Overview
overview
10Static
static
10bluewing T...er.exe
windows7-x64
10bluewing T...er.exe
windows10-2004-x64
10bluewing T...er.exe
windows7-x64
1bluewing T...er.exe
windows10-2004-x64
7bluewing T...ss.exe
windows7-x64
1bluewing T...ss.exe
windows10-2004-x64
1bluewing T...er.exe
windows7-x64
1bluewing T...er.exe
windows10-2004-x64
1bluewing TS/rust.exe
windows7-x64
1bluewing TS/rust.exe
windows10-2004-x64
6bluewing T...sp.exe
windows7-x64
5bluewing T...sp.exe
windows10-2004-x64
5bluewing T...ll.exe
windows7-x64
5bluewing T...ll.exe
windows10-2004-x64
5Analysis
-
max time kernel
144s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-02-2025 14:59
Behavioral task
behavioral1
Sample
bluewing TS/BlueWing Cleaner.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
bluewing TS/BlueWing Cleaner.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
bluewing TS/Loader.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
bluewing TS/Loader.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
bluewing TS/bluewing bypass.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
bluewing TS/bluewing bypass.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
bluewing TS/bluewing woofer.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
bluewing TS/bluewing woofer.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
bluewing TS/rust.exe
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
bluewing TS/rust.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
bluewing TS/valorant esp.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
bluewing TS/valorant esp.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
bluewing TS/valorant full.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
bluewing TS/valorant full.exe
Resource
win10v2004-20250217-en
General
-
Target
bluewing TS/BlueWing Cleaner.exe
-
Size
1.2MB
-
MD5
5c4c33c0e3914d6eb4471f0a7b87c8f8
-
SHA1
fad32cd16ac549be1e019d3b683c005925ab1c3d
-
SHA256
2fdc67ad98fe3cd9e7f1f2b7b67509b3870914aa7989cc097a99bcdf7dc6574d
-
SHA512
a5007ba3918addb9569bbbb23efafd682b9c10e4f23121b96e1ab98f8beb48ec2daebbcd04406fc36e28073496cca42d430282a0bd5f3612371e5353f7333e36
-
SSDEEP
24576:3nsJ39LyjbJkQFMhmC+6GD9DF2G0bIGsRTUpCz3:3nsHyjtk2MYC5GDzh0bIGK4O
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions ._cache_BlueWing Cleaner.exe -
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools ._cache_BlueWing Cleaner.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools ._cache_Synaptics.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ._cache_BlueWing Cleaner.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ._cache_BlueWing Cleaner.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ._cache_Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 2476 ._cache_BlueWing Cleaner.exe 2960 Synaptics.exe 2660 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 1704 BlueWing Cleaner.exe 1704 BlueWing Cleaner.exe 1704 BlueWing Cleaner.exe 2960 Synaptics.exe 2960 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" BlueWing Cleaner.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ._cache_BlueWing Cleaner.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 ._cache_BlueWing Cleaner.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ._cache_Synaptics.exe -
resource yara_rule behavioral1/files/0x00070000000120fc-4.dat upx behavioral1/memory/2476-28-0x0000000000CF0000-0x0000000000D7A000-memory.dmp upx behavioral1/memory/2660-40-0x0000000000C30000-0x0000000000CBA000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BlueWing Cleaner.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_BlueWing Cleaner.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Modifies system certificate store 2 TTPs 4 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 ._cache_BlueWing Cleaner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 ._cache_Synaptics.