Analysis
-
max time kernel
110s -
max time network
116s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-02-2025 12:06
Behavioral task
behavioral1
Sample
9845093247d6b1e53fa0babb0bf5c3a3ca0ca575b90649afd9509b3ce09add4bN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9845093247d6b1e53fa0babb0bf5c3a3ca0ca575b90649afd9509b3ce09add4bN.exe
Resource
win10v2004-20250207-en
General
-
Target
9845093247d6b1e53fa0babb0bf5c3a3ca0ca575b90649afd9509b3ce09add4bN.exe
-
Size
1.4MB
-
MD5
ea245dc9b0ceb9c0790a4ba444e955e0
-
SHA1
51715390ced9bf47fc6b3ea45b437e6382b5cd76
-
SHA256
9845093247d6b1e53fa0babb0bf5c3a3ca0ca575b90649afd9509b3ce09add4b
-
SHA512
e3100ebeb388a4f0ffd1fa90fd8ccfcdd80de0b5827f5caa6a7bb6335e7e74d33d6fdcb17afe72609176b2441cd66aba10370848b51cb0a9a5926f0ea63db9ab
-
SSDEEP
12288:mMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9ZnH:mnsJ39LyjbJkQFMhmC+6GD9t
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2976 ._cache_9845093247d6b1e53fa0babb0bf5c3a3ca0ca575b90649afd9509b3ce09add4bN.exe 2588 Synaptics.exe 2640 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 2828 9845093247d6b1e53fa0babb0bf5c3a3ca0ca575b90649afd9509b3ce09add4bN.exe 2828 9845093247d6b1e53fa0babb0bf5c3a3ca0ca575b90649afd9509b3ce09add4bN.exe 2828 9845093247d6b1e53fa0babb0bf5c3a3ca0ca575b90649afd9509b3ce09add4bN.exe 2828 9845093247d6b1e53fa0babb0bf5c3a3ca0ca575b90649afd9509b3ce09add4bN.exe 2588 Synaptics.exe 2588 Synaptics.exe 2588 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 9845093247d6b1e53fa0babb0bf5c3a3ca0ca575b90649afd9509b3ce09add4bN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9845093247d6b1e53fa0babb0bf5c3a3ca0ca575b90649afd9509b3ce09add4bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1224 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1224 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2828 wrote to memory of 2976 2828 9845093247d6b1e53fa0babb0bf5c3a3ca0ca575b90649afd9509b3ce09add4bN.exe 30 PID 2828 wrote to memory of 2976 2828 9845093247d6b1e53fa0babb0bf5c3a3ca0ca575b90649afd9509b3ce09add4bN.exe 30 PID 2828 wrote to memory of 2976 2828 9845093247d6b1e53fa0babb0bf5c3a3ca0ca575b90649afd9509b3ce09add4bN.exe 30 PID 2828 wrote to memory of 2976 2828 9845093247d6b1e53fa0babb0bf5c3a3ca0ca575b90649afd9509b3ce09add4bN.exe 30 PID 2828 wrote to memory of 2588 2828 9845093247d6b1e53fa0babb0bf5c3a3ca0ca575b90649afd9509b3ce09add4bN.exe 32 PID 2828 wrote to memory of 2588 2828 9845093247d6b1e53fa0babb0bf5c3a3ca0ca575b90649afd9509b3ce09add4bN.exe 32 PID 2828 wrote to memory of 2588 2828 9845093247d6b1e53fa0babb0bf5c3a3ca0ca575b90649afd9509b3ce09add4bN.exe 32 PID 2828 wrote to memory of 2588 2828 9845093247d6b1e53fa0babb0bf5c3a3ca0ca575b90649afd9509b3ce09add4bN.exe 32 PID 2588 wrote to memory of 2640 2588 Synaptics.exe 33 PID 2588 wrote to memory of 2640 2588 Synaptics.exe 33 PID 2588 wrote to memory of 2640 2588 Synaptics.exe 33 PID 2588 wrote to memory of 2640 2588 Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\9845093247d6b1e53fa0babb0bf5c3a3ca0ca575b90649afd9509b3ce09add4bN.exe"C:\Users\Admin\AppData\Local\Temp\9845093247d6b1e53fa0babb0bf5c3a3ca0ca575b90649afd9509b3ce09add4bN.