Analysis

  • max time kernel
    143s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2024, 22:32

General

  • Target

    53d3b6cc06ee113cbd59a565031adfed27d71b5bae796b8cd3eb576f7ec240bd.exe

  • Size

    5.4MB

  • MD5

    4db70309f142abf1c95862ce47770e84

  • SHA1

    8fa99d3efa3a61541e6bebccc8ad654b4c2c0f0b

  • SHA256

    53d3b6cc06ee113cbd59a565031adfed27d71b5bae796b8cd3eb576f7ec240bd

  • SHA512

    f7a8df39a4e41eeb375081783826e083e0e6992189eb7a4d40bd89adcb7d0de96b0e42925b1b52df8cfb55880e375d234786049812c235634170d13374416390

  • SSDEEP

    98304:onsmtk2aHlEG8zU9zHsuWTTsAQ4t0/AH3V3SYlpVoyS+fW9eo+tXVe/PMMsFK:2L56TiTsAQ+0gBdlrrfW0o+dVeHMMsFK

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 35 IoCs
  • Drops file in Program Files directory 21 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 42 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\53d3b6cc06ee113cbd59a565031adfed27d71b5bae796b8cd3eb576f7ec240bd.exe
    "C:\Users\Admin\AppData\Local\Temp\53d3b6cc06ee113cbd59a565031adfed27d71b5bae796b8cd3eb576f7ec240bd.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1596
    • C:\Users\Admin\AppData\Local\Temp\._cache_53d3b6cc06ee113cbd59a565031adfed27d71b5bae796b8cd3eb576f7ec240bd.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_53d3b6cc06ee113cbd59a565031adfed27d71b5bae796b8cd3eb576f7ec240bd.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      PID:3888
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3412
        • C:\Program Files (x86)\GS-911\GS911USBDrv\DPInstx64.exe
          "C:\Program Files (x86)\GS-911\GS911USBDrv\DPInstx64.exe" /S
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Checks SCSI registry key(s)
          PID:628
        • C:\Program Files (x86)\GS-911\GS-911.exe
          "C:\Program Files (x86)\GS-911\GS-911.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:2300
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4892
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
    1⤵
    • Drops file in Windows directory
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3516
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "4" "8" "C:\Users\Admin\AppData\Local\Temp\{5a4d5fa7-2b6a-b64d-9459-81957212bada}\gs911usb.inf" "9" "492de6ad3" "0000000000000154" "WinSta0\Default" "00000000000000BC" "208" "c:\program files (x86)\gs-911\gs911usbdrv"
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Modifies data under HKEY_USERS
      PID:1092

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\GS-911\GS-911.exe

          Filesize

          221KB

          MD5

          932c49e7a84c37a9191212489e037126

          SHA1

          865940ad4792d0715fe87a42dce20589a768db5b

          SHA256

          c80c16c3278973566efafb2ebe8102d9adfaf6cbebed28d4a1d3abc72043c7fa

          SHA512

          45c2c1b25eba58421de61b1fda53379cd730baeaf365bac2dd89f49853933e21512f9c09e0377c42bf50371ea64989fae2060f3401ec9369452b10baf77bc5f9

        • C:\Program Files (x86)\GS-911\GS-911.exe

          Filesize

          3.6MB

          MD5

          aba145d1de91ab1e0ba679410e353ff2

          SHA1

          1f539de1f809327ea24c57234daffb1f0b4605ee

          SHA256

          e52d79d132e87de8a49a7ea21e1263fc70a36f885ea5ddbd0965853791fab76a

          SHA512

          4c00dc2d6795af7acfcbecf32222c04711db68aa4a1ea10c8092f3621c97f24128987fd78f554dc515f82b764e9cf4b0aec3ac6750b630d8b395d606b26e1302

        • C:\Program Files (x86)\GS-911\GS911USBDrv\DPInstx64.exe

          Filesize

          913KB

          MD5

          e90140ff5f5ff7521ea52f94bec29f8c

          SHA1

          a3aaf4d6705984d2f0b97d277766ebc82a26011f

          SHA256

          0e25afc6f2c17e08afc91f7717b3669cb4de6f77dd62b78674b09e0d59e4aa3c

          SHA512

          f644e4c22be81aeddf380ec8b550c3774a6c8678b9ad4cb210235ae440bd9f1e16df84832babac21672b69a57ebd779bbfb562dd6158f91cc48367ef3e383a3e

