Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-02-2025 11:39
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Loader.exe
Resource
win10v2004-20250217-en
General
-
Target
Loader.exe
-
Size
773KB
-
MD5
61fc70e411c67a361a29a477b45d0699
-
SHA1
1e70bb1eacbbfaf4c1efa45b639e1f1f9b1a56ff
-
SHA256
fcfaedcd7aec7af6a21ae11d5deffb5392c4e8af1de18f14e0c69a6ffd965eaa
-
SHA512
be301e0375fcf78c5513abb6be5a5ea16c93fbe7450bcd5dc4e2912a3124603f05b21566a3f4e445cca830e78ec95ade66e46731dd43664a05e1c23e11fa9004
-
SSDEEP
12288:2MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V93Aj:2nsJ39LyjbJkQFMhmC+6GD9A
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
resource behavioral1/files/0x00060000000195c3-102.dat -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Illyrian Loader.exe ._cache_Synaptics.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Illyrian Loader.exe ._cache_Synaptics.exe -
Executes dropped EXE 5 IoCs
pid Process 2956 ._cache_Loader.exe 2872 Synaptics.exe 2628 ._cache_Synaptics.exe 1312 Illyrian Loader.exe 1348 Illyrian Loader.exe -
Loads dropped DLL 7 IoCs
pid Process 576 Loader.exe 576 Loader.exe 576 Loader.exe 576 Loader.exe 2872 Synaptics.exe 2872 Synaptics.exe 2872 Synaptics.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" Loader.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\e74f306ac06296e4255b2f2cb2797558 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\Illyrian Loader.exe" ._cache_Synaptics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\e74f306ac06296e4255b2f2cb2797558 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\Illyrian Loader.exe" ._cache_Loader.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\e74f306ac06296e4255b2f2cb2797558 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\Illyrian Loader.exe" Illyrian Loader.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\e74f306ac06296e4255b2f2cb2797558 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\Illyrian Loader.exe" Illyrian Loader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2752 EXCEL.EXE 1348 Illyrian Loader.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2752 EXCEL.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 576 wrote to memory of 2956 576 Loader.exe 30 PID 576 wrote to memory of 2956 576 Loader.exe 30 PID 576 wrote to memory of 2956 576 Loader.exe 30 PID 576 wrote to memory of 2956 576 Loader.exe 30 PID 576 wrote to memory of 2872 576 Loader.exe 31 PID 576 wrote to memory of 2872 576 Loader.exe 31 PID 576 wrote to memory of 2872 576 Loader.exe 31 PID 576 wrote to memory of 2872 576 Loader.exe 31 PID 2872 wrote to memory of 2628 2872 Synaptics.exe 32 PID 2872 wrote to memory of 2628 2872 Synaptics.exe 32 PID 2872 wrote to memory of 2628 2872 Synaptics.exe 32 PID 2872 wrote to memory of 2628 2872 Synaptics.exe 32 PID 2956 wrote to memory of 1312 2956 ._cache_Loader.exe 34 PID 2956 wrote to memory of 1312 2956 ._cache_Loader.exe 34 PID 2956 wrote to memory of 1312 2956 ._cache_Loader.exe 34 PID 2628 wrote to memory of 1348 2628 ._cache_Synaptics.exe 35 PID 2628 wrote to memory of 1348 2628 ._cache_Synaptics.exe 35 PID 2628 wrote to memory of 1348 2628 ._cache_Synaptics.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Users\Admin\AppData\Local\Temp\._cache_Loader.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Loader.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\Microsoft\Illyrian Loader.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft\Illyrian Loader.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1312
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\Microsoft\Illyrian Loader.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft\Illyrian Loader.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
PID:1348
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
773KB
MD561fc70e411c67a361a29a477b45d0699
SHA11e70bb1eacbbfaf4c1efa45b639e1f1f9b1a56ff
SHA256fcfaedcd7aec7af6a21ae11d5deffb5392c4e8af1de18f14e0c69a6ffd965eaa
SHA512be301e0375fcf78c5513abb6be5a5ea16c93fbe7450bcd5dc4e2912a3124603f05b21566a3f4e445cca830e78ec95ade66e46731dd43664a05e1c23e11fa9004
-
Filesize
20KB
MD569fc4445680ba8d528b9375a51b64a5f
SHA16bb0d2700109720c39857cba23ae4dbf042a991a
SHA256260738a960c38e729df6c08d45b6f396c37f0b2887d0fb541dbf58e3f0b2dceb
SHA5124225558650fd346b510449a5b9d07103037dce292ebdea296959f6e8437c9124e6aad446c309da201789f422822bf7b58c66aec3d2a6be77d4f837cc14a97408
-
Filesize
21KB
MD5122247f0491609e196f2be8ebcd073d4
SHA1b36536b3444fdca29ce86f998e8abfb41b6a5f1b
SHA256a6b244019db937f3739bd3747653f4266590a22f1de7255ab84e9f6e9ab70bd6
SHA51244018480faa3e0d306e6876ebbe176193bf9d4d10f0e1786648aac81b11b4c1a9d1dce3c4309a585a2b413a1a6be5c57c4194f62658a80c66fda3c9b25de5d7b
-
Filesize
25KB
MD5a1a20555ffde1d763394a12217a7b89b
SHA1dbe0fc15a631fddc67f406536d4d7f78c8c17b9e
SHA256d2517bdb3f7d790a46d1b50309027e6a84e3c1ee983d47292885e1147d1eca5e
SHA51239f5b57b685cbcccf3c2841e92a5206e97da0e7fec33c7367ae15bf6da25de6f2174691e40d9fb136b041088bd2ba4f0c3f54144281a8f41317d1f06ae07314f
-
Filesize
23KB
MD54b10d1c39ff5b9616d4d6a24ce338d8e
SHA1abe1b4c652ba7e83228cefc7c909e80ea8c3f12a
SHA256f022a013a87348c8229be0f2efb4e7f8b7785d9836ea18b18df889064ca4f532
SHA512cbef59f0858f2a0b724eacdde3fe46acead1ff5bd2b6f06533389379774d9fcaec37ba34607194db5b008856802ddd506bb95c1d5fad718172bf311faeef93a2
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04