Analysis

  • max time kernel
    123s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    05-11-2024 23:51

General

  • Target

    733657aff7068f67c41f723a044f18de01448634e9138693907eff4320c2c50b.exe

  • Size

    8.9MB

  • MD5

    1a33b542f2c0b822a8ba01fd6c6cdf58

  • SHA1

    6c37d96f0a776845642229d127c69ac0f1e9dc5c

  • SHA256

    733657aff7068f67c41f723a044f18de01448634e9138693907eff4320c2c50b

  • SHA512

    8e11b4f495e88e49b3099cac4f943b01445bebe88e770bcf63123be052b779e712299556aee70362ab7e0d2c23a4cce1bcba21309bf3a4bd340615877f51ee10

  • SSDEEP

    196608:g9x7Zei65FdsbOcRZO6Q55CfSzCfKXFR5a4t3QXZuXc1o9yaaI6HMaJTtGbj:gHVD6CCcRZO106Wf749y

Malware Config

Extracted

Family

vipkeylogger

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • VIPKeylogger

    VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

  • Vipkeylogger family
  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\733657aff7068f67c41f723a044f18de01448634e9138693907eff4320c2c50b.exe
    "C:\Users\Admin\AppData\Local\Temp\733657aff7068f67c41f723a044f18de01448634e9138693907eff4320c2c50b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Users\Admin\AppData\Local\Temp\733657aff7068f67c41f723a044f18de01448634e9138693907eff4320c2c50b.exe
      "C:\Users\Admin\AppData\Local\Temp\733657aff7068f67c41f723a044f18de01448634e9138693907eff4320c2c50b.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2492
      • C:\Users\Admin\AppData\Local\Temp\._cache_733657aff7068f67c41f723a044f18de01448634e9138693907eff4320c2c50b.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_733657aff7068f67c41f723a044f18de01448634e9138693907eff4320c2c50b.exe"
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3020
      • C:\ProgramData\Synaptics\Synaptics.exe
        "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2624
        • C:\ProgramData\Synaptics\Synaptics.exe
          "C:\ProgramData\Synaptics\Synaptics.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:684
          • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
            "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"
            5⤵
            • Executes dropped EXE
            • Accesses Microsoft Outlook profiles
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • outlook_office_path
            • outlook_win_path
            PID:576
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    8.9MB

    MD5

    1a33b542f2c0b822a8ba01fd6c6cdf58

    SHA1

    6c37d96f0a776845642229d127c69ac0f1e9dc5c

    SHA256

    733657aff7068f67c41f723a044f18de01448634e9138693907eff4320c2c50b

    SHA512

    8e11b4f495e88e49b3099cac4f943b01445bebe88e770bcf63123be052b779e712299556aee70362ab7e0d2c23a4cce1bcba21309bf3a4bd340615877f51ee10

  • C:\Users\Admin\AppData\Local\Temp\yDvUkn3B.xlsm

    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • \??\PIPE\srvsvc

    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • \Users\Admin\AppData\Local\Temp\._cache_733657aff7068f67c41f723a044f18de01448634e9138693907eff4320c2c50b.exe

    Filesize

    269KB

    MD5

    5446eaf87fe423755a4611cd0ff939e4

    SHA1

    c4b2153f43659c6b0ff11527a02b0b0dbfe75b11

    SHA256

    f7f3df09f0759f03d0d3d114caadac597c767ebfeaba7115d2963c732864daff

    SHA512

    1b82fc09028091ca718ee02853c0a4a3096ac92f2ba707e181c78cccb8ca717deedda3d7605a704112660575ab0d30f556e8317bbc15940c96265b0da2b4a73c

  • memory/576-80-0x00000000001E0000-0x0000000000228000-memory.dmp

    Filesize

    288KB

  • memory/684-66-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/684-101-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/684-69-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/684-131-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/684-103-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/684-102-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/2080-5-0x000000007485E000-0x000000007485F000-memory.dmp

    Filesize

    4KB

  • memory/2080-6-0x0000000074850000-0x0000000074F3E000-memory.dmp

    Filesize

    6.9MB

  • memory/2080-4-0x0000000000790000-0x00000000007AE000-memory.dmp

    Filesize

    120KB

  • memory/2080-3-0x0000000006570000-0x00000000066E0000-memory.dmp

    Filesize

    1.4MB

  • memory/2080-28-0x0000000074850000-0x0000000074F3E000-memory.dmp

    Filesize

    6.9MB

  • memory/2080-0-0x000000007485E000-0x000000007485F000-memory.dmp

    Filesize

    4KB

  • memory/2080-7-0x000000000B440000-0x000000000B588000-memory.dmp

    Filesize

    1.3MB

  • memory/2080-2-0x0000000074850000-0x0000000074F3E000-memory.dmp

    Filesize

    6.9MB

  • memory/2080-1-0x00000000008F0000-0x00000000011E0000-memory.dmp

    Filesize

    8.9MB

  • memory/2492-13-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/2492-20-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2492-9-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/2492-23-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/2492-25-0x0000000000080000-0x0000000000081000-memory.dmp

    Filesize

    4KB

  • memory/2492-11-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/2492-15-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/2492-16-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/2492-18-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/2492-24-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/2492-8-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/2492-22-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/2624-51-0x00000000010E0000-0x00000000019D0000-memory.dmp

    Filesize

    8.9MB

  • memory/3000-81-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/3020-44-0x0000000000220000-0x0000000000268000-memory.dmp

    Filesize

    288KB