Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2024 11:03

General

  • Target

    d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe

  • Size

    1.2MB

  • MD5

    4f2413b765036fcc61fbda99175c1f80

  • SHA1

    a4cc42f91cd65a6b932c21c2d6a2583b0bad8e70

  • SHA256

    d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61

  • SHA512

    87060f128d73eca6db5bdcd6e6d8cce311fa05ca35357a039047cfa92edfced2b090ef9df16f18212a0c9a7b62cc6b57a16bde48dafdbf3364b22b0c59162469

  • SSDEEP

    12288:7MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9APoBhY8QyIE63j:7nsJ39LyjbJkQFMhmC+6GD9HY9JBz

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe
    "C:\Users\Admin\AppData\Local\Temp\d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2276
    • C:\Users\Admin\AppData\Local\Temp\._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2940
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2940 -s 624
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2084
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2108
      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2812
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2812 -s 624
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2308
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    1.2MB

    MD5

    4f2413b765036fcc61fbda99175c1f80

    SHA1

    a4cc42f91cd65a6b932c21c2d6a2583b0bad8e70

    SHA256

    d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61

    SHA512

    87060f128d73eca6db5bdcd6e6d8cce311fa05ca35357a039047cfa92edfced2b090ef9df16f18212a0c9a7b62cc6b57a16bde48dafdbf3364b22b0c59162469

  • C:\Users\Admin\AppData\Local\Temp\H8919eYP.xlsm

    Filesize

    28KB

    MD5

    e64d69c00a151c8861bac4e09939e849

    SHA1

    bbd4b7b6b1d92535a430ffb1cf61f5862a5fbbf2

    SHA256

    e2a2e4fc179988ba38b58ce20c6f8cb54c99d682a21c1c8b63b0195f42e41616

    SHA512

    940174400cf1a53216930bc55e206f26c7c1fca35f323242c6458b61eff310a61f2c575729f9793b7e285221e716eab2bd8fa08a9bddc1079d356f21674b893a

  • C:\Users\Admin\AppData\Local\Temp\H8919eYP.xlsm

    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Users\Admin\AppData\Local\Temp\H8919eYP.xlsm

    Filesize

    20KB

    MD5

    c9e50c6138b6b3a442f9f156e1def0e8

    SHA1

    5698110bdd03fb33f53b039495206746f56b5496

    SHA256

    787bf99fc4d38527ee4dfc5de1ec4c4892046aa22156913835afa0831fef8be8

    SHA512

    d92162f2a32ac58e161acd3de2bf6696940383333a02a820b1ec2b42110c36b10931b8279355eeaac0a4bf46c31567786e7638d2583e33f8c4b90bb5fad624f8

  • C:\Users\Admin\AppData\Local\Temp\H8919eYP.xlsm

    Filesize

    22KB

    MD5

    25a2d514566f316347f34796138ff03e

    SHA1

    d142888a8336af619f08a17d981b7656370b127f

    SHA256

    0000aa1007c70fa85b9e243431b8e05fa6f669a11ffd47e721ce5a6cce8b2fdc

    SHA512

    4b5bc7cffdca3e99b807566dcbd14ede729057df1351c86d268102fb05c4f4e932e5f04f8f015fd18c8f2dfbf7e833a2311e28fbe274ca4f487e8bb3babf0f68

  • C:\Users\Admin\AppData\Local\Temp\H8919eYP.xlsm

    Filesize

    21KB

    MD5

    b750ad6286492c3d822ef249e301e1b3

    SHA1

    8eeb9661f44467e784f5bd1a1086726b3e66e807

    SHA256

    2f765627ea47223451987d8a7d6774a5c93cd92b4b21ed5732c2a5aaa1c530f5

    SHA512

    49d57ee8772e658dfbd716cd7e1322fe04f54d10a8dd39dff2e39c47abc101c999b9beba0aeb863b8af1b77cae4df10fe62084101598649cbe32f9560ec9469f

  • C:\Users\Admin\AppData\Local\Temp\~$H8919eYP.xlsm

    Filesize

    165B

    MD5

    ff09371174f7c701e75f357a187c06e8

    SHA1

    57f9a638fd652922d7eb23236c80055a91724503

    SHA256

    e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8

    SHA512

    e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882

  • \Users\Admin\AppData\Local\Temp\._cache_d3c8798b57a02aa5370b98e0179a3ee3790002e96b64fe5f9b9d6a4e3e537c61N.exe

    Filesize

    443KB

    MD5

    40918b19a89cc4dcf6ec03c7f07ccd35

    SHA1

    26ec973875e0a5b4d4bb0b3eef70a701f3b86c70

    SHA256

    f723a08340dd51b9264b6dd4b9105634b4537428bc86e1efd93af768501dd66b

    SHA512

    ce5dbdeb674cf3daabaab3779ec749f7114177dc251e79aafaee4bc46b33b453355ee2b02dc146b93b22693540da104bcb256fe4512b8933c5f8774a34f9f31b

  • memory/2108-161-0x0000000000400000-0x0000000000531000-memory.dmp

    Filesize

    1.2MB

  • memory/2108-129-0x0000000000400000-0x0000000000531000-memory.dmp

    Filesize

    1.2MB

  • memory/2108-50-0x0000000000400000-0x0000000000531000-memory.dmp

    Filesize

    1.2MB

  • memory/2108-128-0x0000000000400000-0x0000000000531000-memory.dmp

    Filesize

    1.2MB

  • memory/2276-28-0x0000000000400000-0x0000000000531000-memory.dmp

    Filesize

    1.2MB

  • memory/2276-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2812-43-0x0000000000DD0000-0x0000000000E44000-memory.dmp

    Filesize

    464KB

  • memory/2940-26-0x00000000008B0000-0x0000000000924000-memory.dmp

    Filesize

    464KB

  • memory/2940-18-0x0000000073A6E000-0x0000000073A6F000-memory.dmp

    Filesize

    4KB

  • memory/3064-127-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/3064-51-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB