Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2025, 09:34
Behavioral task
behavioral1
Sample
RUNMEFIRST.exe
Resource
win10v2004-20250410-en
General
-
Target
RUNMEFIRST.exe
-
Size
25.0MB
-
MD5
702fe0f78a8710721d8b2e19b9eacffd
-
SHA1
526188c754dbbabf43b1b33a37578496a5b5e859
-
SHA256
c5a2b12a61b5e60516640b7a465013bce5507dbfb84269775ca899ebb1fde6ac
-
SHA512
c14623467ce8c4ab857f3239d29780c58daea9f866f124f6adb5013738411841d250c94141908e96d466fe866372706696eac9d8493ec6ba72af771d7ad20927
-
SSDEEP
786432:mrp+Ty2SfUfnbu+zMFy/7zYgWXRLTArzttOaaFL:ap+Ty2SfWnPzMFO7zYgWBLbFL
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2645532622-3298555945-705856666-1000\Control Panel\International\Geo\Nation RUNMEFIRST.exe Key value queried \REGISTRY\USER\S-1-5-21-2645532622-3298555945-705856666-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-2645532622-3298555945-705856666-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 8 IoCs
pid Process 6116 ._cache_RUNMEFIRST.exe 4532 ._cache_RUNMEFIRST.exe 4800 Synaptics.exe 4812 Synaptics.exe 4932 ._cache_Synaptics.exe 396 ._cache_Synaptics.exe 5948 ._cache_Synaptics.exe 3564 ._cache_Synaptics.exe -
Loads dropped DLL 3 IoCs
pid Process 4532 ._cache_RUNMEFIRST.exe 5948 ._cache_Synaptics.exe 3564 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" RUNMEFIRST.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\._cache_Synaptics.exe Synaptics.exe File opened for modification C:\Windows\SysWOW64\._cache_Synaptics.exe Synaptics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RUNMEFIRST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_RUNMEFIRST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_RUNMEFIRST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RUNMEFIRST.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4324 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 4324 EXCEL.EXE 4324 EXCEL.EXE 4324 EXCEL.EXE 4324 EXCEL.EXE 4324 EXCEL.EXE 4324 EXCEL.EXE 4324 EXCEL.EXE 4324 EXCEL.EXE 4324 EXCEL.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 876 wrote to memory of 6116 876 RUNMEFIRST.exe 83 PID 876 wrote to memory of 6116 876 RUNMEFIRST.exe 83 PID 876 wrote to memory of 6116 876 RUNMEFIRST.exe 83 PID 6116 wrote to memory of 4532 6116 ._cache_RUNMEFIRST.exe 86 PID 6116 wrote to memory of 4532 6116 ._cache_RUNMEFIRST.exe 86 PID 6116 wrote to memory of 4532 6116 ._cache_RUNMEFIRST.exe 86 PID 876 wrote to memory of 4800 876 RUNMEFIRST.exe 87 PID 876 wrote to memory of 4800 876 RUNMEFIRST.exe 87 PID 876 wrote to memory of 4800 876 RUNMEFIRST.exe 87 PID 208 wrote to memory of 4812 208 cmd.exe 88 PID 208 wrote to memory of 4812 208 cmd.exe 88 PID 208 wrote to memory of 4812 208 cmd.exe 88 PID 4800 wrote to memory of 4932 4800 Synaptics.exe 89 PID 4800 wrote to memory of 4932 4800 Synaptics.exe 89 PID 4800 wrote to memory of 4932 4800 Synaptics.exe 89 PID 4812 wrote to memory of 396 4812 Synaptics.exe 90 PID 4812 wrote to memory of 396 4812 Synaptics.exe 90 PID 4812 wrote to memory of 396 4812 Synaptics.exe 90 PID 4932 wrote to memory of 5948 4932 ._cache_Synaptics.exe 92 PID 4932 wrote to memory of 5948 4932 ._cache_Synaptics.exe 92 PID 4932 wrote to memory of 5948 4932 ._cache_Synaptics.exe 92 PID 396 wrote to memory of 3564 396 ._cache_Synaptics.exe 93 PID 396 wrote to memory of 3564 396 ._cache_Synaptics.exe 93 PID 396 wrote to memory of 3564 396 ._cache_Synaptics.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\RUNMEFIRST.exe"C:\Users\Admin\AppData\Local\Temp\RUNMEFIRST.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Users\Admin\AppData\Local\Temp\._cache_RUNMEFIRST.exe"C:\Users\Admin\AppData\Local\Temp\._cache_RUNMEFIRST.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:6116 -
C:\Windows\Temp\{4B71F1C9-D01B-435A-8059-C2E990037997}\.cr\._cache_RUNMEFIRST.exe"C:\Windows\Temp\{4B71F1C9-D01B-435A-8059-C2E990037997}\.cr\._cache_RUNMEFIRST.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\._cache_RUNMEFIRST.exe" -burn.filehandle.attached=540 -burn.filehandle.self=6883⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4532
