Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2025 06:35
Behavioral task
behavioral1
Sample
5a896766ca8630c91c7ef74cfc31cdbd83bfb98c21f4067680fb15560c79508c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5a896766ca8630c91c7ef74cfc31cdbd83bfb98c21f4067680fb15560c79508c.exe
Resource
win10v2004-20250207-en
General
-
Target
5a896766ca8630c91c7ef74cfc31cdbd83bfb98c21f4067680fb15560c79508c.exe
-
Size
1.4MB
-
MD5
67746c23970d5003c393802ed27b6c07
-
SHA1
a26bf0b9cedbb55de4bb8a3ca4bb94b7062f8e2e
-
SHA256
5a896766ca8630c91c7ef74cfc31cdbd83bfb98c21f4067680fb15560c79508c
-
SHA512
4c423ca7a4f0ca9cdf2799b7e1b2fa9a2c11fddea2647e8eefd411ba1c92508c8a7622d2f980712ba9841446ada4b95054e0a02484a2d730171d7e469b1ff535
-
SSDEEP
12288:PMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9vE1Bufa:PnsJ39LyjbJkQFMhmC+6GD9s1Buf
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 65 4812 Process not Found -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\Control Panel\International\Geo\Nation 5a896766ca8630c91c7ef74cfc31cdbd83bfb98c21f4067680fb15560c79508c.exe Key value queried \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 404 ._cache_5a896766ca8630c91c7ef74cfc31cdbd83bfb98c21f4067680fb15560c79508c.exe 2076 Synaptics.exe 3552 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 5a896766ca8630c91c7ef74cfc31cdbd83bfb98c21f4067680fb15560c79508c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a896766ca8630c91c7ef74cfc31cdbd83bfb98c21f4067680fb15560c79508c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_5a896766ca8630c91c7ef74cfc31cdbd83bfb98c21f4067680fb15560c79508c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3228 MicrosoftEdgeUpdate.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 5a896766ca8630c91c7ef74cfc31cdbd83bfb98c21f4067680fb15560c79508c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 972 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 972 EXCEL.EXE 972 EXCEL.EXE 972 EXCEL.EXE 972 EXCEL.EXE 972 EXCEL.EXE 972 EXCEL.EXE 972 EXCEL.EXE 972 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1604 wrote to memory of 404 1604 5a896766ca8630c91c7ef74cfc31cdbd83bfb98c21f4067680fb15560c79508c.exe 89 PID 1604 wrote to memory of 404 1604 5a896766ca8630c91c7ef74cfc31cdbd83bfb98c21f4067680fb15560c79508c.exe 89 PID 1604 wrote to memory of 404 1604 5a896766ca8630c91c7ef74cfc31cdbd83bfb98c21f4067680fb15560c79508c.exe 89 PID 1604 wrote to memory of 2076 1604 5a896766ca8630c91c7ef74cfc31cdbd83bfb98c21f4067680fb15560c79508c.exe 91 PID 1604 wrote to memory of 2076 1604 5a896766ca8630c91c7ef74cfc31cdbd83bfb98c21f4067680fb15560c79508c.exe 91 PID 1604 wrote to memory of 2076 1604 5a896766ca8630c91c7ef74cfc31cdbd83bfb98c21f4067680fb15560c79508c.exe 91 PID 2076 wrote to memory of 3552 2076 Synaptics.exe 92 PID 2076 wrote to memory of 3552 2076 Synaptics.exe 92 PID 2076 wrote to memory of 3552 2076 Synaptics.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a896766ca8630c91c7ef74cfc31cdbd83bfb98c21f4067680fb15560c79508c.exe"C:\Users\Admin\AppData\Local\Temp\5a896766ca8630c91c7ef74cfc31cdbd83bfb98c21f4067680fb15560c79508c.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\._cache_5a896766ca8630c91c7ef74cfc31cdbd83bfb98c21f4067680fb15560c79508c.exe"C:\Users\Admin\AppData\Local\Temp\._cache_5a896766ca8630c91c7ef74cfc31cdbd83bfb98c21f4067680fb15560c79508c.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:404
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3552
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:972
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI2IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU4NjAiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODIxNjMwOTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MzM2NzMyOTU3Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3228
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD567746c23970d5003c393802ed27b6c07
SHA1a26bf0b9cedbb55de4bb8a3ca4bb94b7062f8e2e
SHA2565a896766ca8630c91c7ef74cfc31cdbd83bfb98c21f4067680fb15560c79508c
SHA5124c423ca7a4f0ca9cdf2799b7e1b2fa9a2c11fddea2647e8eefd411ba1c92508c8a7622d2f980712ba9841446ada4b95054e0a02484a2d730171d7e469b1ff535
-
C:\Users\Admin\AppData\Local\Temp\._cache_5a896766ca8630c91c7ef74cfc31cdbd83bfb98c21f4067680fb15560c79508c.exe
Filesize132KB
MD556e14b51d3998757b578dc38cd0c46ad
SHA165d4ac0b0769e70363145454eddee7c558b63c20
SHA256df93ecc36d3479aa3f99d6687cf6adb5e6843077ad94c401ee56b8d15e6058b2
SHA512a875d5a52d46f339130c72176ada06bff8a600c5368fccb261c629e5560d890676f981332c9c33775dfb003d04d7d7e221c5781cf33ed5781ace6eb2f7307d03
-
Filesize
24KB
MD5d53e864586f926ebf43468a4f51154f7
SHA1ee3f103941ac9397dae8a2319e8562a92d8b1f90
SHA2567478f09e5defd5aa4f353594d3bf44c9fc100f831a439e831e162268572b1c73
SHA5126de5d00e25fbf3e1dfb4abd5c93da8b4d4e3cf1269d07fb5fd903619ae72162b01ff58d7a5bfc2d499f6aff0099583e25a55fd7c30a68412770668d0dd927879
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04