Analysis

  • max time kernel
    112s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • submitted
    02-10-2024 01:22

General

  • Target

    60e26db1295e761743202849b2fc4e658997e1d6e427336fcd2ebedb344f3c3eN.exe

  • Size

    3.8MB

  • MD5

    b76ee79acb617308714ce10c9694aaf0

  • SHA1

    96463bbfc64d062ae413944d54de71d032cfdb28

  • SHA256

    60e26db1295e761743202849b2fc4e658997e1d6e427336fcd2ebedb344f3c3e

  • SHA512

    0a1c786c5d89532378a74444c92cf30b3e9cdc2902d4a3db25a007f04c2a1ed5d2f8038fcf9ae44517035c94c09fbb039e86d5729e8f59e5fcbab3ad1ac77f04

  • SSDEEP

    49152:RnsHyjtk2MYC5GDou5ThGzaxEueKvnGrskbj4Vp75Y:Rnsmtk2awTc8G3om

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 20 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\60e26db1295e761743202849b2fc4e658997e1d6e427336fcd2ebedb344f3c3eN.exe
    "C:\Users\Admin\AppData\Local\Temp\60e26db1295e761743202849b2fc4e658997e1d6e427336fcd2ebedb344f3c3eN.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Users\Admin\AppData\Local\Temp\._cache_60e26db1295e761743202849b2fc4e658997e1d6e427336fcd2ebedb344f3c3eN.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_60e26db1295e761743202849b2fc4e658997e1d6e427336fcd2ebedb344f3c3eN.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:3472
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3484
      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:612
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    3.8MB

    MD5

    b76ee79acb617308714ce10c9694aaf0

    SHA1

    96463bbfc64d062ae413944d54de71d032cfdb28

    SHA256

    60e26db1295e761743202849b2fc4e658997e1d6e427336fcd2ebedb344f3c3e

    SHA512

    0a1c786c5d89532378a74444c92cf30b3e9cdc2902d4a3db25a007f04c2a1ed5d2f8038fcf9ae44517035c94c09fbb039e86d5729e8f59e5fcbab3ad1ac77f04

  • C:\Users\Admin\AppData\Local\StarJIeuSoft\._cache_60e26db1295e76174_Url_3etqvddj31dkfvhpwqztan1krccnfjhm\1.2.1.0\1z4auzf4.newcfg

    Filesize

    1KB

    MD5

    08db4071e3953bfed5cfe4775879f2f2

    SHA1

    838e599002ca3974c1f1b35daf5b58d18b5f419f

    SHA256

    6fe1f2c29e61ba25cbd59ffdd988a6f2a9c1a66de40be93bf32ae1d6be5b1919

    SHA512

    cba8ec11a755a97853b95b88d60b1488afd75012dd9d9971abbf816ae2d46b6f34b88394feb980f3067b5d2a8a50e597b6ec7f421823f1864144bad863c67486

  • C:\Users\Admin\AppData\Local\StarJIeuSoft\._cache_60e26db1295e76174_Url_3etqvddj31dkfvhpwqztan1krccnfjhm\1.2.1.0\aker0he0.newcfg

    Filesize

    943B

    MD5

    cfb32b6f8e8bb8381f0e3983c1dc0e38

    SHA1

    806770b83e32d682d6980b331666790b0a1732d4

    SHA256

    84a6fd1db7591dfdadcbf25bba043088be5077064d4e0f375769d38f2ad8d078

    SHA512

    a2722af3e4f6a92690a73e5e1a02445c84704d1db967ba1aa81a1b9ca77a25b9969b1d686fbb41c18330f4f568e2d7ab44d4af6890fd1385cbcf41ff1287c112

  • C:\Users\Admin\AppData\Local\StarJIeuSoft\._cache_60e26db1295e76174_Url_3etqvddj31dkfvhpwqztan1krccnfjhm\1.2.1.0\qwav2zo5.newcfg

    Filesize

    1KB

    MD5

    515a6495ab331fa1383ce7753c040988

    SHA1

    e55dc6f0b3666caafc8b6259ccb3381f3119aea7

    SHA256

    8841330a1bcbc4c413eb5ae8630f3be3eb92bc7dd38f4d5a21b0e086f5d037fd

    SHA512

    af138f9995f398da4ed05bbb92a1f043a19b60e2002860b6f34c701d788c36b3ccb35e8e6684fc7553c97f5f61529fd9651b6bea50411b97a89373b6e5dbcf7b

