Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-11-2024 21:02

General

  • Target

    e4b56bafba2096102e89442da19263b0bd9c3f172d6ff9e8d3a35a79942fec04.exe

  • Size

    1013KB

  • MD5

    548150d442a1c649b78da947ce0ca1c9

  • SHA1

    00b5dc0b636708d8335c09cc671d61e1162ce547

  • SHA256

    e4b56bafba2096102e89442da19263b0bd9c3f172d6ff9e8d3a35a79942fec04

  • SHA512

    579b42a35e616be216ffa113797ec8c9dfa0f65c91499754ab93bf4f575defc5e4bafa8a3907aaab90a3b446caf242ac75b6365295e16d361f04247f51eda710

  • SSDEEP

    24576:2nsJ39LyjbJkQFMhmC+6GD9rFOa3KGekZ:2nsHyjtk2MYC5GD7mGekZ

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Kills process with taskkill 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4b56bafba2096102e89442da19263b0bd9c3f172d6ff9e8d3a35a79942fec04.exe
    "C:\Users\Admin\AppData\Local\Temp\e4b56bafba2096102e89442da19263b0bd9c3f172d6ff9e8d3a35a79942fec04.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\Users\Admin\AppData\Local\Temp\._cache_e4b56bafba2096102e89442da19263b0bd9c3f172d6ff9e8d3a35a79942fec04.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_e4b56bafba2096102e89442da19263b0bd9c3f172d6ff9e8d3a35a79942fec04.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2524
      • \??\c:\users\admin\appdata\local\temp\._cache_e4b56bafba2096102e89442da19263b0bd9c3f172d6ff9e8d3a35a79942fec04.exe 
        c:\users\admin\appdata\local\temp\._cache_e4b56bafba2096102e89442da19263b0bd9c3f172d6ff9e8d3a35a79942fec04.exe 
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1832
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c run.bat
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2596
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c taskkill /IM system64bit.exe /F
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2604
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /IM system64bit.exe /F
            5⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:664
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1832 -s 636
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:620
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2612
        • \??\c:\users\admin\appdata\local\temp\._cache_synaptics.exe 
          c:\users\admin\appdata\local\temp\._cache_synaptics.exe  InjUpdate
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1036
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /IM system64bit.exe /F
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1780
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /IM system64bit.exe /F
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2076
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c run.bat
            5⤵
            • System Location Discovery: System Language Discovery
            PID:792
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1036 -s 760
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:1552
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    1013KB

    MD5

    548150d442a1c649b78da947ce0ca1c9

    SHA1

    00b5dc0b636708d8335c09cc671d61e1162ce547

    SHA256

    e4b56bafba2096102e89442da19263b0bd9c3f172d6ff9e8d3a35a79942fec04

    SHA512

    579b42a35e616be216ffa113797ec8c9dfa0f65c91499754ab93bf4f575defc5e4bafa8a3907aaab90a3b446caf242ac75b6365295e16d361f04247f51eda710

  • C:\Users\Admin\AppData\Local\Temp\oWs1WaoU.xlsm

    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Windows\Resources\Themes\icsys.icn.exe

    Filesize

    130KB

    MD5

    3bb11a44abf1b7dbb2b93ce8bf32d003

    SHA1

    0ed31a91447936f6218382939b40de1c92a94a90

    SHA256

    30d83f1be6b4b6dfbedb8d6de781c8c87b08b4d0f7d7361c5197b0a9cfb22ec1

    SHA512

    73392f5c2d54e683241268379eaea04f67c89748044d09628f31046f5fc7404eb3af2b4f8ad74d3e06577dd617a554a5f1c458cc04d35b7937891499bc9e350b

  • \Users\Admin\AppData\Local\Temp\._cache_e4b56bafba2096102e89442da19263b0bd9c3f172d6ff9e8d3a35a79942fec04.exe

    Filesize

    259KB

    MD5

    19a636fff650a9e71235824df356e982

    SHA1

    19d727767b5f8f67e41e4e12064619ea1441253a

    SHA256

    d0b122309ba7ec2bc6a4dd8cd65925c7bfa06918125c439198da415c16223009

    SHA512

    34d359c77fa4b70f9ee25333825f663cb7e3078d950a66d0256c2ad947bf21130628d748087152f244816c01d889c7011826327368924bac15f2e629f13ef7f8

  • \Users\Admin\AppData\Local\Temp\._cache_e4b56bafba2096102e89442da19263b0bd9c3f172d6ff9e8d3a35a79942fec04.exe 

    Filesize

    129KB

    MD5

    50418f43f9eb2e0f0758949e47a5d3b0

    SHA1

    90565581b95c6db13fae2fcb6ee405185eb9c4a8

    SHA256

    f24da0bbc002a963bf6f985cda381424c864e4875fd78a94f1e6fe59b083713d

    SHA512

    f347679c631d601f045eabb03faf832ac768e275fd5a74437d936f764ba2bd824bf7ff6ab6e408e4bf58bf444e0b27b69e7a222303642cdf32fe66954d33947e

  • memory/1036-68-0x0000000000D60000-0x0000000000DFA000-memory.dmp

    Filesize

    616KB

  • memory/1832-44-0x0000000000180000-0x000000000021A000-memory.dmp

    Filesize

    616KB

  • memory/2220-78-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2524-76-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2612-75-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2808-98-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/2808-55-0x0000000003EE0000-0x0000000003F0F000-memory.dmp

    Filesize

    188KB

  • memory/2808-77-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/2808-56-0x0000000003EE0000-0x0000000003F0F000-memory.dmp

    Filesize

    188KB

  • memory/2808-99-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/2808-131-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/2808-132-0x0000000003EE0000-0x0000000003F0F000-memory.dmp

    Filesize

    188KB

  • memory/3008-41-0x0000000003EF0000-0x0000000003F1F000-memory.dmp

    Filesize

    188KB

  • memory/3008-40-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/3008-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/3008-6-0x0000000003EF0000-0x0000000003F1F000-memory.dmp

    Filesize

    188KB