Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 05:41

General

  • Target

    c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe

  • Size

    3.5MB

  • MD5

    419261a8cdf19560d4a39ab434ee5270

  • SHA1

    dabae0f912f2d85f74f4461fb4dd813e6fe1b3d5

  • SHA256

    c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176da

  • SHA512

    6ec51e4ea5d66b3fe39528f8074414e46f4212033308b57921a7b56570d45c8b60e18d19ac090c171239a423f5e65fa9ea035a26671286aea262616569437878

  • SSDEEP

    49152:insHyjtk2MYC5GDrzKT4qsEEXJeHuvokx7vDKo80wkSu2l/qtSupzeB/:insmtk2a+K1rOvoqa/Vr/uteB/

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe
    "C:\Users\Admin\AppData\Local\Temp\c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1124
    • C:\Users\Admin\AppData\Local\Temp\._cache_c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:512
      • C:\Program Files\Java\jdk-1.8\bin\java.exe
        "C:\Program Files\Java\jdk-1.8\bin\java.exe" -version
        3⤵
          PID:4628
        • C:\Program Files\Java\jdk-1.8\jre\bin\java.exe
          "C:\Program Files\Java\jdk-1.8\jre\bin\java.exe" -version
          3⤵
            PID:4388
          • C:\Program Files\Java\jre-1.8\bin\java.exe
            "C:\Program Files\Java\jre-1.8\bin\java.exe" -version
            3⤵
              PID:2132
          • C:\ProgramData\Synaptics\Synaptics.exe
            "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
            2⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:1012
            • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
              "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
              3⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of WriteProcessMemory
              PID:2860
              • C:\Program Files\Java\jdk-1.8\bin\java.exe
                "C:\Program Files\Java\jdk-1.8\bin\java.exe" -version
                4⤵
                  PID:1680
                • C:\Program Files\Java\jdk-1.8\jre\bin\java.exe
                  "C:\Program Files\Java\jdk-1.8\jre\bin\java.exe" -version
                  4⤵
                    PID:2944
                  • C:\Program Files\Java\jre-1.8\bin\java.exe
                    "C:\Program Files\Java\jre-1.8\bin\java.exe" -version
                    4⤵
                      PID:2232
              • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
                "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
                1⤵
                • Checks processor information in registry
                • Enumerates system info in registry
                • Suspicious behavior: AddClipboardFormatListener
                • Suspicious use of SetWindowsHookEx
                PID:784

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

                Filesize

                46B

                MD5

                7b02d7e5fa5a7a8163fed80bd4a5e058

                SHA1

                9b007e462a1d805709b1a7994ca0a0ba333eaa2d

                SHA256

                690e24874a546857671f63798f2142e017c211528243a03c6e5dee9ff7b40681

                SHA512

                8e075984322bdbd65b2048ce976a70c8b976c8893a6a66b836ff0a59de968694e09dbf65a8067adf96c1a43be3a78102be22d92564785f19cd306469a6f01ea4

              • C:\ProgramData\Oracle\Java\.oracle_jre_usage\905ebba3a8fc8cc.timestamp

                Filesize

                50B

                MD5

                36b34f314e980815d065b6b309043205

                SHA1

                160bcd4a8b0597c24e72d842a249052a19d13435

                SHA256

                5c548e5abcb93948c0b2d90337d2f2281325b9f082b16cea022bf3ffe8db36c8

                SHA512

                72831f80fb0c3662676cea784bdba25fb2c099aa5b9ace7e3d5bf97e78eed9359e72706e1634f23edd53494008c25da7dfd99a5f2add716e66538e4eb4c78b82

              • C:\ProgramData\Synaptics\Synaptics.exe

                Filesize

                3.5MB

                MD5

                419261a8cdf19560d4a39ab434ee5270

                SHA1

                dabae0f912f2d85f74f4461fb4dd813e6fe1b3d5

                SHA256

                c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176da

                SHA512

                6ec51e4ea5d66b3fe39528f8074414e46f4212033308b57921a7b56570d45c8b60e18d19ac090c171239a423f5e65fa9ea035a26671286aea262616569437878

