Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-11-2024 21:02

General

  • Target

    e4b56bafba2096102e89442da19263b0bd9c3f172d6ff9e8d3a35a79942fec04.exe

  • Size

    1013KB

  • MD5

    548150d442a1c649b78da947ce0ca1c9

  • SHA1

    00b5dc0b636708d8335c09cc671d61e1162ce547

  • SHA256

    e4b56bafba2096102e89442da19263b0bd9c3f172d6ff9e8d3a35a79942fec04

  • SHA512

    579b42a35e616be216ffa113797ec8c9dfa0f65c91499754ab93bf4f575defc5e4bafa8a3907aaab90a3b446caf242ac75b6365295e16d361f04247f51eda710

  • SSDEEP

    24576:2nsJ39LyjbJkQFMhmC+6GD9rFOa3KGekZ:2nsHyjtk2MYC5GD7mGekZ

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 2 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 24 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4b56bafba2096102e89442da19263b0bd9c3f172d6ff9e8d3a35a79942fec04.exe
    "C:\Users\Admin\AppData\Local\Temp\e4b56bafba2096102e89442da19263b0bd9c3f172d6ff9e8d3a35a79942fec04.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3108
    • C:\Users\Admin\AppData\Local\Temp\._cache_e4b56bafba2096102e89442da19263b0bd9c3f172d6ff9e8d3a35a79942fec04.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_e4b56bafba2096102e89442da19263b0bd9c3f172d6ff9e8d3a35a79942fec04.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1000
      • \??\c:\users\admin\appdata\local\temp\._cache_e4b56bafba2096102e89442da19263b0bd9c3f172d6ff9e8d3a35a79942fec04.exe 
        c:\users\admin\appdata\local\temp\._cache_e4b56bafba2096102e89442da19263b0bd9c3f172d6ff9e8d3a35a79942fec04.exe 
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:412
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c run.bat
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4460
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c taskkill /IM system64bit.exe /F
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1304
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /IM system64bit.exe /F
            5⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1300
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 412 -s 832
          4⤵
          • Program crash
          PID:4464
      • C:\Windows\Resources\Themes\icsys.icn.exe
        C:\Windows\Resources\Themes\icsys.icn.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:888
        • \??\c:\windows\resources\themes\explorer.exe
          c:\windows\resources\themes\explorer.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:672
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2736
            • \??\c:\windows\resources\svchost.exe
              c:\windows\resources\svchost.exe
              6⤵
              • Modifies visiblity of hidden/system files in Explorer
              • Executes dropped EXE
              • Adds Run key to start application
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1044
              • \??\c:\windows\resources\spoolsv.exe
                c:\windows\resources\spoolsv.exe PR
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:4132
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1800
      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:5020
        • \??\c:\users\admin\appdata\local\temp\._cache_synaptics.exe 
          c:\users\admin\appdata\local\temp\._cache_synaptics.exe  InjUpdate
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4068
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /IM system64bit.exe /F
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1176
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /IM system64bit.exe /F
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2044
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c run.bat
            5⤵
            • System Location Discovery: System Language Discovery
            PID:5072
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4068 -s 1004
            5⤵
            • Program crash
            PID:4368
        • C:\Windows\Resources\Themes\icsys.icn.exe
          C:\Windows\Resources\Themes\icsys.icn.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1320
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 412 -ip 412
    1⤵
      PID:700
    • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
      1⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4180
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4068 -ip 4068
      1⤵
        PID:2216

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Synaptics\Synaptics.exe

        Filesize

        1013KB

        MD5

        548150d442a1c649b78da947ce0ca1c9

        SHA1

        00b5dc0b636708d8335c09cc671d61e1162ce547

        SHA256

        e4b56bafba2096102e89442da19263b0bd9c3f172d6ff9e8d3a35a79942fec04

        SHA512

        579b42a35e616be216ffa113797ec8c9dfa0f65c91499754ab93bf4f575defc5e4bafa8a3907aaab90a3b446caf242ac75b6365295e16d361f04247f51eda710

      • C:\Users\Admin\AppData\Local\Temp\._cache_e4b56bafba2096102e89442da19263b0bd9c3f172d6ff9e8d3a35a79942fec04.exe

        Filesize

        259KB

        MD5

        19a636fff650a9e71235824df356e982

        SHA1

        19d727767b5f8f67e41e4e12064619ea1441253a

        SHA256

        d0b122309ba7ec2bc6a4dd8cd65925c7bfa06918125c439198da415c16223009

        SHA512

        34d359c77fa4b70f9ee25333825f663cb7e3078d950a66d0256c2ad947bf21130628d748087152f244816c01d889c7011826327368924bac15f2e629f13ef7f8

      • C:\Users\Admin\AppData\Local\Temp\._cache_e4b56bafba2096102e89442da19263b0bd9c3f172d6ff9e8d3a35a79942fec04.exe 

        Filesize

        129KB

        MD5

        50418f43f9eb2e0f0758949e47a5d3b0

        SHA1

        90565581b95c6db13fae2fcb6ee405185eb9c4a8

        SHA256

        f24da0bbc002a963bf6f985cda381424c864e4875fd78a94f1e6fe59b083713d

        SHA512

        f347679c631d601f045eabb03faf832ac768e275fd5a74437d936f764ba2bd824bf7ff6ab6e408e4bf58bf444e0b27b69e7a222303642cdf32fe66954d33947e

