Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24/02/2025, 06:11
Behavioral task
behavioral1
Sample
c9e81fd2efaf016c6da6c3819fe44cd33d38e5f02a1282e7e9298f9e0b8d6cd6.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
c9e81fd2efaf016c6da6c3819fe44cd33d38e5f02a1282e7e9298f9e0b8d6cd6.exe
Resource
win10v2004-20250217-en
General
-
Target
c9e81fd2efaf016c6da6c3819fe44cd33d38e5f02a1282e7e9298f9e0b8d6cd6.exe
-
Size
961KB
-
MD5
0bad53af6f489a80233d2f1dca6dfb8d
-
SHA1
676de93880ce5f06088c091bcd37b0bebe6b63e7
-
SHA256
c9e81fd2efaf016c6da6c3819fe44cd33d38e5f02a1282e7e9298f9e0b8d6cd6
-
SHA512
8be10d688cb35d54447122c46b90f1057f7f848772f2b15ffe89b2092a36d519eef6c195675488ab3f74781c44e45993139b8fb61eaf98000723cf73f7c4984d
-
SSDEEP
12288:KMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9FHt6WvPOfY:KnsJ39LyjbJkQFMhmC+6GD9FJJ
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
pid Process 2988 ._cache_c9e81fd2efaf016c6da6c3819fe44cd33d38e5f02a1282e7e9298f9e0b8d6cd6.exe 2968 Synaptics.exe 2620 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 2844 c9e81fd2efaf016c6da6c3819fe44cd33d38e5f02a1282e7e9298f9e0b8d6cd6.exe 2844 c9e81fd2efaf016c6da6c3819fe44cd33d38e5f02a1282e7e9298f9e0b8d6cd6.exe 2844 c9e81fd2efaf016c6da6c3819fe44cd33d38e5f02a1282e7e9298f9e0b8d6cd6.exe 2968 Synaptics.exe 2968 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RIP crack dragonjin = "C:\\ProgramData\\Synaptics\\Synaptics.exe" c9e81fd2efaf016c6da6c3819fe44cd33d38e5f02a1282e7e9298f9e0b8d6cd6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c9e81fd2efaf016c6da6c3819fe44cd33d38e5f02a1282e7e9298f9e0b8d6cd6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2412 EXCEL.EXE -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2988 ._cache_c9e81fd2efaf016c6da6c3819fe44cd33d38e5f02a1282e7e9298f9e0b8d6cd6.exe 2620 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2412 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2988 2844 c9e81fd2efaf016c6da6c3819fe44cd33d38e5f02a1282e7e9298f9e0b8d6cd6.exe 30 PID 2844 wrote to memory of 2988 2844 c9e81fd2efaf016c6da6c3819fe44cd33d38e5f02a1282e7e9298f9e0b8d6cd6.exe 30 PID 2844 wrote to memory of 2988 2844 c9e81fd2efaf016c6da6c3819fe44cd33d38e5f02a1282e7e9298f9e0b8d6cd6.exe 30 PID 2844 wrote to memory of 2988 2844 c9e81fd2efaf016c6da6c3819fe44cd33d38e5f02a1282e7e9298f9e0b8d6cd6.exe 30 PID 2844 wrote to memory of 2968 2844 c9e81fd2efaf016c6da6c3819fe44cd33d38e5f02a1282e7e9298f9e0b8d6cd6.exe 31 PID 2844 wrote to memory of 2968 2844 c9e81fd2efaf016c6da6c3819fe44cd33d38e5f02a1282e7e9298f9e0b8d6cd6.exe 31 PID 2844 wrote to memory of 2968 2844 c9e81fd2efaf016c6da6c3819fe44cd33d38e5f02a1282e7e9298f9e0b8d6cd6.exe 31 PID 2844 wrote to memory of 2968 2844 c9e81fd2efaf016c6da6c3819fe44cd33d38e5f02a1282e7e9298f9e0b8d6cd6.exe 31 PID 2968 wrote to memory of 2620 2968 Synaptics.exe 32 PID 2968 wrote to memory of 2620 2968 Synaptics.exe 32 PID 2968 wrote to memory of 2620 2968 Synaptics.exe 32 PID 2968 wrote to memory of 2620 2968 Synaptics.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9e81fd2efaf016c6da6c3819fe44cd33d38e5f02a1282e7e9298f9e0b8d6cd6.exe"C:\Users\Admin\AppData\Local\Temp\c9e81fd2efaf016c6da6c3819fe44cd33d38e5f02a1282e7e9298f9e0b8d6cd6.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\._cache_c9e81fd2efaf016c6da6c3819fe44cd33d38e5f02a1282e7e9298f9e0b8d6cd6.exe"C:\Users\Admin\AppData\Local\Temp\._cache_c9e81fd2efaf016c6da6c3819fe44cd33d38e5f02a1282e7e9298f9e0b8d6cd6.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2988
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2620
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
961KB
MD50bad53af6f489a80233d2f1dca6dfb8d
SHA1676de93880ce5f06088c091bcd37b0bebe6b63e7
SHA256c9e81fd2efaf016c6da6c3819fe44cd33d38e5f02a1282e7e9298f9e0b8d6cd6
SHA5128be10d688cb35d54447122c46b90f1057f7f848772f2b15ffe89b2092a36d519eef6c195675488ab3f74781c44e45993139b8fb61eaf98000723cf73f7c4984d
-
C:\Users\Admin\AppData\Local\Temp\._cache_c9e81fd2efaf016c6da6c3819fe44cd33d38e5f02a1282e7e9298f9e0b8d6cd6.exe
Filesize22KB
MD5e75998f1ceb64df02773a27805f07f82
SHA10fd62d53d110963e506f6612888694b1e116866c
SHA256f6969effc3f0b3dded148f1705c69810550f3ab78ae995bdeab1727823327742
SHA512d31ffbf7f11c4683e049599300f25ebd9ae14a64ae84232ccd9217cc4ca4135031c4d20b7be9811c0f0de67c383ebde9ec686cd7f76cb66ca344cdc4ca32d034
-
Filesize
20KB
MD56cff88c265aa190ae28dccca23246139
SHA171e5feeb4da8d694f4edd01e8d21edfdbf032e6b
SHA256f3b8b7861e2636ac68f1fd5ad1fae709e32efb90acd3ee487828353205702b4e
SHA5128bd02dc0e98edc844da1a234e4f172f864b534a57809653ff14f997f2f75462629e5b0dee93d5a434a60807e5fe763e8f43bc5a9439c5bbf083612a98e26d755
-
Filesize
22KB
MD54fed21964acb31407af64bce6bdae4e6
SHA143766b3a58b3c65af697b8ca010abd7a2b2b734c
SHA256eea35dff4d80be6b0f4a8a186c80bdac8b722016f049ac72bdc6e7d849427492
SHA512d3f4788b25c20b43e15b259085ad343217b183d6de2630576eb0d75765fc1b5350dc12d3ca27a1425bb3caf30b7bdb1a9099657ff53081216e0a58de0cba78e9
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04