Analysis
-
max time kernel
113s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
16-02-2025 02:18
Behavioral task
behavioral1
Sample
174bba3f6c908c478c29276869627048225e88678cdcf9017cad89fc09ae8f2bN.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
174bba3f6c908c478c29276869627048225e88678cdcf9017cad89fc09ae8f2bN.exe
Resource
win10v2004-20250211-en
General
-
Target
174bba3f6c908c478c29276869627048225e88678cdcf9017cad89fc09ae8f2bN.exe
-
Size
878KB
-
MD5
a91aae5e144092c99e610e01d80f2890
-
SHA1
2a11d13cd09f28551c764df65a3cf83059a0a760
-
SHA256
174bba3f6c908c478c29276869627048225e88678cdcf9017cad89fc09ae8f2b
-
SHA512
0255c68010d90d8146aef6472dc824e4f55715df2070feb34dbdf9ef664bc14ea7a1c54942a5d3c5ebf007056c19eab92b8e260e816f3000c1b55d3803362ca3
-
SSDEEP
12288:AMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9//ohLA2XTj:AnsJ39LyjbJkQFMhmC+6GD9o62/
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 79 4504 Process not Found -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3296967594-3563063956-581523229-1000\Control Panel\International\Geo\Nation 174bba3f6c908c478c29276869627048225e88678cdcf9017cad89fc09ae8f2bN.exe Key value queried \REGISTRY\USER\S-1-5-21-3296967594-3563063956-581523229-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 4048 ._cache_174bba3f6c908c478c29276869627048225e88678cdcf9017cad89fc09ae8f2bN.exe 2052 Synaptics.exe 4536 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 174bba3f6c908c478c29276869627048225e88678cdcf9017cad89fc09ae8f2bN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 174bba3f6c908c478c29276869627048225e88678cdcf9017cad89fc09ae8f2bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_174bba3f6c908c478c29276869627048225e88678cdcf9017cad89fc09ae8f2bN.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3576 MicrosoftEdgeUpdate.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 174bba3f6c908c478c29276869627048225e88678cdcf9017cad89fc09ae8f2bN.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1320 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1320 EXCEL.EXE 1320 EXCEL.EXE 1320 EXCEL.EXE 1320 EXCEL.EXE 1320 EXCEL.EXE 1320 EXCEL.EXE 1320 EXCEL.EXE 1320 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2492 wrote to memory of 4048 2492 174bba3f6c908c478c29276869627048225e88678cdcf9017cad89fc09ae8f2bN.exe 89 PID 2492 wrote to memory of 4048 2492 174bba3f6c908c478c29276869627048225e88678cdcf9017cad89fc09ae8f2bN.exe 89 PID 2492 wrote to memory of 4048 2492 174bba3f6c908c478c29276869627048225e88678cdcf9017cad89fc09ae8f2bN.exe 89 PID 2492 wrote to memory of 2052 2492 174bba3f6c908c478c29276869627048225e88678cdcf9017cad89fc09ae8f2bN.exe 91 PID 2492 wrote to memory of 2052 2492 174bba3f6c908c478c29276869627048225e88678cdcf9017cad89fc09ae8f2bN.exe 91 PID 2492 wrote to memory of 2052 2492 174bba3f6c908c478c29276869627048225e88678cdcf9017cad89fc09ae8f2bN.exe 91 PID 2052 wrote to memory of 4536 2052 Synaptics.exe 93 PID 2052 wrote to memory of 4536 2052 Synaptics.exe 93 PID 2052 wrote to memory of 4536 2052 Synaptics.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\174bba3f6c908c478c29276869627048225e88678cdcf9017cad89fc09ae8f2bN.exe"C:\Users\Admin\AppData\Local\Temp\174bba3f6c908c478c29276869627048225e88678cdcf9017cad89fc09ae8f2bN.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\._cache_174bba3f6c908c478c29276869627048225e88678cdcf9017cad89fc09ae8f2bN.exe"C:\Users\Admin\AppData\Local\Temp\._cache_174bba3f6c908c478c29276869627048225e88678cdcf9017cad89fc09ae8f2bN.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4048
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4536
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1320
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI0IiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODIxNjkiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1MzE4NTEwMTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NDU5NDY3NzE5Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3576
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
878KB
MD5a91aae5e144092c99e610e01d80f2890
SHA12a11d13cd09f28551c764df65a3cf83059a0a760
SHA256174bba3f6c908c478c29276869627048225e88678cdcf9017cad89fc09ae8f2b
SHA5120255c68010d90d8146aef6472dc824e4f55715df2070feb34dbdf9ef664bc14ea7a1c54942a5d3c5ebf007056c19eab92b8e260e816f3000c1b55d3803362ca3
-
C:\Users\Admin\AppData\Local\Temp\._cache_174bba3f6c908c478c29276869627048225e88678cdcf9017cad89fc09ae8f2bN.exe
Filesize124KB
MD5ecba0f6d77c5b539a43af335d7a07891
SHA121e7f19d639d6194c69bcdf6dedba504d3c90fab
SHA256c71a9460445b153f1f9c488d16f93b8d0b15ad2b1783e311d0aa070ec5ede55d
SHA512c85316bb6c3ced50a36a5386817b449a8f72536eb0c741e3a36b516c580cc0f19192e989a1495dc1fc25c91385882378beefbf9d17ea4d8bbb0faeac9cf81a31
-
Filesize
22KB
MD52c42270f787535136d1418e15f8ac3af
SHA127912494579e5049acd5c88b63e0550e74b19fea
SHA2565affcc1500257ed3df8283e067893f53a76540e9a7dfa52f173e8d5f10b7360f
SHA512597a591ab26c8bb65973c7c28410efa617c8878f53988be3087d7c060683a8030b637509469893dc068bbd658957f03c571f0b14e68cc882a88c61d35c5a1cec
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04