Analysis

  • max time kernel
    112s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2024 15:16

General

  • Target

    17656c5bd8d7f835fdcd18a71970c942a738290272cc781638b4332ccb45ca99N.exe

  • Size

    899KB

  • MD5

    3db2c835eb5d134cba1ae703c5f914a0

  • SHA1

    ea5b12d0db70bbf138b3092142531fc357b2a4bf

  • SHA256

    17656c5bd8d7f835fdcd18a71970c942a738290272cc781638b4332ccb45ca99

  • SHA512

    9fb30c97f2edb4669e3e3ebfbd2c7b221a3438beee2ed53c7560a694c7db0959594cca92e0e317b88c75932abcfca551c0225d6f75898e2d1ca6a964f50f93d4

  • SSDEEP

    12288:Aaxr7vr7fYnPHv3jz/jDnTnbPr7Hf/TLzAHr3fP37bv/4wDvbwt2ThsA0eOzkv4d:Aad7PThOJkQFMhmC+6GD9Yuu1OUjezCu

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Extracted

Family

bdaejec

C2

ddos.dnsnb8.net

Signatures

  • Bdaejec

    Bdaejec is a backdoor written in C++.

  • Bdaejec family
  • Detects Bdaejec Backdoor. 2 IoCs

    Bdaejec is backdoor written in C++.

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks system information in the registry 2 TTPs 2 IoCs

    System information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17656c5bd8d7f835fdcd18a71970c942a738290272cc781638b4332ccb45ca99N.exe
    "C:\Users\Admin\AppData\Local\Temp\17656c5bd8d7f835fdcd18a71970c942a738290272cc781638b4332ccb45ca99N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Windows\svchost.exe
      "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\17656c5bd8d7f835fdcd18a71970c942a738290272cc781638b4332ccb45ca99N.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2816
      • C:\Users\Admin\AppData\Local\Temp\17656c5bd8d7f835fdcd18a71970c942a738290272cc781638b4332ccb45ca99N.exe
        "C:\Users\Admin\AppData\Local\Temp\17656c5bd8d7f835fdcd18a71970c942a738290272cc781638b4332ccb45ca99N.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2496
        • C:\Users\Admin\AppData\Local\Temp\._cache_17656c5bd8d7f835fdcd18a71970c942a738290272cc781638b4332ccb45ca99N.exe
          "C:\Users\Admin\AppData\Local\Temp\._cache_17656c5bd8d7f835fdcd18a71970c942a738290272cc781638b4332ccb45ca99N.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2476
          • C:\Users\Admin\AppData\Local\Temp\kBLWbv.exe
            C:\Users\Admin\AppData\Local\Temp\kBLWbv.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Drops file in Program Files directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2852
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\35132197.bat" "
              6⤵
              • System Location Discovery: System Language Discovery
              PID:4068
        • C:\ProgramData\Synaptics\Synaptics.exe
          "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:5084
          • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
            "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2280
  • C:\Windows\svchost.exe
    C:\Windows\svchost.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:1028
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks computer location settings
    • Executes dropped EXE
    • Checks system information in the registry
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0BHOTC3C\k2[1].rar

    Filesize

    4B

    MD5

    d3b07384d113edec49eaa6238ad5ff00

    SHA1

    f1d2d2f924e986ac86fdf7b36c94bcdf32beec15

    SHA256

    b5bb9d8014a0f9b1d61e21e796d78dccdf1352f23cd32812f4850b878ae4944c

    SHA512

    0cf9180a764aba863a67b6d72f0918bc131c6772642cb2dce5a34f0a702f9470ddc2bf125c12198b1995c233c34b4afd346c54a2334c350a948a51b6e8b4e6b6

  • C:\Users\Admin\AppData\Local\Temp\._cache_17656c5bd8d7f835fdcd18a71970c942a738290272cc781638b4332ccb45ca99N.exe