              • C:\Users\Admin\AppData\Local\Temp\._cache_c414b0f8befd8e0a57bb386fa68d5cea17d21b3c5f2cb1e44474cae46f1176daN.exe

                Filesize

                2.8MB

                MD5

                e9580249182c0d7e81ee1c30154731b4

                SHA1

                7a9ca8f420d59b3cd45c188ce0f87bcae91e8d20

                SHA256

                03342485feb128ab14e35d84d9f48d428c9d8774b145dcd8d520baacd4aef92b

                SHA512

                c29d7947b07bbc03b66709257e9509761abba992a30bb1a60e09c31eca764314b95dca11a28e0ffc1b93c62548c06660fa05821ab6a74137cbed8185581a19a2

              • C:\Users\Admin\AppData\Local\Temp\.minecraft\PCL.ini

                Filesize

                31B

                MD5

                67bfcfc208d787e99ca8ea4801117538

                SHA1

                f7b82fe95f72e953e2d2b7fe4aa879a7e4eba2b7

                SHA256

                9a64e96548ed95ab1e5d69f36cc0313ab399e517ce2ef6dbad8e56ba47090d46

                SHA512

                8311a07b8f17de515e4917b109cce69569bc136ae1456acd7d6f9a069823e3bd0466282db53a4dfc0b88507772bfb6521fe5179fbd759d2bf8d3c692d370440b

              • C:\Users\Admin\AppData\Local\Temp\A4975E00

                Filesize

                22KB

                MD5

                4cfe657ac70877a07080b7745da1e5f0

                SHA1

                db3e2dfe468187e937c1022eb0f54bc4906dc7d9

                SHA256

                0e07b36fc8145698cb59cd7451cc30d5e6602d8d241cf9ee6a181b898d3f2d8d

                SHA512

                2605d10988159fe8c33584bc03474e90fc2127c8b3ac09f8cf61c29e3b52c2cb9d6d5ad839550fa35811d9db2629d93d63bb9e0e23af012367b5d54fb664bb59

              • C:\Users\Admin\AppData\Local\Temp\PCL\Log1.txt

                Filesize

                4KB

                MD5

                454a3ab6f3a5c2aecf9b096738b3a3d1

                SHA1

                19bceeca5b72622126983e8df13f991d64266004

                SHA256

                5ee6c538dd551591a5a2550a9a248b479153ce8d34bb84f251f2bc9acb56a901

                SHA512

                1772a47cd5d7d6bcd333488e87396bd2809bd7167bbe5a207bd2a7cb1f81d3313dfdad5c43b8414cd8322a144f9b89b61edeb0535e6ebfba92ab04b3dcfa50d9

              • C:\Users\Admin\AppData\Local\Temp\PCL\Setup.ini

                Filesize

                37B

                MD5

                4f990c7279da15871f1db28fb9254310

                SHA1

                dc4de02617ab920c72e749b47f4ff30ca53129ef

                SHA256

                918a673cbe67395b50006ab5b22feb91eb8de70d0a38b30a37499b8a16641a34

                SHA512

                3391489e902fb306a2580987d060124ef640e3967575ef15ff236aa0be554a9462e6e935144eed8aeb86399da4329d12e194c58afba49a8e989938a132bf5f71

              • C:\Users\Admin\AppData\Local\Temp\PCL\Setup.ini

                Filesize

                88B

                MD5

                36d7b4a54a5545e673c2a155032f1bae

                SHA1

                73a1a440bbdaed38fae625fcf35fabfa5344903d

                SHA256

                d1b8b1e3a1be908136b18d5b3aff5f62cb8feea0db5131c9f66362195cd7c6f6

                SHA512

                f1837f9e7055beec745022cbd05019456f9e14e0d9be80f0ee3fd8b19713d2172a1eca0efba14dc005f7ff0fe5ebb95dc5ef3aa7969a46d6ce08debd26c22937

