Analysis
-
max time kernel
113s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-02-2025 03:18
Behavioral task
behavioral1
Sample
beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe
Resource
win10v2004-20250211-en
General
-
Target
beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe
-
Size
3.0MB
-
MD5
a1511316d3008b8c6c46a6876be6b500
-
SHA1
de33c58f1149d14d3f389a0ba77d450d49a58bda
-
SHA256
beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffc
-
SHA512
7d32831973b753a14a91fb6a33685adfb71592e386feffe5f60aa2447c095e014403656d8d9bc9689e820f932899ed6dfebee3cd8c53a76f48b1d70bd0373bf2
-
SSDEEP
49152:XnsHyjtk2MYC5GDYCqEv2nBNcZwZDpY8M5UthjfxEQuIs/JgBjCvC:Xnsmtk2a9CqUZ/OLxWIYJu
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
resource behavioral1/files/0x0006000000019238-76.dat behavioral1/files/0x0008000000019238-100.dat -
Executes dropped EXE 3 IoCs
pid Process 2080 ._cache_beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe 2092 Synaptics.exe 2628 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 2820 beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe 2820 beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe 2820 beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe 2820 beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe 2092 Synaptics.exe 2092 Synaptics.exe 2092 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3060 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3060 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2080 2820 beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe 30 PID 2820 wrote to memory of 2080 2820 beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe 30 PID 2820 wrote to memory of 2080 2820 beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe 30 PID 2820 wrote to memory of 2080 2820 beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe 30 PID 2820 wrote to memory of 2092 2820 beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe 32 PID 2820 wrote to memory of 2092 2820 beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe 32 PID 2820 wrote to memory of 2092 2820 beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe 32 PID 2820 wrote to memory of 2092 2820 beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe 32 PID 2092 wrote to memory of 2628 2092 Synaptics.exe 33 PID 2092 wrote to memory of 2628 2092 Synaptics.exe 33 PID 2092 wrote to memory of 2628 2092 Synaptics.exe 33 PID 2092 wrote to memory of 2628 2092 Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe"C:\Users\Admin\AppData\Local\Temp\beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\._cache_beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe"C:\Users\Admin\AppData\Local\Temp\._cache_beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe"2⤵
- Executes dropped EXE
PID:2080
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2628
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD5a1511316d3008b8c6c46a6876be6b500
SHA1de33c58f1149d14d3f389a0ba77d450d49a58bda
SHA256beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffc
SHA5127d32831973b753a14a91fb6a33685adfb71592e386feffe5f60aa2447c095e014403656d8d9bc9689e820f932899ed6dfebee3cd8c53a76f48b1d70bd0373bf2
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
21KB
MD5888b9fcfdf5f29e900cffa6b58177fa1
SHA16e8b68e32177dfbf1eb656c8548b9b4351a4a49e
SHA25603f5cfe45a3cc89d5db2889391e01ff2b5b8d2a3b03f9c39bb667da71da957b3
SHA512c0e7f46d17772ee66d84a97f63730eafd8988eacf73791829c2b896d6d0b5d1c3691917f018311da2e446af64e54adf1071dfc9b4dc06c17c32e777027d5304a
-
Filesize
25KB
MD5dde1f9a8cccdc15352cb4c149373f2d5
SHA185c829dc25da7e251df752d8d347378aa68e144c
SHA256c916d848be21a02c1eef60e6f199e5006db9b1bd4e0d6384e5be55b7330f0667
SHA51202974515235a2720e564f3650975d73fbcf5bcee3c63d6d886e80940614c47924a224edfee38bdb1315c92147538a184b5eb7be1865321cc3ee537fd4188bfba
-
Filesize
25KB
MD5048698e33b33166003d3c6663e89e2c4
SHA1d783c64e5e4e977df72767231361b4d264b68a2b
SHA2562cc54919189aabdde218533396fddf9ac434ac733ecb21c2dcc0f888a7552e2a
SHA51274405f1fe9c46e4a7d059ea3e03a6aad052f25f651a1ebdd910dc590cd75fe7c04112f9499a1a1de59e9a86c31ccfa389b76c914a50b5afe4f479993862eb80a
-
Filesize
27KB
MD5a9e5fd85505771d9d3750167bffe3b73
SHA1ca8bc381748ac9091c69c0ff2a9e70094f55197d
SHA25674711a7942e91593cd58d4ac2d1f739dd207fad3600b03555d2b8d14dc1b3e72
SHA5120d8980039a8423e24b8c1a9bc12e957208f67e170bbc375a316f67b392c3adafdd87840b289e6423c72f799e8f43125b1a68ebd34d7ab65f80479e4c1d715acd
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
\Users\Admin\AppData\Local\Temp\._cache_beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe
Filesize2.2MB
MD5df120835055502a2ce84d5a940c674df
SHA134d236ea317a34e0db73ce6368bebba4a44a8e8e
SHA2562919bbf9a5c612d1fd4690e07802e4333cbd716740d9035c36dc23ec50f1dac6
SHA51200af7184debd9ba43c6819bd559a02443353f303ab611cb1d28219b646f300d53a0654259002f6953a1d3df59c5c1fa1a45520fc48b2647d5570ace6fc1c8316