Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2024 15:16

General

  • Target

    17656c5bd8d7f835fdcd18a71970c942a738290272cc781638b4332ccb45ca99N.exe

  • Size

    899KB

  • MD5

    3db2c835eb5d134cba1ae703c5f914a0

  • SHA1

    ea5b12d0db70bbf138b3092142531fc357b2a4bf

  • SHA256

    17656c5bd8d7f835fdcd18a71970c942a738290272cc781638b4332ccb45ca99

  • SHA512

    9fb30c97f2edb4669e3e3ebfbd2c7b221a3438beee2ed53c7560a694c7db0959594cca92e0e317b88c75932abcfca551c0225d6f75898e2d1ca6a964f50f93d4

  • SSDEEP

    12288:Aaxr7vr7fYnPHv3jz/jDnTnbPr7Hf/TLzAHr3fP37bv/4wDvbwt2ThsA0eOzkv4d:Aad7PThOJkQFMhmC+6GD9Yuu1OUjezCu

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Extracted

Family

bdaejec

C2

ddos.dnsnb8.net

Signatures

  • Bdaejec

    Bdaejec is a backdoor written in C++.

  • Bdaejec family
  • Detects Bdaejec Backdoor. 2 IoCs

    Bdaejec is backdoor written in C++.

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17656c5bd8d7f835fdcd18a71970c942a738290272cc781638b4332ccb45ca99N.exe
    "C:\Users\Admin\AppData\Local\Temp\17656c5bd8d7f835fdcd18a71970c942a738290272cc781638b4332ccb45ca99N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Windows\svchost.exe
      "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\17656c5bd8d7f835fdcd18a71970c942a738290272cc781638b4332ccb45ca99N.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1864
      • C:\Users\Admin\AppData\Local\Temp\17656c5bd8d7f835fdcd18a71970c942a738290272cc781638b4332ccb45ca99N.exe
        "C:\Users\Admin\AppData\Local\Temp\17656c5bd8d7f835fdcd18a71970c942a738290272cc781638b4332ccb45ca99N.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:536
        • C:\Users\Admin\AppData\Local\Temp\._cache_17656c5bd8d7f835fdcd18a71970c942a738290272cc781638b4332ccb45ca99N.exe
          "C:\Users\Admin\AppData\Local\Temp\._cache_17656c5bd8d7f835fdcd18a71970c942a738290272cc781638b4332ccb45ca99N.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:872
          • C:\Users\Admin\AppData\Local\Temp\kBLWbv.exe
            C:\Users\Admin\AppData\Local\Temp\kBLWbv.exe
            5⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2820
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\63d54657.bat" "
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1436
        • C:\ProgramData\Synaptics\Synaptics.exe
          "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1536
          • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
            "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
            5⤵
            • Executes dropped EXE
            PID:2652
  • C:\Windows\svchost.exe
    C:\Windows\svchost.exe
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    PID:1632
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe

    Filesize

    1.1MB

    MD5

    15e2192b38b8c6162f477113b8ce027d

    SHA1

    673074054a49a25e9baf6fe2fc7cf8cfc8ae110a

    SHA256

    4a20c212912cb30990048b595bb1bd396672200f97518e01cc810d4566bb3a52

    SHA512

    d2427b1c786c13723697f55377a12be0a9cf097d01fd6ec16ec5777e79cc0a1234d5f82d52705e7a9b4a73815e0ce097d2ee39d90317b9fc776cffb15736065a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0I0VVMWQ\k2[1].rar

    Filesize

    4B

    MD5

    d3b07384d113edec49eaa6238ad5ff00

    SHA1

    f1d2d2f924e986ac86fdf7b36c94bcdf32beec15

    SHA256

    b5bb9d8014a0f9b1d61e21e796d78dccdf1352f23cd32812f4850b878ae4944c

    SHA512

    0cf9180a764aba863a67b6d72f0918bc131c6772642cb2dce5a34f0a702f9470ddc2bf125c12198b1995c233c34b4afd346c54a2334c350a948a51b6e8b4e6b6

