Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
06-11-2024 10:12
Static task
static1
Behavioral task
behavioral1
Sample
Code Stealer dll For Hd PLAYER.vmp.exe
Resource
win7-20241010-en
General
-
Target
Code Stealer dll For Hd PLAYER.vmp.exe
-
Size
5.0MB
-
MD5
e84c6027daaea05c5c965f5f6062ba2c
-
SHA1
b6a04707a087125031a7d2b14a6b7493b5022168
-
SHA256
8d215ea18cb15661a37b9eeb4abc861670c39ea8b6e98b0f62b43763e6bce63f
-
SHA512
6e1351c090989846d888bdea4ac7ea716c507ab6b89b1154cf76b0b622ea09bd0c50ca1036db056f578bea362d3d360f00be50a0e92e3637f6ff5626ecdbfb50
-
SSDEEP
98304:eadFE3ZtxlzJtME/CFNeETYhj17tSVvgkZ28MsMNULbXZof/nuy:eadaXjzzM/eETYhj1g28zZE9
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Extracted
xworm
147.185.221.23:10012
-
Install_directory
%Userprofile%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 3 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\._cache_Code Stealer dll For Hd PLAYER.vmp.exe family_xworm behavioral1/memory/2868-59-0x0000000001140000-0x000000000115C000-memory.dmp family_xworm behavioral1/memory/1156-121-0x0000000000EA0000-0x0000000000EBC000-memory.dmp family_xworm -
Xred family
-
Xworm family
-
Executes dropped EXE 3 IoCs
Processes:
._cache_Code Stealer dll For Hd PLAYER.vmp.exeSynaptics.exe._cache_Synaptics.exepid process 2868 ._cache_Code Stealer dll For Hd PLAYER.vmp.exe 2876 Synaptics.exe 1156 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
Processes:
Code Stealer dll For Hd PLAYER.vmp.exeSynaptics.exepid process 3044 Code Stealer dll For Hd PLAYER.vmp.exe 3044 Code Stealer dll For Hd PLAYER.vmp.exe 3044 Code Stealer dll For Hd PLAYER.vmp.exe 2876 Synaptics.exe 2876 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Code Stealer dll For Hd PLAYER.vmp.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" Code Stealer dll For Hd PLAYER.vmp.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
Code Stealer dll For Hd PLAYER.vmp.exeSynaptics.exepid process 3044 Code Stealer dll For Hd PLAYER.vmp.exe 3044 Code Stealer dll For Hd PLAYER.vmp.exe 2876 Synaptics.exe 2876 Synaptics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Code Stealer dll For Hd PLAYER.vmp.exeSynaptics.exeEXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Code Stealer dll For Hd PLAYER.vmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1928 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Code Stealer dll For Hd PLAYER.vmp.exeSynaptics.exepid process 3044 Code Stealer dll For Hd PLAYER.vmp.exe 2876 Synaptics.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
._cache_Code Stealer dll For Hd PLAYER.vmp.exe._cache_Synaptics.exedescription pid process Token: SeDebugPrivilege 2868 ._cache_Code Stealer dll For Hd PLAYER.vmp.exe Token: SeDebugPrivilege 1156 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
