Analysis
-
max time kernel
148s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
18-02-2025 11:39
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Loader.exe
Resource
win10v2004-20250217-en
General
-
Target
Loader.exe
-
Size
773KB
-
MD5
61fc70e411c67a361a29a477b45d0699
-
SHA1
1e70bb1eacbbfaf4c1efa45b639e1f1f9b1a56ff
-
SHA256
fcfaedcd7aec7af6a21ae11d5deffb5392c4e8af1de18f14e0c69a6ffd965eaa
-
SHA512
be301e0375fcf78c5513abb6be5a5ea16c93fbe7450bcd5dc4e2912a3124603f05b21566a3f4e445cca830e78ec95ade66e46731dd43664a05e1c23e11fa9004
-
SSDEEP
12288:2MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V93Aj:2nsJ39LyjbJkQFMhmC+6GD9A
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation Loader.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation ._cache_Loader.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Illyrian Loader.exe ._cache_Loader.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Illyrian Loader.exe ._cache_Loader.exe -
Executes dropped EXE 5 IoCs
pid Process 4220 ._cache_Loader.exe 3052 Synaptics.exe 3404 Illyrian Loader.exe 4912 ._cache_Synaptics.exe 3556 Illyrian Loader.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" Loader.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e74f306ac06296e4255b2f2cb2797558 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\Illyrian Loader.exe" ._cache_Loader.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e74f306ac06296e4255b2f2cb2797558 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\Illyrian Loader.exe" Illyrian Loader.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e74f306ac06296e4255b2f2cb2797558 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\Illyrian Loader.exe" ._cache_Synaptics.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e74f306ac06296e4255b2f2cb2797558 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\Illyrian Loader.exe" Illyrian Loader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Loader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3404 Illyrian Loader.exe 4872 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4872 EXCEL.EXE 4872 EXCEL.EXE 4872 EXCEL.EXE 4872 EXCEL.EXE 4872 EXCEL.EXE 4872 EXCEL.EXE 4872 EXCEL.EXE 4872 EXCEL.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1488 wrote to memory of 4220 1488 Loader.exe 87 PID 1488 wrote to memory of 4220 1488 Loader.exe 87 PID 1488 wrote to memory of 3052 1488 Loader.exe 88 PID 1488 wrote to memory of 3052 1488 Loader.exe 88 PID 1488 wrote to memory of 3052 1488 Loader.exe 88 PID 4220 wrote to memory of 3404 4220 ._cache_Loader.exe 89 PID 4220 wrote to memory of 3404 4220 ._cache_Loader.exe 89 PID 3052 wrote to memory of 4912 3052 Synaptics.exe 90 PID 3052 wrote to memory of 4912 3052 Synaptics.exe 90 PID 4912 wrote to memory of 3556 4912 ._cache_Synaptics.exe 91 PID 4912 wrote to memory of 3556 4912 ._cache_Synaptics.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\._cache_Loader.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Loader.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\Microsoft\Illyrian Loader.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft\Illyrian Loader.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
PID:3404
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\Microsoft\Illyrian Loader.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft\Illyrian Loader.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3556
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
773KB
MD561fc70e411c67a361a29a477b45d0699
SHA11e70bb1eacbbfaf4c1efa45b639e1f1f9b1a56ff
SHA256fcfaedcd7aec7af6a21ae11d5deffb5392c4e8af1de18f14e0c69a6ffd965eaa
SHA512be301e0375fcf78c5513abb6be5a5ea16c93fbe7450bcd5dc4e2912a3124603f05b21566a3f4e445cca830e78ec95ade66e46731dd43664a05e1c23e11fa9004
-
Filesize
20KB
MD569fc4445680ba8d528b9375a51b64a5f
SHA16bb0d2700109720c39857cba23ae4dbf042a991a
SHA256260738a960c38e729df6c08d45b6f396c37f0b2887d0fb541dbf58e3f0b2dceb
SHA5124225558650fd346b510449a5b9d07103037dce292ebdea296959f6e8437c9124e6aad446c309da201789f422822bf7b58c66aec3d2a6be77d4f837cc14a97408
-
Filesize
22KB
MD5131cdc50a5bf6ffd15f4ce2915afe689
SHA14cf4d9ed8819390999fd93d6d304575580b1ed71
SHA256e95e71d70cae0334bb8c6f07fc89b7f26ced6a570cfad6582bd18c840b25f2aa
SHA512f7cc018c094736b25d420d2ab9cd9d73c7bbf6fb24e6def82f8f809ad5d20137de7bda5f91fdb3490f496a25ab98197efb80229f43c06865c434199ab3a391ba
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04