      • C:\Users\Admin\AppData\Local\Temp\77975E00

        Filesize

        25KB

        MD5

        78ed69d397fc33a83f622314a6953295

        SHA1

        01c6abb34d1d38c1e5066b28a63e1b0f0c772b76

        SHA256

        99c10b9cfd0c8eee276681952d95f7cfe5494c93c5cc71d539e2773618273be1

        SHA512

        9a44d11bda0ee772288eeeb41ccf3c38cad972f96dd4d1d78f38d6b16d54bbd736c52f9130e0f708d6caadcf9b6a1d9b2507e916b4a02d0f92d71f92f9c67020

      • C:\Users\Admin\AppData\Local\Temp\zSWWyFIr.xlsm

        Filesize

        17KB

        MD5

        e566fc53051035e1e6fd0ed1823de0f9

        SHA1

        00bc96c48b98676ecd67e81a6f1d7754e4156044

        SHA256

        8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

        SHA512

        a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

      • C:\Windows\Resources\Themes\icsys.icn.exe

        Filesize

        130KB

        MD5

        3bb11a44abf1b7dbb2b93ce8bf32d003

        SHA1

        0ed31a91447936f6218382939b40de1c92a94a90

        SHA256

        30d83f1be6b4b6dfbedb8d6de781c8c87b08b4d0f7d7361c5197b0a9cfb22ec1

        SHA512

        73392f5c2d54e683241268379eaea04f67c89748044d09628f31046f5fc7404eb3af2b4f8ad74d3e06577dd617a554a5f1c458cc04d35b7937891499bc9e350b

      • C:\Windows\Resources\svchost.exe

        Filesize

        130KB

        MD5

        0f85c76d2336f68a63adadda673b7e56

        SHA1

        41d19ff0281de8b6193976d77246b9cd6592e040

        SHA256

        42277c82a915501e677897c4970fd3673481f41235e773fafe3f3a64d429c0a2

        SHA512

        cd20a0d5abbd64dd692c4f3c4a304a6860714ebbe60701bf11fc5d8b4585e272e97323255dde52a23f0f3d428f6baa2a0d496a0cd8b4b4be18e36078bf779c83

      • \??\c:\windows\resources\spoolsv.exe

        Filesize

        130KB

        MD5

        aa270f3c5e3fb86ae6dcd7b663afd564

        SHA1

        8f531652cf30974b94d39dae8a0fbd9d6a959a0b

        SHA256

        2b73273e761a62c18b4a3cbc23ad4eff3604770a2668fc1f7481e6cfc6f16cf5

        SHA512

        84da890dc2ba53b7014d7dd239214b36151554fc7da78d0920cf997237c1412ddafa644d96f05c85bb7dca17f082187480e1ac4618e41fd20fa6a2ad36eeddb3

      • \??\c:\windows\resources\themes\explorer.exe

        Filesize

        130KB

        MD5

        44db80596ab35f9a8c4e1ec29be9e582

        SHA1

        32f76e084b940bcdac856140b6530eb63336d5ca

        SHA256

        57f803bb20a36c70253e8de1fe0a688ba9b2f6d4618a30cd33a41c3a7acbc88c

        SHA512

        982eac6fab56c5bf29f78a7da4d62bd1ecf1095f9adf5f1ad6ec71075d4a3b89bfb9d0e88666890df2918d3a7d4116b536021ced38415cd573667aeb9704998c

      • memory/412-177-0x00000000002C0000-0x000000000035A000-memory.dmp

        Filesize

        616KB

      • memory/672-341-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/888-281-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1000-282-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1000-70-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1044-343-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1320-255-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1320-239-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1800-134-0x00000000007D0000-0x00000000007D1000-memory.dmp

        Filesize

        4KB

      • memory/1800-308-0x00000000007D0000-0x00000000007D1000-memory.dmp

        Filesize

        4KB

      • memory/1800-309-0x0000000000400000-0x0000000000503000-memory.dmp

        Filesize

        1.0MB

      • memory/1800-340-0x0000000000400000-0x0000000000503000-memory.dmp

        Filesize

        1.0MB

      • memory/2736-275-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/3108-132-0x0000000000400000-0x0000000000503000-memory.dmp

        Filesize

        1.0MB

      • memory/3108-0-0x00000000022A0000-0x00000000022A1000-memory.dmp

        Filesize

        4KB

      • memory/4068-214-0x00000000006B0000-0x000000000074A000-memory.dmp

        Filesize

        616KB

      • memory/4132-261-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4180-203-0x00007FFB72090000-0x00007FFB720A0000-memory.dmp

        Filesize

        64KB

      • memory/4180-216-0x00007FFB6FB60000-0x00007FFB6FB70000-memory.dmp

        Filesize

        64KB

      • memory/4180-215-0x00007FFB6FB60000-0x00007FFB6FB70000-memory.dmp

        Filesize

        64KB

      • memory/4180-209-0x00007FFB72090000-0x00007FFB720A0000-memory.dmp

        Filesize

        64KB

      • memory/4180-208-0x00007FFB72090000-0x00007FFB720A0000-memory.dmp

        Filesize

        64KB

      • memory/4180-205-0x00007FFB72090000-0x00007FFB720A0000-memory.dmp

        Filesize

        64KB

      • memory/4180-206-0x00007FFB72090000-0x00007FFB720A0000-memory.dmp

        Filesize

        64KB

      • memory/5020-256-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB