Analysis
-
max time kernel
117s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-02-2025 22:08
Behavioral task
behavioral1
Sample
36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe
Resource
win10v2004-20250211-en
General
-
Target
36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe
-
Size
1.1MB
-
MD5
7bc23167b8068c614335900a13489920
-
SHA1
4099816725b79c0ed69634e326538c412b23c277
-
SHA256
36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752d
-
SHA512
11bd51195220d88de0458cd81f34ca97b826e32bc64ed91d5c5891aabfbf72c0074409e5f6e95d8f2a57b3609956570dedf9214e3d5a3bd5606f66b9be328a66
-
SSDEEP
24576:onsJ39LyjbJkQFMhmC+6GD9epcBi1nyvtouxU7:onsHyjtk2MYC5GDkr1n+t1xU7
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
resource behavioral1/files/0x00070000000173fc-93.dat -
Executes dropped EXE 3 IoCs
pid Process 1716 ._cache_36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe 2732 Synaptics.exe 2892 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 2900 36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe 1716 ._cache_36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe 2900 36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe 2900 36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe 2732 Synaptics.exe 2732 Synaptics.exe 2892 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2864 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2864 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2900 wrote to memory of 1716 2900 36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe 30 PID 2900 wrote to memory of 1716 2900 36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe 30 PID 2900 wrote to memory of 1716 2900 36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe 30 PID 2900 wrote to memory of 1716 2900 36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe 30 PID 2900 wrote to memory of 2732 2900 36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe 32 PID 2900 wrote to memory of 2732 2900 36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe 32 PID 2900 wrote to memory of 2732 2900 36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe 32 PID 2900 wrote to memory of 2732 2900 36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe 32 PID 2732 wrote to memory of 2892 2732 Synaptics.exe 33 PID 2732 wrote to memory of 2892 2732 Synaptics.exe 33 PID 2732 wrote to memory of 2892 2732 Synaptics.exe 33 PID 2732 wrote to memory of 2892 2732 Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe"C:\Users\Admin\AppData\Local\Temp\36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\._cache_36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe"C:\Users\Admin\AppData\Local\Temp\._cache_36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1716
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2892
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD57bc23167b8068c614335900a13489920
SHA14099816725b79c0ed69634e326538c412b23c277
SHA25636d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752d
SHA51211bd51195220d88de0458cd81f34ca97b826e32bc64ed91d5c5891aabfbf72c0074409e5f6e95d8f2a57b3609956570dedf9214e3d5a3bd5606f66b9be328a66
-
C:\Users\Admin\AppData\Local\Temp\._cache_36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe
Filesize402KB
MD59ec17643d3c06f4c18434cfc41a6f631
SHA1f502030036222a7b58aaec1b5bb43b1ef0e5cb34
SHA256c1391a1ced96dfe154bea71197709d5ddf0ab7a3b7ee16bb82e9ae6843080198
SHA512ad324b00d7fccb8599cdcede1b224f51a99f20948acd1ee895de91b0e7fa2c2b9f49b169b2c4da7f9f837c916fae34f9c0cb8d839f6bc2f311829ff14c357fb9
-
Filesize
26KB
MD532464eb41863c9b7dc9e1d4f9b4664f1
SHA1a4b139f25f6faa486c850fec67291ec3c7c58c95
SHA2568378e826057feb4f079bee7b1e1d8e0d0f048b495040ed587aa548c3e4e281e7
SHA512eabf404988feff8c22a1ccfd95cabab50cf5715d1570c79024e9d8c1ccd9b5388a335477c18d8ab7025b284c59f5a5c84fa3d4ec705f55d7f737bfc501a431f6
-
Filesize
22KB
MD5b41ca8b44f01c38d385ef51069afc091
SHA1e887676e33ce21989733fed4e5a96164f4829a19
SHA256e73b1044859b977f0f494ed56fc46ca4d75cc47bc726a8450d92bd1f56e56637
SHA512babb26c3a33dd6ada28e571f40fd432b24ca4fb73d5878f1ce2f261a915da8e52056f461ae02e998697b86d6c6f7b71221aee36bdc9d3da25ed3ed8228b4b5a0
-
Filesize
28KB
MD5d737669f5d7e2d8c46bc4e0dbc54672f
SHA15981cd9465024f5630909dbff53d516a978bc6aa
SHA256f6d155ba3ca75d7252c14f097a8c4bc705267fd5ef1135b42df9b995795f57cf
SHA512e389909d4c33c677d169bfb456b1b4e9ace1efea50c89aef99a2f83ccffe764d87788d2a8f53988e441de4c5740cdf95bee11db01bd1065fd2c7625f645c3089
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
113KB
MD58edf2bf5b0f1527f9225eaf9a9cf8e0e
SHA15b66a53732decba86667a7dbbd72d63a52e807e0
SHA256940cb99c74879ee07d01be714a754ed9d1762ff2178bfe37e028fee7857d84d0
SHA512ee5a36e563942e3db44505c4e4918df2a363e695a3f20f0f39a4f631e40103dc5bfbbf751a3388aac6e83c9ac29742b67e8900697029dcfeb1407d6117a9fdb2