Overview
overview
10Static
static
10RdpStealer...ib.dll
windows7-x64
1RdpStealer...ib.dll
windows10-2004-x64
1RdpStealer...ib.dll
windows7-x64
1RdpStealer...ib.dll
windows10-2004-x64
1RdpStealer...et.dll
windows7-x64
1RdpStealer...et.dll
windows10-2004-x64
1RdpStealer...er.exe
windows7-x64
10RdpStealer...er.exe
windows10-2004-x64
10RdpStealer/xNet.dll
windows7-x64
1RdpStealer/xNet.dll
windows10-2004-x64
1Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-11-2024 10:58
Behavioral task
behavioral1
Sample
RdpStealer/AxInterop.MSTSCLib.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RdpStealer/AxInterop.MSTSCLib.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
RdpStealer/Interop.MSTSCLib.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
RdpStealer/Interop.MSTSCLib.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
RdpStealer/Leaf.Net.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
RdpStealer/Leaf.Net.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
RdpStealer/RdpStealer.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
RdpStealer/RdpStealer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
RdpStealer/xNet.dll
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
RdpStealer/xNet.dll
Resource
win10v2004-20241007-en
General
-
Target
RdpStealer/RdpStealer.exe
-
Size
762KB
-
MD5
5316877f3619a1768d3a8025245037c7
-
SHA1
07b0cf82a54614dc269c441fab8784b06d8722fc
-
SHA256
b28e21164f744e66c184e343cb85906f6bed8644841c18819b3d3c247ee65d20
-
SHA512
2644214e119b896fe27b649578956cef2853c0b60404aa26de8d55c2a4ed72d211d13774a815d34c5086e718b5af28a4d7b91c6bcd42a883b303b17020cb89ff
-
SSDEEP
12288:aMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9sBj:ansJ39LyjbJkQFMhmC+6GD9G
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 3 IoCs
Processes:
._cache_RdpStealer.exeSynaptics.exe._cache_Synaptics.exepid process 2428 ._cache_RdpStealer.exe 2044 Synaptics.exe 2692 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
Processes:
RdpStealer.exeSynaptics.exepid process 2204 RdpStealer.exe 2204 RdpStealer.exe 2204 RdpStealer.exe 2044 Synaptics.exe 2044 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RdpStealer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" RdpStealer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
EXCEL.EXE._cache_RdpStealer.exeSynaptics.exe._cache_Synaptics.execmd.exetimeout.exetimeout.exeRdpStealer.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_RdpStealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdpStealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 1448 timeout.exe 2464 timeout.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 2460 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
._cache_RdpStealer.exe._cache_Synaptics.exedescription pid process Token: SeDebugPrivilege 2428 ._cache_RdpStealer.exe Token: SeDebugPrivilege 2692 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
EXCEL.EXEpid process 2460 EXCEL.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
RdpStealer.exeSynaptics.exe._cache_Synaptics.exe._cache_RdpStealer.execmd.execmd.exedescription pid process target process PID 2204 wrote to memory of 2428 2204 RdpStealer.exe ._cache_RdpStealer.exe PID 2204 wrote to memory of 2428 2204 RdpStealer.exe ._cache_RdpStealer.exe PID 2204 wrote to memory of 2428 2204 RdpStealer.exe ._cache_RdpStealer.exe PID 2204 wrote to memory of 2428 2204 RdpStealer.exe ._cache_RdpStealer.exe PID 2204 wrote to memory of 2044 2204 RdpStealer.exe Synaptics.exe PID 2204 wrote to memory of 2044 2204 RdpStealer.exe Synaptics.exe PID 2204 wrote to memory of 2044 2204 RdpStealer.exe Synaptics.exe PID 2204 wrote to memory of 2044 2204 RdpStealer.exe Synaptics.exe PID 