Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
16-02-2025 22:08
Behavioral task
behavioral1
Sample
36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe
Resource
win10v2004-20250211-en
General
-
Target
36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe
-
Size
1.1MB
-
MD5
7bc23167b8068c614335900a13489920
-
SHA1
4099816725b79c0ed69634e326538c412b23c277
-
SHA256
36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752d
-
SHA512
11bd51195220d88de0458cd81f34ca97b826e32bc64ed91d5c5891aabfbf72c0074409e5f6e95d8f2a57b3609956570dedf9214e3d5a3bd5606f66b9be328a66
-
SSDEEP
24576:onsJ39LyjbJkQFMhmC+6GD9epcBi1nyvtouxU7:onsHyjtk2MYC5GDkr1n+t1xU7
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 50 4876 Process not Found -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1318997816-2171176372-1451785247-1000\Control Panel\International\Geo\Nation 36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe Key value queried \REGISTRY\USER\S-1-5-21-1318997816-2171176372-1451785247-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 1164 ._cache_36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe 1332 Synaptics.exe 1280 ._cache_Synaptics.exe -
Loads dropped DLL 2 IoCs
pid Process 1164 ._cache_36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe 1280 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4896 MicrosoftEdgeUpdate.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1040 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1040 EXCEL.EXE 1040 EXCEL.EXE 1040 EXCEL.EXE 1040 EXCEL.EXE 1040 EXCEL.EXE 1040 EXCEL.EXE 1040 EXCEL.EXE 1040 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4200 wrote to memory of 1164 4200 36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe 90 PID 4200 wrote to memory of 1164 4200 36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe 90 PID 4200 wrote to memory of 1164 4200 36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe 90 PID 4200 wrote to memory of 1332 4200 36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe 92 PID 4200 wrote to memory of 1332 4200 36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe 92 PID 4200 wrote to memory of 1332 4200 36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe 92 PID 1332 wrote to memory of 1280 1332 Synaptics.exe 93 PID 1332 wrote to memory of 1280 1332 Synaptics.exe 93 PID 1332 wrote to memory of 1280 1332 Synaptics.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe"C:\Users\Admin\AppData\Local\Temp\36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\._cache_36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe"C:\Users\Admin\AppData\Local\Temp\._cache_36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1164
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1280
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1040
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QzBFQzdFNkItQTY2Qy00QUQxLUFEMzItMDZEQkEyQjQyQTQ5fSIgdXNlcmlkPSJ7OEMwMkY2REMtQTlEQy00NzE5LTkyNjUtM0QwN0Y0ODlEMUVGfSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7MjkyRUJCMzYtQjFDQy00RTJFLThDMzAtMjQ1MDJFQUI2QjgzfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0UreGJBejZZNnNVMTI4OWJTNnFsNFZSTGJramZCVUdUTUpzanJIcjQ0aUk9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI1IiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODMzNzEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NDE5Mjc1MzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0ODQ0OTA0NTc4Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4896
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD57bc23167b8068c614335900a13489920
SHA14099816725b79c0ed69634e326538c412b23c277
SHA25636d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752d
SHA51211bd51195220d88de0458cd81f34ca97b826e32bc64ed91d5c5891aabfbf72c0074409e5f6e95d8f2a57b3609956570dedf9214e3d5a3bd5606f66b9be328a66
-
C:\Users\Admin\AppData\Local\Temp\._cache_36d8639d25e4f278cad84fff5e26bcf90ae48085da4c47921b7d14d3b1f8752dN.exe
Filesize402KB
MD59ec17643d3c06f4c18434cfc41a6f631
SHA1f502030036222a7b58aaec1b5bb43b1ef0e5cb34
SHA256c1391a1ced96dfe154bea71197709d5ddf0ab7a3b7ee16bb82e9ae6843080198
SHA512ad324b00d7fccb8599cdcede1b224f51a99f20948acd1ee895de91b0e7fa2c2b9f49b169b2c4da7f9f837c916fae34f9c0cb8d839f6bc2f311829ff14c357fb9
-
Filesize
22KB
MD5bd199e237dc845c4957ac90dd6d597c4
SHA1cd1a0c1c9191dbf20de28650ad2e6a417f17c7bf
SHA256833dbd75c555ef533e74dc5e0cd9dd5f07550cf523287bf2c48d822ec3a9ca98
SHA5128c5eae89a28df47297235b1043438c70c808c124bac5c96728e48c52f7e79aed8d2c42e30e016a6d8dbb214d3dd6f135ef04fb26f09f0989b990d309c2c4e900
-
Filesize
113KB
MD58edf2bf5b0f1527f9225eaf9a9cf8e0e
SHA15b66a53732decba86667a7dbbd72d63a52e807e0
SHA256940cb99c74879ee07d01be714a754ed9d1762ff2178bfe37e028fee7857d84d0
SHA512ee5a36e563942e3db44505c4e4918df2a363e695a3f20f0f39a4f631e40103dc5bfbbf751a3388aac6e83c9ac29742b67e8900697029dcfeb1407d6117a9fdb2
-
Filesize
26KB
MD532464eb41863c9b7dc9e1d4f9b4664f1
SHA1a4b139f25f6faa486c850fec67291ec3c7c58c95
SHA2568378e826057feb4f079bee7b1e1d8e0d0f048b495040ed587aa548c3e4e281e7
SHA512eabf404988feff8c22a1ccfd95cabab50cf5715d1570c79024e9d8c1ccd9b5388a335477c18d8ab7025b284c59f5a5c84fa3d4ec705f55d7f737bfc501a431f6
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04