        • C:\Program Files (x86)\GS-911\License.txt

          Filesize

          13KB

          MD5

          2ce15983845fc5b5c53ae69f21d2baa6

          SHA1

          6866742752b1f8ecf274c82b1930ed716301284e

          SHA256

          f88031b99044ec310c196d773560a056fe4edcbda07cddd0d6e32722e783d162

          SHA512

          a07b5b21fe7508ba463994d7690f080751dd54100e1f22ef49c532e0de1a30a456043347f403369a7bf713d5f9a266bc9ed9f9ea17f715e7648936e13611feb5

        • C:\ProgramData\Synaptics\Synaptics.exe

          Filesize

          5.4MB

          MD5

          4db70309f142abf1c95862ce47770e84

          SHA1

          8fa99d3efa3a61541e6bebccc8ad654b4c2c0f0b

          SHA256

          53d3b6cc06ee113cbd59a565031adfed27d71b5bae796b8cd3eb576f7ec240bd

          SHA512

          f7a8df39a4e41eeb375081783826e083e0e6992189eb7a4d40bd89adcb7d0de96b0e42925b1b52df8cfb55880e375d234786049812c235634170d13374416390

        • C:\Users\Admin\AppData\Local\Temp\._cache_53d3b6cc06ee113cbd59a565031adfed27d71b5bae796b8cd3eb576f7ec240bd.exe

          Filesize

          4.7MB

          MD5

          4170a6583b6a182f9c2f4295574fc171

          SHA1

          e61f16339ca634759113142f0fddb4012afaf41b

          SHA256

          033e46c4e8a5c135e610db0d7617f19aa3926f974b7157be3a27e4082e5bf33b

          SHA512

          8bd7d2bfeef83221606075d16d5b1cf82919409c1e4c8edf5417a63373109a591ebbceb0ee827f9666c9dc341dd13226f525c4013008b621c0e5857164a7bc0f

        • C:\Users\Admin\AppData\Local\Temp\A0A75E00

          Filesize

          20KB

          MD5

          2bbd5f6a58b704e3e0ca28e07fbb1715

          SHA1

          457ef6084c5e27abbb0c65e46eedfdca5e520491

          SHA256

          6dc523021b2f15619327d12903489d7a7e358cbbf1c665ba9dacd2e338afe9e4

          SHA512

          e5ee38933588cbbf023f2a0d4b5452620a46ea1a5584ccc72cc42e7341d4a31784439b57fb2aa9a9f90fbdc454b97ee42557ac9f39d501f35b94541e222bb88a

        • C:\Users\Admin\AppData\Local\Temp\Uyt548E6.xlsm

          Filesize

          17KB

          MD5

          e566fc53051035e1e6fd0ed1823de0f9

          SHA1

          00bc96c48b98676ecd67e81a6f1d7754e4156044

          SHA256

          8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

          SHA512

          a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

        • C:\Users\Admin\AppData\Local\Temp\nsn9B56.tmp\System.dll

          Filesize

          11KB

          MD5

          c17103ae9072a06da581dec998343fc1

          SHA1

          b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

          SHA256

          dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

          SHA512

          d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

        • C:\Users\Admin\AppData\Local\Temp\nsn9B56.tmp\nsDialogs.dll

          Filesize

          9KB

          MD5

          c10e04dd4ad4277d5adc951bb331c777

          SHA1

          b1e30808198a3ae6d6d1cca62df8893dc2a7ad43

          SHA256

          e31ad6c6e82e603378cb6b80e67d0e0dcd9cf384e1199ac5a65cb4935680021a

          SHA512

          853a5564bf751d40484ea482444c6958457cb4a17fb973cf870f03f201b8b2643be41bccde00f6b2026dc0c3d113e6481b0dc4c7b0f3ae7966d38c92c6b5862e

        • C:\Users\Admin\AppData\Roaming\GS-911\data.dat

          Filesize

          59KB

          MD5

          08843db87aa2c66a11ac2b9c8df5d56b

          SHA1

          8a62cf7547eb01fa673d9e3bb7d099fa977c7fa1

          SHA256

          f0ac28d6b30826a2fc5b818ba0841feb0888a12e5c6016f02d2b904f104a1f63

          SHA512

          43e7181e0ece1b8d2454a6ac782c43c514009ccab842c85dd736e7294124c405ffab98d72ca66ba9719c086f037b33e1767ea6cb7fde25de28daa829ab2e9bda