2044 wrote to memory of 2692 2044 Synaptics.exe ._cache_Synaptics.exe PID 2044 wrote to memory of 2692 2044 Synaptics.exe ._cache_Synaptics.exe PID 2044 wrote to memory of 2692 2044 Synaptics.exe ._cache_Synaptics.exe PID 2044 wrote to memory of 2692 2044 Synaptics.exe ._cache_Synaptics.exe PID 2692 wrote to memory of 1264 2692 ._cache_Synaptics.exe cmd.exe PID 2692 wrote to memory of 1264 2692 ._cache_Synaptics.exe cmd.exe PID 2692 wrote to memory of 1264 2692 ._cache_Synaptics.exe cmd.exe PID 2692 wrote to memory of 1264 2692 ._cache_Synaptics.exe cmd.exe PID 2428 wrote to memory of 468 2428 ._cache_RdpStealer.exe cmd.exe PID 2428 wrote to memory of 468 2428 ._cache_RdpStealer.exe cmd.exe PID 2428 wrote to memory of 468 2428 ._cache_RdpStealer.exe cmd.exe PID 2428 wrote to memory of 468 2428 ._cache_RdpStealer.exe cmd.exe PID 468 wrote to memory of 1448 468 cmd.exe timeout.exe PID 468 wrote to memory of 1448 468 cmd.exe timeout.exe PID 468 wrote to memory of 1448 468 cmd.exe timeout.exe PID 468 wrote to memory of 1448 468 cmd.exe timeout.exe PID 1264 wrote to memory of 2464 1264 cmd.exe timeout.exe PID 1264 wrote to memory of 2464 1264 cmd.exe timeout.exe PID 1264 wrote to memory of 2464 1264 cmd.exe timeout.exe PID 1264 wrote to memory of 2464 1264 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RdpStealer\RdpStealer.exe"C:\Users\Admin\AppData\Local\Temp\RdpStealer\RdpStealer.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\RdpStealer\._cache_RdpStealer.exe"C:\Users\Admin\AppData\Local\Temp\RdpStealer\._cache_RdpStealer.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpDD73.tmp.cmd""3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\timeout.exetimeout 44⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1448
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\RdpStealer\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\RdpStealer\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpDD74.tmp.cmd""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\timeout.exetimeout 45⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2464
-
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
762KB
MD55316877f3619a1768d3a8025245037c7
SHA107b0cf82a54614dc269c441fab8784b06d8722fc
SHA256b28e21164f744e66c184e343cb85906f6bed8644841c18819b3d3c247ee65d20
SHA5122644214e119b896fe27b649578956cef2853c0b60404aa26de8d55c2a4ed72d211d13774a815d34c5086e718b5af28a4d7b91c6bcd42a883b303b17020cb89ff
-
Filesize
164B
MD59d21e5df8875e2bc3199766e9901c5fb
SHA127a77d0e657679f3d828365b7b586d9d8b2f33ea
SHA25659962e166ff23bbb194071555230e3c3dde8a7374d22c65e3d989629615bfbb8
SHA512d561b95b6f62d096c7b0f5b949780b6aff13b37ca8908b68d95225ef0638321e5c452a62c546923445112fb4fc299035689863c139a608b47832cf7d064d1633
-
Filesize
163B
MD580042f5dab348927a5be1aa90c215da0
SHA1c6f5ae61755a90b59df17d2596fe7551c296cab6
SHA25692bfd5c81879e098dba31096146e5114fc8d8ea11216f3677eb9fdd3a0335233
SHA512190d51e7510d103474a275ebfdf113a3d15a82627b786747ed34cd8be0ea0462ac94203769d5b9def95049e3e796858576a0e1c826619569c7bd9506d0528123
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
24KB
MD50408f7ac8b7f34264aaef646d5cc112f
SHA19031de3fa3752055103c1b7fea2c0fb78239f14b
SHA256cc81c7e1c0745efd17b0e6706c34b9404587082a3ca7c6c51a3bee9a62224ff8
SHA512b720905db9e26d7210223e8e57ca07c1132207e8af49df6d5531517b11773e0af7ce3fca8184cce6308a8882f733e6f40541ad8e50a1a0c9838f9942c4ea4295
-
Filesize
8KB
MD556f70138199c1b666ccce7d33eca29fe
SHA161da84bfeb7c9b9582704775f523f5ef9dc866fe
SHA25623f7e75257b27c7458330ecff652f3f1819de6ddeafb4fd1ea1ad383581fad4a
SHA5129e927144298f91a4fa5d224632a8f1d8a88d662c781eec0c09016ce060d01c2a1a550316f9abc9bb107dcf96a5570dee463200981db815347b04ac1108392aee