Analysis
-
max time kernel
111s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
17-02-2025 03:18
Behavioral task
behavioral1
Sample
beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe
Resource
win10v2004-20250211-en
General
-
Target
beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe
-
Size
3.0MB
-
MD5
a1511316d3008b8c6c46a6876be6b500
-
SHA1
de33c58f1149d14d3f389a0ba77d450d49a58bda
-
SHA256
beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffc
-
SHA512
7d32831973b753a14a91fb6a33685adfb71592e386feffe5f60aa2447c095e014403656d8d9bc9689e820f932899ed6dfebee3cd8c53a76f48b1d70bd0373bf2
-
SSDEEP
49152:XnsHyjtk2MYC5GDYCqEv2nBNcZwZDpY8M5UthjfxEQuIs/JgBjCvC:Xnsmtk2a9CqUZ/OLxWIYJu
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 44 3532 Process not Found -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1318997816-2171176372-1451785247-1000\Control Panel\International\Geo\Nation beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe Key value queried \REGISTRY\USER\S-1-5-21-1318997816-2171176372-1451785247-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 1968 ._cache_beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe 800 Synaptics.exe 432 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4412 MicrosoftEdgeUpdate.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1908 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1908 EXCEL.EXE 1908 EXCEL.EXE 1908 EXCEL.EXE 1908 EXCEL.EXE 1908 EXCEL.EXE 1908 EXCEL.EXE 1908 EXCEL.EXE 1908 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1964 wrote to memory of 1968 1964 beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe 88 PID 1964 wrote to memory of 1968 1964 beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe 88 PID 1964 wrote to memory of 1968 1964 beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe 88 PID 1964 wrote to memory of 800 1964 beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe 90 PID 1964 wrote to memory of 800 1964 beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe 90 PID 1964 wrote to memory of 800 1964 beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe 90 PID 800 wrote to memory of 432 800 Synaptics.exe 91 PID 800 wrote to memory of 432 800 Synaptics.exe 91 PID 800 wrote to memory of 432 800 Synaptics.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe"C:\Users\Admin\AppData\Local\Temp\beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\._cache_beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe"C:\Users\Admin\AppData\Local\Temp\._cache_beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1968
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:432
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1908
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI1IiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODMzNzEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NDE5Mjc1MzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0ODM0MDAxODAxIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4412
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD5a1511316d3008b8c6c46a6876be6b500
SHA1de33c58f1149d14d3f389a0ba77d450d49a58bda
SHA256beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffc
SHA5127d32831973b753a14a91fb6a33685adfb71592e386feffe5f60aa2447c095e014403656d8d9bc9689e820f932899ed6dfebee3cd8c53a76f48b1d70bd0373bf2
-
C:\Users\Admin\AppData\Local\Temp\._cache_beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe
Filesize2.2MB
MD5df120835055502a2ce84d5a940c674df
SHA134d236ea317a34e0db73ce6368bebba4a44a8e8e
SHA2562919bbf9a5c612d1fd4690e07802e4333cbd716740d9035c36dc23ec50f1dac6
SHA51200af7184debd9ba43c6819bd559a02443353f303ab611cb1d28219b646f300d53a0654259002f6953a1d3df59c5c1fa1a45520fc48b2647d5570ace6fc1c8316
-
Filesize
20KB
MD5346260d8663deb47d4234d16da56621f
SHA1108d8ebf84dc2561c78dae241c7540cd9c9339be
SHA256dc650aebd7b355c376f109a89ae1c54c102d14aa3a54934664f2611d6b2abfe5
SHA512024ef4780fdfa2bf3c78990a129e69a801d042892c81cbb371ae573705cb4958c941bd915373ec9388e05532a2a55dd7c384dfb3ee816435930c5f0c3b2a7c12
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04