              • C:\Users\Admin\AppData\Local\Temp\hWi8jm4s.xlsm

                Filesize

                17KB

                MD5

                e566fc53051035e1e6fd0ed1823de0f9

                SHA1

                00bc96c48b98676ecd67e81a6f1d7754e4156044

                SHA256

                8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

                SHA512

                a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

              • memory/512-71-0x00000266DC8B0000-0x00000266DCB78000-memory.dmp

                Filesize

                2.8MB

              • memory/512-341-0x00007FFEC1653000-0x00007FFEC1655000-memory.dmp

                Filesize

                8KB

              • memory/512-187-0x00000266F8A80000-0x00000266F8CE0000-memory.dmp

                Filesize

                2.4MB

              • memory/512-131-0x00007FFEC1650000-0x00007FFEC2111000-memory.dmp

                Filesize

                10.8MB

              • memory/512-343-0x00007FFEC1650000-0x00007FFEC2111000-memory.dmp

                Filesize

                10.8MB

              • memory/512-207-0x00000266FD7B0000-0x00000266FD858000-memory.dmp

                Filesize

                672KB

              • memory/512-70-0x00007FFEC1653000-0x00007FFEC1655000-memory.dmp

                Filesize

                8KB

              • memory/784-196-0x00007FFE9FAF0000-0x00007FFE9FB00000-memory.dmp

                Filesize

                64KB

              • memory/784-194-0x00007FFE9FAF0000-0x00007FFE9FB00000-memory.dmp

                Filesize

                64KB

              • memory/784-197-0x00007FFE9FAF0000-0x00007FFE9FB00000-memory.dmp

                Filesize

                64KB

              • memory/784-195-0x00007FFE9FAF0000-0x00007FFE9FB00000-memory.dmp

                Filesize

                64KB

              • memory/784-199-0x00007FFE9D620000-0x00007FFE9D630000-memory.dmp

                Filesize

                64KB

              • memory/784-198-0x00007FFE9D620000-0x00007FFE9D630000-memory.dmp

                Filesize

                64KB

              • memory/784-193-0x00007FFE9FAF0000-0x00007FFE9FB00000-memory.dmp

                Filesize

                64KB

              • memory/1012-374-0x0000000000400000-0x0000000000785000-memory.dmp

                Filesize

                3.5MB

              • memory/1012-342-0x0000000000400000-0x0000000000785000-memory.dmp

                Filesize

                3.5MB

              • memory/1124-128-0x0000000000400000-0x0000000000785000-memory.dmp

                Filesize

                3.5MB

              • memory/1124-0-0x0000000000A80000-0x0000000000A81000-memory.dmp

                Filesize

                4KB

              • memory/1680-274-0x000001C05C550000-0x000001C05C551000-memory.dmp

                Filesize

                4KB

              • memory/2132-279-0x000002E2D0330000-0x000002E2D0331000-memory.dmp

                Filesize

                4KB

              • memory/2232-282-0x000001D160EE0000-0x000001D160EE1000-memory.dmp

                Filesize

                4KB

              • memory/2860-206-0x000001EEFAB60000-0x000001EEFAB6E000-memory.dmp

                Filesize

                56KB

              • memory/2860-208-0x000001EEFB2A0000-0x000001EEFB2C2000-memory.dmp

                Filesize

                136KB

              • memory/2860-205-0x000001EEFB180000-0x000001EEFB1B8000-memory.dmp

                Filesize

                224KB

              • memory/2944-273-0x000002901B1B0000-0x000002901B1B1000-memory.dmp

                Filesize

                4KB

              • memory/4388-265-0x0000014F09650000-0x0000014F09651000-memory.dmp

                Filesize

                4KB

              • memory/4628-269-0x000001AA39CD0000-0x000001AA39CD1000-memory.dmp

                Filesize

                4KB