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 ._cache_Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 ._cache_BlueWing Cleaner.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2492 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 2660 ._cache_Synaptics.exe 2476 ._cache_BlueWing Cleaner.exe 2660 ._cache_Synaptics.exe 2476 ._cache_BlueWing Cleaner.exe 2476 ._cache_BlueWing Cleaner.exe 2660 ._cache_Synaptics.exe 2476 ._cache_BlueWing Cleaner.exe 2660 ._cache_Synaptics.exe 2476 ._cache_BlueWing Cleaner.exe 2660 ._cache_Synaptics.exe 2476 ._cache_BlueWing Cleaner.exe 2660 ._cache_Synaptics.exe 2476 ._cache_BlueWing Cleaner.exe 2660 ._cache_Synaptics.exe 2476 ._cache_BlueWing Cleaner.exe 2660 ._cache_Synaptics.exe 2476 ._cache_BlueWing Cleaner.exe 2660 ._cache_Synaptics.exe 2476 ._cache_BlueWing Cleaner.exe 2660 ._cache_Synaptics.exe 2476 ._cache_BlueWing Cleaner.exe 2660 ._cache_Synaptics.exe 2476 ._cache_BlueWing Cleaner.exe 2660 ._cache_Synaptics.exe 2660 ._cache_Synaptics.exe 2476 ._cache_BlueWing Cleaner.exe 2476 ._cache_BlueWing Cleaner.exe 2660 ._cache_Synaptics.exe 2660 ._cache_Synaptics.exe 2476 ._cache_BlueWing Cleaner.exe 2476 ._cache_BlueWing Cleaner.exe 2660 ._cache_Synaptics.exe 2476 ._cache_BlueWing Cleaner.exe 2660 ._cache_Synaptics.exe 2476 ._cache_BlueWing Cleaner.exe 2660 ._cache_Synaptics.exe 2660 ._cache_Synaptics.exe 2476 ._cache_BlueWing Cleaner.exe 2476 ._cache_BlueWing Cleaner.exe 2660 ._cache_Synaptics.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2476 ._cache_BlueWing Cleaner.exe Token: SeDebugPrivilege 2660 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2492 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2476 1704 BlueWing Cleaner.exe 29 PID 1704 wrote to memory of 2476 1704 BlueWing Cleaner.exe 29 PID 1704 wrote to memory of 2476 1704 BlueWing Cleaner.exe 29 PID 1704 wrote to memory of 2476 1704 BlueWing Cleaner.exe 29 PID 1704 wrote to memory of 2960 1704 BlueWing Cleaner.exe 30 PID 1704 wrote to memory of 2960 1704 BlueWing Cleaner.exe 30 PID 1704 wrote to memory of 2960 1704 BlueWing Cleaner.exe 30 PID 1704 wrote to memory of 2960 1704 BlueWing Cleaner.exe 30 PID 2960 wrote to memory of 2660 2960 Synaptics.exe 31 PID 2960 wrote to memory of 2660 2960 Synaptics.exe 31 PID 2960 wrote to memory of 2660 2960 Synaptics.exe 31 PID 2960 wrote to memory of 2660 2960 Synaptics.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\bluewing TS\BlueWing Cleaner.exe"C:\Users\Admin\AppData\Local\Temp\bluewing TS\BlueWing Cleaner.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\bluewing TS\._cache_BlueWing Cleaner.exe"C:\Users\Admin\AppData\Local\Temp\bluewing TS\._cache_BlueWing Cleaner.exe"2⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2476
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\bluewing TS\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\bluewing TS\._cache_Synaptics.exe" InjUpdate3⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2492
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD55c4c33c0e3914d6eb4471f0a7b87c8f8
SHA1fad32cd16ac549be1e019d3b683c005925ab1c3d
SHA2562fdc67ad98fe3cd9e7f1f2b7b67509b3870914aa7989cc097a99bcdf7dc6574d
SHA512a5007ba3918addb9569bbbb23efafd682b9c10e4f23121b96e1ab98f8beb48ec2daebbcd04406fc36e28073496cca42d430282a0bd5f3612371e5353f7333e36
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
21KB
MD5d6114323c30a99df3736c7ad6271a56b
SHA107e01ecafa7a17d4cde86d13ff97de70cb122252
SHA256190809512a1e881603d020d2cde9beb98eccd0ef7cd692ac39491b9c90c61993
SHA512d4677147d1d8616b02d8da206499b5894f0eb0ae0fe10185a1ae07ebc9e154042aa4063f2fe72cc76e0863eaed2b608b39353e1731f75c4f5c1946cf3b5c8a71
-
Filesize
503KB
MD5f85ba0bd248f05f50e44a0d87e3a91c5
SHA11fba674e9fbb7c215f37a078a47d151dab8634db
SHA256f7280259daf57d720d26bcdb60419c3a18d2030eb27cd2d483f8fed410c2a02d
SHA5125ce3a8b0272869e24fd28e2296ae249bb90c314365fe0040a9bb19aadb7e10618577c2b41d176a5e728c95e95912f8b933000e06185e108fee89521264fab9eb