  • C:\Users\Admin\AppData\Local\StarJIeuSoft\._cache_60e26db1295e76174_Url_3etqvddj31dkfvhpwqztan1krccnfjhm\1.2.1.0\user.config

    Filesize

    826B

    MD5

    1369b36b1e24dda53ab870bab91a9b7a

    SHA1

    94bbad89cabea6fd15a2152db076f03bc54c6c30

    SHA256

    105e6e88d2db4c7bcc084b871c03cf3fa8bbdc269a797b6c67cca65b2569fdee

    SHA512

    b4549c593051d0eaeb82b70ba21fbaf0b14b199148de8920d12efd2d395c5eac7a15fca0ff98f4e63a2da12cb4a52a7bebb4e182a0a2de6b72e2abeaebd86cb5

  • C:\Users\Admin\AppData\Local\StarJIeuSoft\._cache_60e26db1295e76174_Url_3etqvddj31dkfvhpwqztan1krccnfjhm\1.2.1.0\xy0fppvf.newcfg

    Filesize

    1KB

    MD5

    2c956fcc54c53d8406e46eb24755aa68

    SHA1

    27406ecb7bb1687c0584e2df958ec5bc809c0a31

    SHA256

    981b0d70904ecacd849a783b4a0d086186bd27c492d1866dd063773143dc37d6

    SHA512

    44fe228b4bd9a07661c8e18e5c7756641124ae68151230407e70fb64ca1190c5c3c388c826c1f5b71c34269b94fcf2b1aecd527b12338418e293d405dfa050b4

  • C:\Users\Admin\AppData\Local\StarJIeuSoft\._cache_Synaptics.exe_Url_sb2tjvnwzjf0rfsnla5ifyr2upoucwrn\1.2.1.0\4jdp1eea.newcfg

    Filesize

    1KB

    MD5

    3ea62c30c3928984b884572878793b79

    SHA1

    7affa7058101ba2a6f49bdfde7e822b08fc72bd6

    SHA256

    79e00e37d13bd0705ee72b44d8753e25673a9382443f6992ed2271d49771ff3f

    SHA512

    f28189829bd3c000bb0db66af98eafe03f99c7b3bf6ce70c4b84d1b5bdfafd3f90725e4fb17c91d3296237402bcbd6e9ab6a33e8637faf9342af20df948583c0

  • C:\Users\Admin\AppData\Local\StarJIeuSoft\._cache_Synaptics.exe_Url_sb2tjvnwzjf0rfsnla5ifyr2upoucwrn\1.2.1.0\wwpjnj3i.newcfg

    Filesize

    1KB

    MD5

    25f1c02a1633a51d564f4798f424748d

    SHA1

    356b9379a9ca7c7ca7b11bd8ec60c16127e4fd6e

    SHA256

    c94adb4d0178c01588106120c6d2fb320e6442490ec30c4e8da2eb69202da240

    SHA512

    95356a0b1d198456991bb80c1e9fb11f8e95ec794954a0c187af1036151be9a0d3911b9295c663bbc394541c53e60bc3862f41a702755b48ceef17ff597a5e2e

  • C:\Users\Admin\AppData\Local\Temp\._cache_60e26db1295e761743202849b2fc4e658997e1d6e427336fcd2ebedb344f3c3eN.exe

    Filesize

    3.1MB

    MD5

    02512e38b0f784ebc127491794e6a238

    SHA1

    7a6e1e4c67cc88a36e6aec1cccd90d17d21be912

    SHA256

    5053526830ba1c5e84dda69646140fa85a293cd874c9c2f5ea13a31728ed29ab

    SHA512

    1515a51eef71814c0f7be05ee62b31734827fd28979eb9fd48f78b394bfc0df2e3d0a4ab5e472724111bc18a9cb0bf62ef7cb4f6346b85292e1e79ef980ebe75

  • C:\Users\Admin\AppData\Local\Temp\6e5YdHJ1.xlsm

    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Users\Admin\AppData\Local\Temp\B6D75E00