EXCEL.EXEpid process 1928 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Code Stealer dll For Hd PLAYER.vmp.exeSynaptics.exedescription pid process target process PID 3044 wrote to memory of 2868 3044 Code Stealer dll For Hd PLAYER.vmp.exe ._cache_Code Stealer dll For Hd PLAYER.vmp.exe PID 3044 wrote to memory of 2868 3044 Code Stealer dll For Hd PLAYER.vmp.exe ._cache_Code Stealer dll For Hd PLAYER.vmp.exe PID 3044 wrote to memory of 2868 3044 Code Stealer dll For Hd PLAYER.vmp.exe ._cache_Code Stealer dll For Hd PLAYER.vmp.exe PID 3044 wrote to memory of 2868 3044 Code Stealer dll For Hd PLAYER.vmp.exe ._cache_Code Stealer dll For Hd PLAYER.vmp.exe PID 3044 wrote to memory of 2876 3044 Code Stealer dll For Hd PLAYER.vmp.exe Synaptics.exe PID 3044 wrote to memory of 2876 3044 Code Stealer dll For Hd PLAYER.vmp.exe Synaptics.exe PID 3044 wrote to memory of 2876 3044 Code Stealer dll For Hd PLAYER.vmp.exe Synaptics.exe PID 3044 wrote to memory of 2876 3044 Code Stealer dll For Hd PLAYER.vmp.exe Synaptics.exe PID 2876 wrote to memory of 1156 2876 Synaptics.exe ._cache_Synaptics.exe PID 2876 wrote to memory of 1156 2876 Synaptics.exe ._cache_Synaptics.exe PID 2876 wrote to memory of 1156 2876 Synaptics.exe ._cache_Synaptics.exe PID 2876 wrote to memory of 1156 2876 Synaptics.exe ._cache_Synaptics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Code Stealer dll For Hd PLAYER.vmp.exe"C:\Users\Admin\AppData\Local\Temp\Code Stealer dll For Hd PLAYER.vmp.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\._cache_Code Stealer dll For Hd PLAYER.vmp.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Code Stealer dll For Hd PLAYER.vmp.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1156
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.0MB
MD5e84c6027daaea05c5c965f5f6062ba2c
SHA1b6a04707a087125031a7d2b14a6b7493b5022168
SHA2568d215ea18cb15661a37b9eeb4abc861670c39ea8b6e98b0f62b43763e6bce63f
SHA5126e1351c090989846d888bdea4ac7ea716c507ab6b89b1154cf76b0b622ea09bd0c50ca1036db056f578bea362d3d360f00be50a0e92e3637f6ff5626ecdbfb50
-
Filesize
23KB
MD5fe2f26a4bf3f7cf77f5fa3f01289db7b
SHA16e547873f945ac533afbd8baa34e8ca04fa11e29
SHA256f281e4fc53a61843449e9e978a96f1cb4245982ad7af6e55d25d157ed0a92691
SHA512ea419000b5eeb7eadf9f4f375fa5b0a491fe6a527cad84ca8005569df93081dce63ded3d19755a80c07a3b5cd45e3e99df76f47aa4fe6faaa6e5ecaf999406fb
-
Filesize
27KB
MD5c757d5f23e6f48f02d4fef6432233813
SHA1397fa1b9a64f97887fb6cc6e02e9a276900a24bb
SHA256e82da9ea960bcf3ab5a917d1f4757433f2e4f1c4ba40ae2162cf0d09f44c0052
SHA5124502e6c65103a9d1bec032e6da09cc90d9f5b8b750da708654898329fbe8aaf2133fbd3825e2b70be1ec3fccb73e9c0b8acb67fc58f3bf0ec6e00e4498b27304
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
28KB
MD5277161658044d8866c2bba1f8b636fbf
SHA14e57938ba311596d37ba7f5fbc88020ffb4cf18d
SHA2563a7cf1f00b2dad8223f23731e28810203badc8ddb5dfc00826be19ec5675b241
SHA51258866f39cbf70f696410881c9cecd04f37b47b82f1608406bac15fe05de5e8fcd743c5e7016a4a3ab54d7de0f05eb4e9df6c6b4aac96cca4a5f7719139d54278
-
Filesize
85KB
MD5868fcf3d54b2a67208b6b3f2ab8423f3
SHA1b711bbdd1592658a7e5db4198088ef0b82fb5f5f
SHA2565558383b3d4edee25acd4b00be2238a3f9275b9d00c840721655cc82db7f832c
SHA5123e3bb105c669e08248aaa27d6dc148d18004bfce724036bd5d793675ab0275f504b4eb67892ebcbf6620cac57d2f6f6b6de8f5c42996eb8beae89fb2938788a8