Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24/02/2025, 05:46
Behavioral task
behavioral1
Sample
bf5af2ea08413353edb66afbcdbf2cd4b99ac148c9360b784895a9e9bbc44cdd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bf5af2ea08413353edb66afbcdbf2cd4b99ac148c9360b784895a9e9bbc44cdd.exe
Resource
win10v2004-20250217-en
General
-
Target
bf5af2ea08413353edb66afbcdbf2cd4b99ac148c9360b784895a9e9bbc44cdd.exe
-
Size
959KB
-
MD5
666988e7b77645d3bb336ac1172a0f68
-
SHA1
57b059a71dcc830ae9321f45df49553905673b81
-
SHA256
bf5af2ea08413353edb66afbcdbf2cd4b99ac148c9360b784895a9e9bbc44cdd
-
SHA512
6f07956b4427ad30f309ea839c05238ff0ef6a0b42bbc6015b28b94b57b8abcd8d76f126139127ade1f9ccf312060034b2bdeecf1290bf48c01b1c88caef6262
-
SSDEEP
12288:6MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V94Ht6WvPOglY:6nsJ39LyjbJkQFMhmC+6GD9aJf2
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
resource behavioral1/files/0x00070000000173aa-83.dat -
Executes dropped EXE 3 IoCs
pid Process 2476 ._cache_bf5af2ea08413353edb66afbcdbf2cd4b99ac148c9360b784895a9e9bbc44cdd.exe 2304 Synaptics.exe 2964 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 2032 bf5af2ea08413353edb66afbcdbf2cd4b99ac148c9360b784895a9e9bbc44cdd.exe 2032 bf5af2ea08413353edb66afbcdbf2cd4b99ac148c9360b784895a9e9bbc44cdd.exe 2032 bf5af2ea08413353edb66afbcdbf2cd4b99ac148c9360b784895a9e9bbc44cdd.exe 2304 Synaptics.exe 2304 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RIP crack dragonjin = "C:\\ProgramData\\Synaptics\\Synaptics.exe" bf5af2ea08413353edb66afbcdbf2cd4b99ac148c9360b784895a9e9bbc44cdd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf5af2ea08413353edb66afbcdbf2cd4b99ac148c9360b784895a9e9bbc44cdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2656 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2656 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2476 2032 bf5af2ea08413353edb66afbcdbf2cd4b99ac148c9360b784895a9e9bbc44cdd.exe 31 PID 2032 wrote to memory of 2476 2032 bf5af2ea08413353edb66afbcdbf2cd4b99ac148c9360b784895a9e9bbc44cdd.exe 31 PID 2032 wrote to memory of 2476 2032 bf5af2ea08413353edb66afbcdbf2cd4b99ac148c9360b784895a9e9bbc44cdd.exe 31 PID 2032 wrote to memory of 2476 2032 bf5af2ea08413353edb66afbcdbf2cd4b99ac148c9360b784895a9e9bbc44cdd.exe 31 PID 2032 wrote to memory of 2304 2032 bf5af2ea08413353edb66afbcdbf2cd4b99ac148c9360b784895a9e9bbc44cdd.exe 33 PID 2032 wrote to memory of 2304 2032 bf5af2ea08413353edb66afbcdbf2cd4b99ac148c9360b784895a9e9bbc44cdd.exe 33 PID 2032 wrote to memory of 2304 2032 bf5af2ea08413353edb66afbcdbf2cd4b99ac148c9360b784895a9e9bbc44cdd.exe 33 PID 2032 wrote to memory of 2304 2032 bf5af2ea08413353edb66afbcdbf2cd4b99ac148c9360b784895a9e9bbc44cdd.exe 33 PID 2304 wrote to memory of 2964 2304 Synaptics.exe 34 PID 2304 wrote to memory of 2964 2304 Synaptics.exe 34 PID 2304 wrote to memory of 2964 2304 Synaptics.exe 34 PID 2304 wrote to memory of 2964 2304 Synaptics.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf5af2ea08413353edb66afbcdbf2cd4b99ac148c9360b784895a9e9bbc44cdd.exe"C:\Users\Admin\AppData\Local\Temp\bf5af2ea08413353edb66afbcdbf2cd4b99ac148c9360b784895a9e9bbc44cdd.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\._cache_bf5af2ea08413353edb66afbcdbf2cd4b99ac148c9360b784895a9e9bbc44cdd.exe"C:\Users\Admin\AppData\Local\Temp\._cache_bf5af2ea08413353edb66afbcdbf2cd4b99ac148c9360b784895a9e9bbc44cdd.exe"2⤵
- Executes dropped EXE
PID:2476
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2964
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
959KB
MD5666988e7b77645d3bb336ac1172a0f68
SHA157b059a71dcc830ae9321f45df49553905673b81
SHA256bf5af2ea08413353edb66afbcdbf2cd4b99ac148c9360b784895a9e9bbc44cdd
SHA5126f07956b4427ad30f309ea839c05238ff0ef6a0b42bbc6015b28b94b57b8abcd8d76f126139127ade1f9ccf312060034b2bdeecf1290bf48c01b1c88caef6262
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
24KB
MD52958e1781ff8381eb5e0378482efae43
SHA16370f7662d8a4a547a8af2d16d515ef1374b9373
SHA2563882ef87674c230c87401d6f06e8fe00bf19f783ccd4df842a62c2e53379ed19
SHA51213c3e3d114cf06e4fae9a17b8ed92a3789815f09c9fb7184eb3d0bddfff9f749aa3c95ca4de6dced34bf2e89005126db4016984bc2ebb1548184afb376a09131
-
Filesize
21KB
MD5f30aca122b1ca3d1647b2291f3349cd7
SHA1f5eeceb6ea57b6ce012eb220eac1d60f9ce83924
SHA2560b18163921f4cd524223aa3d58e5f05c072baf074e222996b2ef750402decae7
SHA51266ba2babba833009779ee584df025e4718f411d581f8282c51a313dd67062321a7bd54e25a0b2b61b1c85241ae2c9f5ad6be15e5a44fc944bb3f55ef393c236f
-
\Users\Admin\AppData\Local\Temp\._cache_bf5af2ea08413353edb66afbcdbf2cd4b99ac148c9360b784895a9e9bbc44cdd.exe
Filesize19KB
MD5192844353c18553b86802d1d322ff1b9
SHA1092ea958b0d310ceb1546a5dea6be5b11050aa88
SHA256383723e34309e9c87d6be606578a1c5bbb1f2fbaee94ba15eb874fb13e671b2b
SHA512dd4dbe2833b0152c9728575e25f6da8d14eb6e9baa3e7eabcdbd4829ad72dbda05638cb0983fe0634539b6c9ddd6f674d5fd255e792435458bcfd9b25f34ef3c