    Filesize

    24KB

    MD5

    7a97d01533defe969c5854c4ec608b29

    SHA1

    85eaead658287a55ecef5f846a6a8cb21e33a914

    SHA256

    36f00c69beee75aa9ccf031946ad02b95e7a2d2492f5117ca21ac034a12fda1b

    SHA512

    d940c54cf82f3b5506f18257980f0d321f8f0292b19ec03b297f725f9acc8581c592fb31df1c6ada01a3668cbddd34cb1ee763b4940bd087055318d4a07dfaf6

  • C:\Users\Admin\AppData\Local\Temp\evbC9E9.tmp

    Filesize

    1KB

    MD5

    548477e77506fedb57f141def1bcaaa1

    SHA1

    87653dd2952188b9aac16683e52bd9f8fca8374f

    SHA256

    3a6788e8d6124f16a3d0055a9ccbe4f1c9ff52521399a3353c62655a48a8f4ff

    SHA512

    ee4668ed7888b6d736a0b52f4af67a28466f479cc362284a395a11520f09063a1976e066bbc5be81a7687e2a461901f5e9a77e3d47961e517df9adff460d7513

  • C:\Users\Admin\AppData\Local\Temp\evbCA58.tmp

    Filesize

    1KB

    MD5

    b22174e3719df146c34a7f72b90e8a2c

    SHA1

    0d308a4b893d0cdfb9a69bcf4a34706d05099509

    SHA256

    8c1780596398390b142717b71cdf8876d316a714747fa97411d54a727360ea4a

    SHA512

    a82fb93fbdb6c4e48f667717af93e0bc71d33850e2721813ab39ab4795d0414efb89f28a01784611d693a085c2ceb3cb359182ce9aac053092162f2a2531d1bf

  • C:\Users\Admin\AppData\Local\Temp\evbCA8C.tmp

    Filesize

    1KB

    MD5

    a00e689adbde24aeb5e7576664f99169

    SHA1

    84fd48e080e96f604e8c5f48bbea3536dc9b5ecb

    SHA256

    235dda27a44f482b2f045278bc40eb8abc07dc667b51b28991e97dc27c12a54d

    SHA512

    354743879e49ea223f423a846f86331bf58150f0b2f4408ccdd62b73dcec6bb5b2ac7a26c00cdf0dc5ed07d02b5dadb3f1c0430b5382e6b0943e44f44ceec129

  • C:\Users\Admin\AppData\Local\Temp\evbD069.tmp

    Filesize

    1KB

    MD5

    085ab646e9983776b0f558885e4310ee

    SHA1

    b697c6620576e0d4d82f93c3baeeea39a10801f4

    SHA256

    c484f006e6ad0768d23bce6adf020c0ebf562bf4bb1a917de7ea5ad27a9fe6d5

    SHA512

    ef3ae2d29443aa419b71c64be1522f00bb87409483b60ff5dc39377e3237762c09b4feac6805e3249ffe895828cf79b0c316a17140e8eddaeb80b30dcf415d9b

  • memory/612-288-0x0000000011000000-0x0000000011156000-memory.dmp

    Filesize

    1.3MB

  • memory/612-286-0x0000000011000000-0x0000000011156000-memory.dmp

    Filesize

    1.3MB

  • memory/612-526-0x0000000010000000-0x00000000100D0000-memory.dmp

    Filesize

    832KB

  • memory/612-240-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/612-530-0x0000000011000000-0x0000000011156000-memory.dmp

    Filesize

    1.3MB

  • memory/612-252-0x0000000010000000-0x00000000100D0000-memory.dmp

    Filesize

    832KB

  • memory/612-527-0x00000000059B0000-0x00000000059F6000-memory.dmp

    Filesize

    280KB

  • memory/612-528-0x0000000011000000-0x0000000011156000-memory.dmp

    Filesize

    1.3MB

  • memory/612-525-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/612-287-0x0000000011000000-0x0000000011156000-memory.dmp