        • C:\Users\Admin\AppData\Roaming\GS-911\data.sig

          Filesize

          74B

          MD5

          2acc664fa9af6908f9565738ff68d856

          SHA1

          b4a4047727f172b01da40d76bc19330b36787a82

          SHA256

          989f2b445ea52a202f38144a45c2726951a831962b635347f915d5e145244ff0

          SHA512

          aa3b768579b7e054fb55eca36d177043fe2704ba66e6ebfa8837511e06371a9694b1308d02c6801c81084ac43b03970fcce6a515bdaac957f42d488619971521

        • C:\Windows\System32\CatRoot2\dberr.txt

          Filesize

          37KB

          MD5

          5cfe52f8a433eff33c5bef8c35ab5c8a

          SHA1

          a159278fcaf66f8e8ccf846010cbde509bbcb592

          SHA256

          330e333035cf4a07b97a5a4d86e0547fce56df7bf0ba195153ab3766e430be84

          SHA512

          c8a71acd0c8b252eb5e8b3915e5d63143d89ab2d820879945787aa1ee167cc91fdf66d6d7cb56c7d74b1aaf56bf2ae4c1f553c333eb34659a951359eed141338

        • \??\c:\PROGRA~2\gs-911\GS911U~1\amd64\gs911usb.sys

          Filesize

          67KB

          MD5

          0f210048c6bfbfbc0f50816bce40b575

          SHA1

          2fd94cfbfd8dd4a2edd004f1c6cc50b926529258

          SHA256

          73c015b6ee647a875bd124254542ff8759264d51f331ff95d14675c1599fad94

          SHA512

          9d37b1cdf2a39fdd6a9215839d1a7b4e538b31ae7f8f0c2e0de39434f337ea8f440112e8d8198d93f53602a7d9260d9eb41ecacf91aa38feba1c360b17a945a8

        • \??\c:\PROGRA~2\gs-911\GS911U~1\amd64\gs911usb64.dll

          Filesize

          313KB

          MD5

          e2df9664d8e158efffc4f3cd0fde15e8

          SHA1

          54352e4470af8756b1c0a222cbf7e48264ac1920

          SHA256

          40b71c4eab9b8b6801bab4575a64fea73961471aa8bdfc11083a3890f9bc7c30

          SHA512

          d4f939caedd5c81732f9317c90acba9d7562205c293ebb22f9569f87e4486189a52bb1bd455896db611ec665701a104a63ac1a8d3f856854fc008f2923678d02

        • \??\c:\PROGRA~2\gs-911\GS911U~1\amd64\gs911usbui.dll

          Filesize

          140KB

          MD5

          aa15b12108b05f07669a2bc6e7c6365c

          SHA1

          9cb7482822e50ed233613678efa7a8ca9bd7b377

          SHA256

          ef32ba13d527d5f52c9196b6c48fe7af8592837f3424ebe47450a2c62bd7a6e7

          SHA512

          69cfaecdd7f007f60ca26cd53c0f191582845f6340c85bdc5961786fde22ef09c1d55335246961d4522d30b00119de1f2e6548126bbc1f16efe863cc9076a06a

        • \??\c:\PROGRA~2\gs-911\GS911U~1\amd64\hc-lang.dll

          Filesize

          263KB

          MD5

          63c18cc6ff6130215d14c8212b1bd450

          SHA1

          2d9c88113da0090b96549f49e2341e18c85d80c5

          SHA256

          a68ed4225cde423e8d2f2774ff26986b1b2e8b2c5b05412f95f5319cb5bf78e2

          SHA512

          b8ee9e5b9d3fd14717c60f671da16c6bef4bfa7e018e483d45cac9cbd28de9d958fa2fad90b417b825b3fd438d76a67fcf9a16bcc281bdd64c2ab858b9233ff8

