Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16-02-2025 20:38
Behavioral task
behavioral1
Sample
e6bedf1ab4af432624f28b3622f3bee304d547251c36e39921a245b2721c013d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e6bedf1ab4af432624f28b3622f3bee304d547251c36e39921a245b2721c013d.exe
Resource
win10v2004-20250211-en
General
-
Target
e6bedf1ab4af432624f28b3622f3bee304d547251c36e39921a245b2721c013d.exe
-
Size
764KB
-
MD5
38a80ba8fec5edd2f8eff841e16983c4
-
SHA1
e43ca95e3316c276d64fdef6eeeb774ba31f0b25
-
SHA256
e6bedf1ab4af432624f28b3622f3bee304d547251c36e39921a245b2721c013d
-
SHA512
670d187322c784b2268b2a5b847d496555af790dbfcc6b9f03f987767ca1043cdd199ae96544ac464a27b613974a160b2ee329561bde037edeeb52c3f4c8fddd
-
SSDEEP
12288:6MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9Ub9T:6nsJ39LyjbJkQFMhmC+6GD92
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2040 ._cache_e6bedf1ab4af432624f28b3622f3bee304d547251c36e39921a245b2721c013d.exe 2776 Synaptics.exe 2796 ._cache_Synaptics.exe -
Loads dropped DLL 15 IoCs
pid Process 2352 e6bedf1ab4af432624f28b3622f3bee304d547251c36e39921a245b2721c013d.exe 2352 e6bedf1ab4af432624f28b3622f3bee304d547251c36e39921a245b2721c013d.exe 2352 e6bedf1ab4af432624f28b3622f3bee304d547251c36e39921a245b2721c013d.exe 2892 WerFault.exe 2892 WerFault.exe 2892 WerFault.exe 2892 WerFault.exe 2776 Synaptics.exe 2776 Synaptics.exe 2696 WerFault.exe 2696 WerFault.exe 2696 WerFault.exe 2696 WerFault.exe 2892 WerFault.exe 2696 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" e6bedf1ab4af432624f28b3622f3bee304d547251c36e39921a245b2721c013d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2892 2040 WerFault.exe 31 2696 2796 WerFault.exe 35 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e6bedf1ab4af432624f28b3622f3bee304d547251c36e39921a245b2721c013d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_e6bedf1ab4af432624f28b3622f3bee304d547251c36e39921a245b2721c013d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2628 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2628 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2040 2352 e6bedf1ab4af432624f28b3622f3bee304d547251c36e39921a245b2721c013d.exe 31 PID 2352 wrote to memory of 2040 2352 e6bedf1ab4af432624f28b3622f3bee304d547251c36e39921a245b2721c013d.exe 31 PID 2352 wrote to memory of 2040 2352 e6bedf1ab4af432624f28b3622f3bee304d547251c36e39921a245b2721c013d.exe 31 PID 2352 wrote to memory of 2040 2352 e6bedf1ab4af432624f28b3622f3bee304d547251c36e39921a245b2721c013d.exe 31 PID 2352 wrote to memory of 2776 2352 e6bedf1ab4af432624f28b3622f3bee304d547251c36e39921a245b2721c013d.exe 33 PID 2352 wrote to memory of 2776 2352 e6bedf1ab4af432624f28b3622f3bee304d547251c36e39921a245b2721c013d.exe 33 PID 2352 wrote to memory of 2776 2352 e6bedf1ab4af432624f28b3622f3bee304d547251c36e39921a245b2721c013d.exe 33 PID 2352 wrote to memory of 2776 2352 e6bedf1ab4af432624f28b3622f3bee304d547251c36e39921a245b2721c013d.exe 33 PID 2040 wrote to memory of 2892 2040 ._cache_e6bedf1ab4af432624f28b3622f3bee304d547251c36e39921a245b2721c013d.exe 34 PID 2040 wrote to memory of 2892 2040 ._cache_e6bedf1ab4af432624f28b3622f3bee304d547251c36e39921a245b2721c013d.exe 34 PID 2040 wrote to memory of 2892 2040 ._cache_e6bedf1ab4af432624f28b3622f3bee304d547251c36e39921a245b2721c013d.exe 34 PID 2040 wrote to memory of 2892 2040 ._cache_e6bedf1ab4af432624f28b3622f3bee304d547251c36e39921a245b2721c013d.exe 34 PID 2776 wrote to memory of 2796 2776 Synaptics.exe 35 PID 2776 wrote to memory of 2796 2776 Synaptics.exe 35 PID 2776 wrote to memory of 2796 2776 Synaptics.exe 35 PID 2776 wrote to memory of 2796 2776 Synaptics.exe 35 PID 2796 wrote to memory of 2696 2796 ._cache_Synaptics.exe 38 PID 2796 wrote to memory of 2696 2796 ._cache_Synaptics.exe 38 PID 2796 wrote to memory of 2696 2796 ._cache_Synaptics.exe 38 PID 2796 wrote to memory of 2696 2796 ._cache_Synaptics.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6bedf1ab4af432624f28b3622f3bee304d547251c36e39921a245b2721c013d.exe"C:\Users\Admin\AppData\Local\Temp\e6bedf1ab4af432624f28b3622f3bee304d547251c36e39921a245b2721c013d.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\._cache_e6bedf1ab4af432624f28b3622f3bee304d547251c36e39921a245b2721c013d.exe"C:\Users\Admin\AppData\Local\Temp\._cache_e6bedf1ab4af432624f28b3622f3bee304d547251c36e39921a245b2721c013d.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 5283⤵
- Loads dropped DLL
- Program crash
PID:2892
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 5284⤵
- Loads dropped DLL
- Program crash
PID:2696
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
764KB
MD538a80ba8fec5edd2f8eff841e16983c4
SHA1e43ca95e3316c276d64fdef6eeeb774ba31f0b25
SHA256e6bedf1ab4af432624f28b3622f3bee304d547251c36e39921a245b2721c013d
SHA512670d187322c784b2268b2a5b847d496555af790dbfcc6b9f03f987767ca1043cdd199ae96544ac464a27b613974a160b2ee329561bde037edeeb52c3f4c8fddd
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
\Users\Admin\AppData\Local\Temp\._cache_e6bedf1ab4af432624f28b3622f3bee304d547251c36e39921a245b2721c013d.exe
Filesize10KB
MD5e5b8998eef7af077e73990143015fbb2
SHA10838794e5b76b12a43c49f0e5cd822663241a40c
SHA256c54f83e351a35f6e21b50acd6acd037faa64a713e83f8d6d7bc23531225bfa82
SHA5124b0dd4288214ab56b6258c9299340c3cff767679a3dde2184904593d70faa3834bb76cf571d652c41bd6d8a1d2b78140f8745ea0c81c5a351784a9be7da287d8