    Filesize

    1.3MB

  • memory/612-499-0x0000000009BF0000-0x0000000009BF8000-memory.dmp

    Filesize

    32KB

  • memory/612-285-0x00000000059B0000-0x00000000059F6000-memory.dmp

    Filesize

    280KB

  • memory/612-529-0x0000000011000000-0x0000000011156000-memory.dmp

    Filesize

    1.3MB

  • memory/2296-258-0x00007FFC21D50000-0x00007FFC21D60000-memory.dmp

    Filesize

    64KB

  • memory/2296-290-0x00007FFC1F7C0000-0x00007FFC1F7D0000-memory.dmp

    Filesize

    64KB

  • memory/2296-257-0x00007FFC21D50000-0x00007FFC21D60000-memory.dmp

    Filesize

    64KB

  • memory/2296-255-0x00007FFC21D50000-0x00007FFC21D60000-memory.dmp

    Filesize

    64KB

  • memory/2296-256-0x00007FFC21D50000-0x00007FFC21D60000-memory.dmp

    Filesize

    64KB

  • memory/2296-318-0x00007FFC1F7C0000-0x00007FFC1F7D0000-memory.dmp

    Filesize

    64KB

  • memory/2296-254-0x00007FFC21D50000-0x00007FFC21D60000-memory.dmp

    Filesize

    64KB

  • memory/3044-0-0x0000000000AD0000-0x0000000000AD1000-memory.dmp

    Filesize

    4KB

  • memory/3044-132-0x0000000000400000-0x00000000007DC000-memory.dmp

    Filesize

    3.9MB

  • memory/3472-173-0x0000000011000000-0x0000000011156000-memory.dmp

    Filesize

    1.3MB

  • memory/3472-154-0x0000000005A10000-0x0000000005A56000-memory.dmp

    Filesize

    280KB

  • memory/3472-284-0x0000000010000000-0x00000000100D0000-memory.dmp

    Filesize

    832KB

  • memory/3472-289-0x00000000059C0000-0x0000000005A06000-memory.dmp

    Filesize

    280KB

  • memory/3472-253-0x0000000072FDE000-0x0000000072FDF000-memory.dmp

    Filesize

    4KB

  • memory/3472-368-0x0000000005CA0000-0x0000000005CB0000-memory.dmp

    Filesize

    64KB

  • memory/3472-370-0x000000003B200000-0x000000003B210000-memory.dmp

    Filesize

    64KB

  • memory/3472-369-0x0000000011000000-0x0000000011156000-memory.dmp

    Filesize

    1.3MB

  • memory/3472-393-0x0000000011000000-0x0000000011156000-memory.dmp

    Filesize

    1.3MB

  • memory/3472-163-0x0000000011000000-0x0000000011156000-memory.dmp

    Filesize

    1.3MB

  • memory/3472-164-0x0000000005A60000-0x0000000005BB6000-memory.dmp

    Filesize

    1.3MB

  • memory/3472-423-0x0000000005CC0000-0x0000000005CC8000-memory.dmp

    Filesize

    32KB

  • memory/3472-424-0x0000000006A30000-0x0000000006A68000-memory.dmp

    Filesize

    224KB

  • memory/3472-425-0x0000000005D40000-0x0000000005D4E000-memory.dmp

    Filesize

    56KB

  • memory/3472-177-0x0000000005BC0000-0x0000000005C00000-memory.dmp

    Filesize

    256KB

  • memory/3472-483-0x0000000011000000-0x0000000011156000-memory.dmp

    Filesize

    1.3MB

  • memory/3472-175-0x0000000011000000-0x0000000011156000-memory.dmp

    Filesize

    1.3MB

  • memory/3472-174-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/3472-144-0x0000000005190000-0x0000000005260000-memory.dmp

    Filesize

    832KB

  • memory/3472-145-0x0000000010000000-0x00000000100D0000-memory.dmp

    Filesize

    832KB

  • memory/3472-133-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/3472-121-0x0000000072FDE000-0x0000000072FDF000-memory.dmp

    Filesize

    4KB

  • memory/3472-119-0x0000000077D42000-0x0000000077D43000-memory.dmp

    Filesize

    4KB

  • memory/3472-120-0x0000000077D43000-0x0000000077D44000-memory.dmp

    Filesize

    4KB

  • memory/3472-70-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/3472-531-0x000000003B200000-0x000000003B210000-memory.dmp

    Filesize

    64KB

  • memory/3484-537-0x0000000000400000-0x00000000007DC000-memory.dmp

    Filesize

    3.9MB