        • \??\c:\PROGRA~2\gs-911\GS911U~1\hc-bus.cat

          Filesize

          11KB

          MD5

          20a4a148648f75704c7fdbeb03aa0eab

          SHA1

          83d4f551a90ea691f9add59bc8f19968051c8f85

          SHA256

          67515f99ce3bff25d560d3bdc8b4cdf16d06e96a8eb31f36c2cb49a54355246f

          SHA512

          e8ffa41747c04de1cc3d8406c29298fd4e80b40e8de818dafac2a3676ee0877f7c6e5a33e4d958f377f62c45f80c57eda368dcb55c4173d5ee24ab6cf98a0413

        • \??\c:\PROGRA~2\gs-911\GS911U~1\i386\gs911usb.dll

          Filesize

          197KB

          MD5

          9adbed60e17690bd72e3ab134cc97bbd

          SHA1

          d9a7e8b8f162ecc459b2c2f6c3f68baed5e7814a

          SHA256

          b052d6dcf61b864e948743cd02c29f0bf80f94e6c705bc4dbe858b55eeabbbb2

          SHA512

          80cbee076552dcb4d49eaa355d96e9a81d475c85b3a5b1fe561e3e0eda9ee0400c9fc2c9eadba8d8a4edb0156a5a4213fc34043e72a4930e107108a8989b83ea

        • \??\c:\program files (x86)\gs-911\gs911usbdrv\gs911usb.inf

          Filesize

          2KB

          MD5

          76a15fb2488648bd174d900dd6a9778c

          SHA1

          af3ba36231290959b70f0ccfb2c4cd2708efb384

          SHA256

          8e05016985541fa9fc702b7bc586fc6e183167a6ef37693d80885c2e2c6550e1

          SHA512

          010c9cdf7524f0467c96ba59a03da4f6e70e35a6361b0d28d268638d9487e6a1d3cbaab46d3e2e732c676ec2e9d0901e57bb436a11593f4a854ed746b34ab063

        • memory/1596-129-0x0000000000400000-0x000000000096B000-memory.dmp

          Filesize

          5.4MB

        • memory/1596-0-0x0000000000B50000-0x0000000000B51000-memory.dmp

          Filesize

          4KB

        • memory/2012-256-0x0000000000400000-0x000000000096B000-memory.dmp

          Filesize

          5.4MB

        • memory/2012-428-0x0000000000400000-0x000000000096B000-memory.dmp

          Filesize

          5.4MB

        • memory/2012-466-0x0000000000400000-0x000000000096B000-memory.dmp

          Filesize

          5.4MB

        • memory/2300-477-0x0000000000400000-0x00000000007C8000-memory.dmp

          Filesize

          3.8MB

        • memory/2300-447-0x0000000000400000-0x00000000007C8000-memory.dmp

          Filesize

          3.8MB

        • memory/2300-444-0x0000000000400000-0x00000000007C8000-memory.dmp

          Filesize

          3.8MB

        • memory/2300-442-0x0000000000400000-0x00000000007C8000-memory.dmp

          Filesize

          3.8MB

        • memory/2300-430-0x0000000000400000-0x00000000007C8000-memory.dmp

          Filesize

          3.8MB

        • memory/4892-252-0x00007FFD77C70000-0x00007FFD77C80000-memory.dmp

          Filesize

          64KB

        • memory/4892-255-0x00007FFD77C70000-0x00007FFD77C80000-memory.dmp

          Filesize

          64KB

        • memory/4892-192-0x00007FFD77C70000-0x00007FFD77C80000-memory.dmp

          Filesize

          64KB

        • memory/4892-253-0x00007FFD77C70000-0x00007FFD77C80000-memory.dmp

          Filesize

          64KB

        • memory/4892-190-0x00007FFD77C70000-0x00007FFD77C80000-memory.dmp

          Filesize

          64KB

        • memory/4892-196-0x00007FFD75310000-0x00007FFD75320000-memory.dmp

          Filesize

          64KB

        • memory/4892-254-0x00007FFD77C70000-0x00007FFD77C80000-memory.dmp

          Filesize

          64KB

        • memory/4892-194-0x00007FFD77C70000-0x00007FFD77C80000-memory.dmp

          Filesize

          64KB

        • memory/4892-197-0x00007FFD75310000-0x00007FFD75320000-memory.dmp

          Filesize

          64KB

        • memory/4892-191-0x00007FFD77C70000-0x00007FFD77C80000-memory.dmp

          Filesize

          64KB

        • memory/4892-193-0x00007FFD77C70000-0x00007FFD77C80000-memory.dmp

          Filesize

          64KB