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\._cache_9845093247d6b1e53fa0babb0bf5c3a3ca0ca575b90649afd9509b3ce09add4bN.exe"C:\Users\Admin\AppData\Local\Temp\._cache_9845093247d6b1e53fa0babb0bf5c3a3ca0ca575b90649afd9509b3ce09add4bN.exe"2⤵
- Executes dropped EXE
PID:2976
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2640
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5ea245dc9b0ceb9c0790a4ba444e955e0
SHA151715390ced9bf47fc6b3ea45b437e6382b5cd76
SHA2569845093247d6b1e53fa0babb0bf5c3a3ca0ca575b90649afd9509b3ce09add4b
SHA512e3100ebeb388a4f0ffd1fa90fd8ccfcdd80de0b5827f5caa6a7bb6335e7e74d33d6fdcb17afe72609176b2441cd66aba10370848b51cb0a9a5926f0ea63db9ab
-
C:\Users\Admin\AppData\Local\Temp\._cache_9845093247d6b1e53fa0babb0bf5c3a3ca0ca575b90649afd9509b3ce09add4bN.exe
Filesize76KB
MD5e0bf32cb164fe15e7356ce33f7e71236
SHA1c282ccbdcdeace4fea51c97ef56b43e72097d8d1
SHA2568b351fc9cae7afb7c3a23aeb8b3f2eb971dceb387ad20947c27d9fcb28b81c0c
SHA512bb429142530fef2cec375770e497a3076be66ea95b7d597118313e1547b53f8e344e7f13af3073a2bca8a64130a291de782fcb304512b12542cac39f2bd3024b
-
Filesize
21KB
MD5bdad9c0e82ae3837a721e41cb062df10
SHA1a0929fac035435a65eacb09a466bcc3706cbe154
SHA256190b6a24c40bb4da466651e03cbf9bc50bf17b2bafafb15a90fa516f8d2cce77
SHA51246f07d4e49882be5dae52525703006a04840c8fa0ffd28f65d4755ebadd914d1bb001432a0f3188258fbe5c699e2c781f45090b306fa2a0db7788112145a2c0a
-
Filesize
25KB
MD5157338ab102801706611764a19fcff90
SHA1fdd043f38fd81d858ab2f24ee12715d4f7efec26
SHA2562f64a78ec69d8d1a1cf0af01133725bbdeb69359a9417f753fa0e2d04168ef91
SHA512b4934c3d939c38aa747dd5d617f890450f01efacab5e43374414b2137a82a40a9dcccce0e762adfebe27bad8256100f5e0e5793339c769df49654760e42a9ff2
-
Filesize
25KB
MD55bdb2e88855455e9d688b58b953eabf9
SHA1529967c7a320e642b16d13642338be7c3dff6ac0
SHA2562c14cf42810fe1aa392cd0158212bdd1e105863ba3d844ceca8bf0259c7b8ddf
SHA512f5663fcfad40ab00470d86ad1b070848d4d96b5bf6ae58f5aa079c9a4c19baed55ea312fc220890851fcf7f80b61f9c1f84a61ee1107532fb61508605671b114
-
Filesize
27KB
MD5cd287d67f3e4fd866169024f80ca0e23
SHA125f228e108f57246ef1e61cbc58610de1d789551
SHA256fbdd5f820171e6539c95ab0d82d353dea9c85decdce4d6426b9e4d5aeeeaf32c
SHA512edfb2eeb62ee94cb4177660ce5648fab1788a07952acfe2b7da7ffe264527dda7d900bb567fab9fcf38f49b0015848758f084878938bab6e28c340a834e4c1ca
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882