Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
16-02-2025 12:13
Behavioral task
behavioral1
Sample
806e23a31e99a05eb57adee6420c8d2b5cd6dbfae8423317f85c0c4eb80aa11aN.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
806e23a31e99a05eb57adee6420c8d2b5cd6dbfae8423317f85c0c4eb80aa11aN.exe
Resource
win10v2004-20250207-en
General
-
Target
806e23a31e99a05eb57adee6420c8d2b5cd6dbfae8423317f85c0c4eb80aa11aN.exe
-
Size
764KB
-
MD5
5425034239af8c9fc656b93bcff293d0
-
SHA1
b3d19dea9d881d75135802bfa8073c47c67dc6ba
-
SHA256
806e23a31e99a05eb57adee6420c8d2b5cd6dbfae8423317f85c0c4eb80aa11a
-
SHA512
a870f1a1257188ec415c720c37537218bad22937bc50302c76f60e497bfa71749320757a00bb6caf58f86803b0f8a9ba34474427e99e87c2acea9a8affda6424
-
SSDEEP
12288:6MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9UJqj:6nsJ39LyjbJkQFMhmC+6GD9b
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 1616 ._cache_806e23a31e99a05eb57adee6420c8d2b5cd6dbfae8423317f85c0c4eb80aa11aN.exe 1232 Synaptics.exe 2832 ._cache_Synaptics.exe -
Loads dropped DLL 15 IoCs
pid Process 1336 806e23a31e99a05eb57adee6420c8d2b5cd6dbfae8423317f85c0c4eb80aa11aN.exe 1336 806e23a31e99a05eb57adee6420c8d2b5cd6dbfae8423317f85c0c4eb80aa11aN.exe 1336 806e23a31e99a05eb57adee6420c8d2b5cd6dbfae8423317f85c0c4eb80aa11aN.exe 2896 WerFault.exe 2896 WerFault.exe 2896 WerFault.exe 2896 WerFault.exe 1232 Synaptics.exe 1232 Synaptics.exe 2616 WerFault.exe 2616 WerFault.exe 2616 WerFault.exe 2616 WerFault.exe 2616 WerFault.exe 2896 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 806e23a31e99a05eb57adee6420c8d2b5cd6dbfae8423317f85c0c4eb80aa11aN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2896 1616 WerFault.exe 30 2616 2832 WerFault.exe 34 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 806e23a31e99a05eb57adee6420c8d2b5cd6dbfae8423317f85c0c4eb80aa11aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_806e23a31e99a05eb57adee6420c8d2b5cd6dbfae8423317f85c0c4eb80aa11aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2780 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2780 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1336 wrote to memory of 1616 1336 806e23a31e99a05eb57adee6420c8d2b5cd6dbfae8423317f85c0c4eb80aa11aN.exe 30 PID 1336 wrote to memory of 1616 1336 806e23a31e99a05eb57adee6420c8d2b5cd6dbfae8423317f85c0c4eb80aa11aN.exe 30 PID 1336 wrote to memory of 1616 1336 806e23a31e99a05eb57adee6420c8d2b5cd6dbfae8423317f85c0c4eb80aa11aN.exe 30 PID 1336 wrote to memory of 1616 1336 806e23a31e99a05eb57adee6420c8d2b5cd6dbfae8423317f85c0c4eb80aa11aN.exe 30 PID 1336 wrote to memory of 1232 1336 806e23a31e99a05eb57adee6420c8d2b5cd6dbfae8423317f85c0c4eb80aa11aN.exe 32 PID 1336 wrote to memory of 1232 1336 806e23a31e99a05eb57adee6420c8d2b5cd6dbfae8423317f85c0c4eb80aa11aN.exe 32 PID 1336 wrote to memory of 1232 1336 806e23a31e99a05eb57adee6420c8d2b5cd6dbfae8423317f85c0c4eb80aa11aN.exe 32 PID 1336 wrote to memory of 1232 1336 806e23a31e99a05eb57adee6420c8d2b5cd6dbfae8423317f85c0c4eb80aa11aN.exe 32 PID 1616 wrote to memory of 2896 1616 ._cache_806e23a31e99a05eb57adee6420c8d2b5cd6dbfae8423317f85c0c4eb80aa11aN.exe 33 PID 1616 wrote to memory of 2896 1616 ._cache_806e23a31e99a05eb57adee6420c8d2b5cd6dbfae8423317f85c0c4eb80aa11aN.exe 33 PID 1616 wrote to memory of 2896 1616 ._cache_806e23a31e99a05eb57adee6420c8d2b5cd6dbfae8423317f85c0c4eb80aa11aN.exe 33 PID 1616 wrote to memory of 2896 1616 ._cache_806e23a31e99a05eb57adee6420c8d2b5cd6dbfae8423317f85c0c4eb80aa11aN.exe 33 PID 1232 wrote to memory of 2832 1232 Synaptics.exe 34 PID 1232 wrote to memory of 2832 1232 Synaptics.exe 34 PID 1232 wrote to memory of 2832 1232 Synaptics.exe 34 PID 1232 wrote to memory of 2832 1232 Synaptics.exe 34 PID 2832 wrote to memory of 2616 2832 ._cache_Synaptics.exe 37 PID 2832 wrote to memory of 2616 2832 ._cache_Synaptics.exe 37 PID 2832 wrote to memory of 2616 2832 ._cache_Synaptics.exe 37 PID 2832 wrote to memory of 2616 2832 ._cache_Synaptics.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\806e23a31e99a05eb57adee6420c8d2b5cd6dbfae8423317f85c0c4eb80aa11aN.exe"C:\Users\Admin\AppData\Local\Temp\806e23a31e99a05eb57adee6420c8d2b5cd6dbfae8423317f85c0c4eb80aa11aN.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\._cache_806e23a31e99a05eb57adee6420c8d2b5cd6dbfae8423317f85c0c4eb80aa11aN.exe"C:\Users\Admin\AppData\Local\Temp\._cache_806e23a31e99a05eb57adee6420c8d2b5cd6dbfae8423317f85c0c4eb80aa11aN.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 5323⤵
- Loads dropped DLL
- Program crash
PID:2896
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 5324⤵
- Loads dropped DLL
- Program crash
PID:2616
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
764KB
MD55425034239af8c9fc656b93bcff293d0
SHA1b3d19dea9d881d75135802bfa8073c47c67dc6ba
SHA256806e23a31e99a05eb57adee6420c8d2b5cd6dbfae8423317f85c0c4eb80aa11a
SHA512a870f1a1257188ec415c720c37537218bad22937bc50302c76f60e497bfa71749320757a00bb6caf58f86803b0f8a9ba34474427e99e87c2acea9a8affda6424
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
\Users\Admin\AppData\Local\Temp\._cache_806e23a31e99a05eb57adee6420c8d2b5cd6dbfae8423317f85c0c4eb80aa11aN.exe
Filesize10KB
MD5533be3e52743db598cd368ac593254d7
SHA16891265d831f02829cfdfc7acc97e06a2ad46168
SHA2561ab839854438ab335afc8634519eb813322cdcc6848bcaaaf9fe099ff2354d7b
SHA512298c7331a2d08eaead70ed23268b33f98420a8a746f11aa9d79a11254e962784dfb7a177fd8891e7c85324011b4da883a2c36e367ca8abaeff7daffde0eddfda