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\Temp\{5C177456-C05C-45EA-B5F8-56B7F08FE6DA}\.cr\._cache_Synaptics.exe"C:\Windows\Temp\{5C177456-C05C-45EA-B5F8-56B7F08FE6DA}\.cr\._cache_Synaptics.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" -burn.filehandle.attached=540 -burn.filehandle.self=548 InjUpdate4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5948
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\Synaptics\Synaptics.exe1⤵
- Suspicious use of WriteProcessMemory
PID:208 -
C:\ProgramData\Synaptics\Synaptics.exeC:\ProgramData\Synaptics\Synaptics.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\._cache_Synaptics.exe"C:\Windows\system32\._cache_Synaptics.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\Temp\{A186B80F-48BD-4D50-BF64-8B706E900833}\.cr\._cache_Synaptics.exe"C:\Windows\Temp\{A186B80F-48BD-4D50-BF64-8B706E900833}\.cr\._cache_Synaptics.exe" -burn.clean.room="C:\Windows\SysWOW64\._cache_Synaptics.exe" -burn.filehandle.attached=540 -burn.filehandle.self=5484⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3564
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4324
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25.0MB
MD5702fe0f78a8710721d8b2e19b9eacffd
SHA1526188c754dbbabf43b1b33a37578496a5b5e859
SHA256c5a2b12a61b5e60516640b7a465013bce5507dbfb84269775ca899ebb1fde6ac
SHA512c14623467ce8c4ab857f3239d29780c58daea9f866f124f6adb5013738411841d250c94141908e96d466fe866372706696eac9d8493ec6ba72af771d7ad20927
-
Filesize
24.2MB
MD5101b0b9f74cdc6cdbd2570bfe92e302c
SHA12e6bae42c2842b4f558bd68099479b929bb7d910
SHA2564dfe83c91124cd542f4222fe2c396cabeac617bb6f59bdcbdf89fd6f0df0a32f
SHA512ccf4fd7da2c3440f1bc7fcac67c8a12599eab8d5c015affdc2e439fa30f5c7868ef5f52ede058361faae37ccc4af2c17c0adf30b8e1f852bb7106d0ec7162506
-
Filesize
22KB
MD518c36e758fcbc2b9391e2abc364eafe4
SHA11a221867687cb76cc6f74b46472e44e5ed0fa954
SHA25697f628edd6736c38754e12a3398cca06a2dae9118e7f68b62af3f4cca54c9039
SHA5123a909c228d7c8974668e075adc295d7d6be47880b9e26ba6c8726e01da2e8abc152a0f2ef64c3cea8a9bf7ef42748da893ecc7b31b05dcec0ce6d0487d84bc8f
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
635KB
MD553e9222bc438cbd8b7320f800bef2e78
SHA1c4f295d8855b4b16c7450a4a9150eb95046f6390
SHA2560e49026767420229afd23b1352cf9f97f24e0768c3d527000d449ffdb4ca6888
SHA5127533f9791e1807072a4dbb6ca03c696b12dfa5337678fab53aceea0e4b7e5ffefb90c9b450ac80878e1e9a4bce549f619da4cd2d06eb2554c9add5b4ec838b4a
-
Filesize
14KB
MD53dc35814d02aa3cda14d33741beadfb3
SHA1c9dbe3823d81f40ab59a12f3878b7a22925c0f33
SHA256f7164dea282b868c1eca482034c79c13eb4649f917ca0b4976370b335ee52739
SHA512648da2404d24cdc66315eb2823c09639ad8e40318291d22c6d114a967f1480ee7085173855269d0c342294700745838273d45e78278f8524748a67c92850ad82
-
Filesize
9KB
MD504b33f0a9081c10e85d0e495a1294f83
SHA11efe2fb2d014a731b752672745f9ffecdd716412
SHA2568099dc3cf9502c335da829e5c755948a12e3e6de490eb492a99deb673d883d8b
SHA512d1dbed00df921169dd61501e2a3e95e6d7807348b188be9dd8fc63423501e4d848ece19ac466c3cacfccc6084e0eb2f457dc957990f6f511df10fd426e432685
-
Filesize
2KB
MD5fbfcbc4dacc566a3c426f43ce10907b6
SHA163c45f9a771161740e100faf710f30eed017d723
SHA25670400f181d00e1769774ff36bcd8b1ab5fbc431418067d31b876d18cc04ef4ce
SHA512063fb6685ee8d2fa57863a74d66a83c819fe848ba3072b6e7d1b4fe397a9b24a1037183bb2fda776033c0936be83888a6456aae947e240521e2ab75d984ee35e
-
Filesize
8KB
MD5f62729c6d2540015e072514226c121c7
SHA1c1e189d693f41ac2eafcc363f7890fc0fea6979c
SHA256f13bae0ec08c91b4a315bb2d86ee48fade597e7a5440dce6f751f98a3a4d6916
SHA512cbbfbfa7e013a2b85b78d71d32fdf65323534816978e7544ca6cea5286a0f6e8e7e5ffc4c538200211f11b94373d5658732d5d8aa1d01f9ccfdbf20f154f1471
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
191KB
MD5eab9caf4277829abdf6223ec1efa0edd
SHA174862ecf349a9bedd32699f2a7a4e00b4727543d
SHA256a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041
SHA51245b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2