929373099b5a008c8b5d16b26e506dd143fdf9a7b2caeea46aa81b630b1e743558cb8cdef3e47b
-
SSDEEP
12288:vMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9QU:vnsJ39LyjbJkQFMhmC+6GD93
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 1 IoCs
pid Process 2100 Synaptics.exe -
Loads dropped DLL 2 IoCs
pid Process 1832 Synaptics.exe 1832 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\????? = "C:\\ProgramData\\Synaptics\\Synaptics.exe" Synaptics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2700 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2700 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1832 wrote to memory of 2100 1832 Synaptics.exe 31 PID 1832 wrote to memory of 2100 1832 Synaptics.exe 31 PID 1832 wrote to memory of 2100 1832 Synaptics.exe 31 PID 1832 wrote to memory of 2100 1832 Synaptics.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\Synaptics.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2100
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
744KB
MD59fced1c3eab7b34e214925e885a25bb8
SHA1e6daaf0725df45794e1e8e654420ac2ea995694b
SHA2561e9ca01052b0b4acbc82b71eb7ce1445e7356eeb9404d529a6c1b47b181274f6
SHA512d92f06c78123709755108e3907a2e3f59f204135eb50a1c5f9929373099b5a008c8b5d16b26e506dd143fdf9a7b2caeea46aa81b630b1e743558cb8cdef3e47b
-
Filesize
23KB
MD5322e0ca5a9674514e0baa04d30851ee1
SHA1f1d50ade6e3c5a9bc14b0c660741d160818ce8c7
SHA2564527cff90d342e0e7a2728d59ce728084483378269144effe147e3f593f62316
SHA512c9cb62e900b5fa26bc1512a06de088fc796098f1fb01fb4f8f062d04a472e1bb2b27d49acb155dd49c5e18df4f134ca3f8aa80eb03c933b128097cf71b5c7fe4
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
26KB
MD587758a2be9825f19ae66c7ec86a93389
SHA10218f2aa290f2b75ee05bbf3e9be05fcf480a9b2
SHA2564d634ec766e2666d33d2fd27b26261c46ad3a7de44d7690d53a9025274ed8d84
SHA51221c522bb1458aeb7b2efa56c389e9a84a320e52b7f8d44d12a694d8966d8110908bf122342f3ddd8139d377c82d603b1cdb137a4e45b142941e7248c7cbeb2d8
-
Filesize
28KB
MD552c1a42cebb0154fded04a4bbf17a7a5
SHA112542c487890b828ba7b67d5f7e0591d09fd0960
SHA256756b273db6e518817f2c0cbdf27e5f7b92d34d091cde31a877aa2ac2dd46f14e
SHA5121d895b37b3d3d1e1681c50756b2fc5f08298b0d2e52360b8dbcf4592e9a644d7e2162ce2721e85de83dcc82bef57e88c3021bd47eb76ecb1a5ff08e422965eeb
-
Filesize
26KB
MD5bdcb47bed0699ca2c9e33c268af638f9
SHA1f48e448e1185dd96c6559053e9d7a1134cde1d7e
SHA2562fc698cd3122b297baecf621122493a86b49d3ed57a588ebf8dabd6b307a36ff
SHA5129e522f650034dad90603dd9bb3f6adbfa3667f668f4e0774ee5a1a47e00c68f870ac7ca9aac14c5e7e24c3f6ba2ec85caa7c03839affc80850a059077a980a1a
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882