  • C:\Users\Admin\AppData\Local\Temp\100A1654.exe

    Filesize

    4B

    MD5

    20879c987e2f9a916e578386d499f629

    SHA1

    c7b33ddcc42361fdb847036fc07e880b81935d5d

    SHA256

    9f2981a7cc4d40a2a409dc895de64253acd819d7c0011c8e80b86fe899464e31

    SHA512

    bcdde1625364dd6dd143b45bdcec8d59cf8982aff33790d390b839f3869e0e815684568b14b555a596d616252aeeaa98dac2e6e551c9095ea11a575ff25ff84f

  • C:\Users\Admin\AppData\Local\Temp\17656c5bd8d7f835fdcd18a71970c942a738290272cc781638b4332ccb45ca99N.exe

    Filesize

    864KB

    MD5

    247afae327ca2b801fa29546216b7e2e

    SHA1

    13063686f6cfce200dbd4ffdad43ecd89008ff60

    SHA256

    fc13eaec9aa3ce50d860c5e2506aa73b1f62d0b6e12bb90e838932c231c42bf0

    SHA512

    e70e09edb96ba231be28bfb7be9c77b5c185a1d83ea64af8a95cd79401e254dc75aeee74a196d90653bf33ec0a118e032f23bdd7095762125a3275ac3120241f

  • C:\Users\Admin\AppData\Local\Temp\63d54657.bat

    Filesize

    187B

    MD5

    b79b732a30f99e1c204cef8c903a699c

    SHA1

    2ab6f5621ab5a96a7e8f7ffe14a49b979e96f681

    SHA256

    b391cff34c538cb052e0abfb775a0d2df8a1ad2273fe4b05d9c9529fb924c97f

    SHA512

    903c14dcf65cb9e875e54bf4711a42dca69f2f53cd0cb141ed3fb1178fb256e649606a73f8c0845bc782e2dad520e5b715a8d93e36a13ef37775d778245c4b9d

  • C:\Users\Admin\AppData\Local\Temp\CnpX4bJH.xlsm

    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Windows\svchost.exe

    Filesize

    35KB

    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • \Users\Admin\AppData\Local\Temp\._cache_17656c5bd8d7f835fdcd18a71970c942a738290272cc781638b4332ccb45ca99N.exe

    Filesize

    108KB

    MD5

    778cb3794fe4938a575a75a50dd10de7

    SHA1

    8b7b2a353ea7e48b6678c515ddd734b1f9c0bf82

    SHA256

    65d7c9788f85a0d2b8635c53e9167e8f9bdc09cac53c23f658a53ff7a7b176ad

    SHA512

    ea273310deb32718e44e200dd026aa792806854b839ee709a726bda85c69f1e687d1c5d55f877fb0f5606c8d1d6054b99111a9ad6dac2eb2ff8dae50c099a367

  • \Users\Admin\AppData\Local\Temp\kBLWbv.exe

    Filesize

    15KB

    MD5

    56b2c3810dba2e939a8bb9fa36d3cf96

    SHA1

    99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

    SHA256

    4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

    SHA512

    27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

  • memory/536-34-0x0000000003F00000-0x0000000003F21000-memory.dmp

    Filesize

    132KB

  • memory/536-66-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/536-17-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/872-48-0x0000000000030000-0x0000000000039000-memory.dmp

    Filesize

    36KB

  • memory/872-104-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/872-55-0x0000000000030000-0x0000000000039000-memory.dmp

    Filesize

    36KB

  • memory/872-35-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/872-185-0x0000000000030000-0x0000000000039000-memory.dmp

    Filesize

    36KB

  • memory/1172-83-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1536-80-0x0000000003FF0000-0x0000000004011000-memory.dmp

    Filesize

    132KB

  • memory/1536-117-0x0000000003FF0000-0x0000000004011000-memory.dmp

    Filesize

    132KB

  • memory/1536-120-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/1536-184-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/1632-116-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1864-21-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2552-5-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2652-82-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2820-119-0x00000000000E0000-0x00000000000E9000-memory.dmp

    Filesize

    36KB

  • memory/2820-56-0x00000000000E0000-0x00000000000E9000-memory.dmp

    Filesize

    36KB