Analysis

  • max time kernel
    51s
  • max time network
    44s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • submitted
    05/09/2024, 00:55

General

  • Target

    KoalageddonInstaller.exe

  • Size

    3.6MB

  • MD5

    8409990c16c5003e804b40bb4f8d8fa7

  • SHA1

    2d6d5458bc2caade8019a09f9cdc8cb9bbc59620

  • SHA256

    e820e5072dddccf820e043634f226ee0223fb5d0473c575f39eb88fce647d477

  • SHA512

    b5da43ad3d24d8c23603af8ef7c78b108f2cdd253464347c844a552a4f213895cf0955a67147c384538ac1b069254e2af535064130b44219962fa12debfcd8f9

  • SSDEEP

    98304:cnsmtk2aLSilkJ/FKZvpG+H++f+DidXvh6d204OOR5q2S:yLtuZvvH+XgJ6M8YYV

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\KoalageddonInstaller.exe
    "C:\Users\Admin\AppData\Local\Temp\KoalageddonInstaller.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4760
    • C:\Users\Admin\AppData\Local\Temp\._cache_KoalageddonInstaller.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_KoalageddonInstaller.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2016
      • C:\Users\Admin\AppData\Local\Temp\is-3F1D1.tmp\._cache_KoalageddonInstaller.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-3F1D1.tmp\._cache_KoalageddonInstaller.tmp" /SL5="$50286,2244670,780800,C:\Users\Admin\AppData\Local\Temp\._cache_KoalageddonInstaller.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3684
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1844
      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1824
        • C:\Users\Admin\AppData\Local\Temp\is-IS39P.tmp\._cache_Synaptics.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-IS39P.tmp\._cache_Synaptics.tmp" /SL5="$70282,2244670,780800,C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          PID:1196
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2224

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Synaptics\Synaptics.exe

          Filesize

          3.6MB

          MD5

          8409990c16c5003e804b40bb4f8d8fa7

          SHA1

          2d6d5458bc2caade8019a09f9cdc8cb9bbc59620

          SHA256

          e820e5072dddccf820e043634f226ee0223fb5d0473c575f39eb88fce647d477

          SHA512

          b5da43ad3d24d8c23603af8ef7c78b108f2cdd253464347c844a552a4f213895cf0955a67147c384538ac1b069254e2af535064130b44219962fa12debfcd8f9

        • C:\Users\Admin\AppData\Local\Programs\Koalageddon\IntegrationWizard32.exe

          Filesize

          614KB

          MD5

          8d188050b9e4c0a5f0f24fcea65b1133

          SHA1

          3b1d04ee1adec2cd53d8721aee45fc112b5700da

          SHA256

          6c2e59b3ecc0e453a141e7229e25cafeb286ebe27c0c68096c18bfb3ce97b50a

          SHA512

          e220c535bd4bcc6897eb892e5731ad6e78ffb6d642dffb2ae104e8b5d642cdb53bd2a8e3e90ca62c7b199f85559467f2af0ebee62c1e75b3ca5e2e90c1b53ba8

        • C:\Users\Admin\AppData\Local\Temp\._cache_KoalageddonInstaller.exe

          Filesize

          2.9MB

          MD5

          238691250a5960beb04574bbb4ba069c

          SHA1

          f4f3b5fa7e0edd6aa99587aedfe9dd89a3b582f0

          SHA256

          6e027b8d745ea9ef349493f65d12347d090b2a6ae7b0162b4f8c9c801a82b7f9

          SHA512

          941ed390d9fd374c15c26e3027609567f217d0069b8a248c1ae649d5516fd2bf2e6be2ba7547526bd215c727e31ec0c83068d138b585b2b408c157930a3bfb3e

        • C:\Users\Admin\AppData\Local\Temp\is-3F1D1.tmp\._cache_KoalageddonInstaller.tmp

          Filesize

          2.9MB

          MD5

          094deb38ab94632c639192a61a62e820

          SHA1

          aeb88d8bf73632dd17dec410054cc7e3bd9ac6f3

          SHA256

          47feec7d162557b5b989280d6f57bbd44c976d24063d5fe01a68bb4c230cc610

          SHA512

          8795268aef7c405ed05c522b63cd80519098207fca5ba02281d9a79082ae4b34b5ee8b8648ac1a9782e7f63c53fbdf561f434ec8c97b3f6bb0cd33cc4b96b8ea

        • C:\Users\Admin\AppData\Local\Temp\pSTwEbmQ.xlsm

          Filesize

          17KB

          MD5

          e566fc53051035e1e6fd0ed1823de0f9

          SHA1

          00bc96c48b98676ecd67e81a6f1d7754e4156044

          SHA256

          8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

          SHA512

          a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

        • memory/1196-263-0x0000000000400000-0x00000000006EE000-memory.dmp

          Filesize

          2.9MB

        • memory/1196-228-0x0000000000400000-0x00000000006EE000-memory.dmp

          Filesize

          2.9MB

        • memory/1196-219-0x0000000000400000-0x00000000006EE000-memory.dmp

          Filesize

          2.9MB

        • memory/1824-264-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/1824-194-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/1824-218-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/1844-225-0x0000000000400000-0x00000000007AB000-memory.dmp

          Filesize

          3.7MB

        • memory/1844-216-0x0000000000400000-0x00000000007AB000-memory.dmp

          Filesize

          3.7MB

        • memory/1844-271-0x0000000000400000-0x00000000007AB000-memory.dmp

          Filesize

          3.7MB

        • memory/1844-266-0x0000000000400000-0x00000000007AB000-memory.dmp

          Filesize

          3.7MB

        • memory/2016-64-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/2016-215-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/2016-270-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/2016-72-0x0000000000401000-0x00000000004B7000-memory.dmp

          Filesize

          728KB

        • memory/2224-199-0x00007FF7EB850000-0x00007FF7EB860000-memory.dmp

          Filesize

          64KB

        • memory/2224-201-0x00007FF7EB850000-0x00007FF7EB860000-memory.dmp

          Filesize

          64KB

        • memory/2224-200-0x00007FF7EB850000-0x00007FF7EB860000-memory.dmp

          Filesize

          64KB

        • memory/2224-197-0x00007FF7EB850000-0x00007FF7EB860000-memory.dmp

          Filesize

          64KB

        • memory/2224-206-0x00007FF7E8DD0000-0x00007FF7E8DE0000-memory.dmp

          Filesize

          64KB

        • memory/2224-198-0x00007FF7EB850000-0x00007FF7EB860000-memory.dmp

          Filesize

          64KB

        • memory/2224-205-0x00007FF7E8DD0000-0x00007FF7E8DE0000-memory.dmp

          Filesize

          64KB

        • memory/3684-217-0x0000000000400000-0x00000000006EE000-memory.dmp

          Filesize

          2.9MB

        • memory/3684-268-0x0000000000400000-0x00000000006EE000-memory.dmp

          Filesize

          2.9MB

        • memory/4760-0-0x0000000002740000-0x0000000002741000-memory.dmp

          Filesize

          4KB

        • memory/4760-131-0x0000000000400000-0x00000000007AB000-memory.dmp

          Filesize

          3.7MB