    Filesize

    108KB

    MD5

    778cb3794fe4938a575a75a50dd10de7

    SHA1

    8b7b2a353ea7e48b6678c515ddd734b1f9c0bf82

    SHA256

    65d7c9788f85a0d2b8635c53e9167e8f9bdc09cac53c23f658a53ff7a7b176ad

    SHA512

    ea273310deb32718e44e200dd026aa792806854b839ee709a726bda85c69f1e687d1c5d55f877fb0f5606c8d1d6054b99111a9ad6dac2eb2ff8dae50c099a367

  • C:\Users\Admin\AppData\Local\Temp\17656c5bd8d7f835fdcd18a71970c942a738290272cc781638b4332ccb45ca99N.exe

    Filesize

    864KB

    MD5

    247afae327ca2b801fa29546216b7e2e

    SHA1

    13063686f6cfce200dbd4ffdad43ecd89008ff60

    SHA256

    fc13eaec9aa3ce50d860c5e2506aa73b1f62d0b6e12bb90e838932c231c42bf0

    SHA512

    e70e09edb96ba231be28bfb7be9c77b5c185a1d83ea64af8a95cd79401e254dc75aeee74a196d90653bf33ec0a118e032f23bdd7095762125a3275ac3120241f

  • C:\Users\Admin\AppData\Local\Temp\35132197.bat

    Filesize

    187B

    MD5

    8b2becf231040d90f98730819612a80b

    SHA1

    46ac2a2524358ba69a51e22fb6122f0754487197

    SHA256

    1f31b0917f9240ab386f9a8921394569ef23839fa4d9af54bd9bc7bb5c1dd221

    SHA512

    32009ff7202a9c2cb45eda8fef0ec5f9bac2245c2ecf969c2adc720d2dbc66f377f2a13c909d74775e83fcc4cf5b60d4ac40ef365be6f3abf8c86335ea36a2df

  • C:\Users\Admin\AppData\Local\Temp\6D6E59FE.exe

    Filesize

    4B

    MD5

    20879c987e2f9a916e578386d499f629

    SHA1

    c7b33ddcc42361fdb847036fc07e880b81935d5d

    SHA256

    9f2981a7cc4d40a2a409dc895de64253acd819d7c0011c8e80b86fe899464e31

    SHA512

    bcdde1625364dd6dd143b45bdcec8d59cf8982aff33790d390b839f3869e0e815684568b14b555a596d616252aeeaa98dac2e6e551c9095ea11a575ff25ff84f

  • C:\Users\Admin\AppData\Local\Temp\TPWneBD2.xlsm

    Filesize

    23KB

    MD5

    9bb0526ce870163bb9c9a0395065dbc6

    SHA1

    62f8a55d83f4e6aa48df445d8151c625783de296

    SHA256

    7356bedc86d9a69e080329ceb6913c34c89d1f501313e997da1265d22426288a

    SHA512

    52a2e8f6f6660752506021f3cb69e4a1ba1c2bae45357d7fedbb8c30fd697dd29be3f1e301f9f44fb02fc4e7f9af524bbf34e1f4ceda4967f0c284e94a86f2a5

  • C:\Users\Admin\AppData\Local\Temp\TPWneBD2.xlsm

    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Users\Admin\AppData\Local\Temp\kBLWbv.exe

    Filesize

    15KB

    MD5

    56b2c3810dba2e939a8bb9fa36d3cf96

    SHA1

    99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

    SHA256

    4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

    SHA512

    27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

  • C:\Windows\svchost.exe

    Filesize

    35KB

    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • memory/1028-172-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1028-277-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2280-163-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2368-3-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2476-171-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2476-46-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2496-13-0x0000000002270000-0x0000000002271000-memory.dmp

    Filesize

    4KB

  • memory/2496-121-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/2816-10-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2852-174-0x0000000000C90000-0x0000000000C99000-memory.dmp

    Filesize

    36KB

  • memory/2852-120-0x0000000000C90000-0x0000000000C99000-memory.dmp

    Filesize

    36KB

  • memory/4224-198-0x00007FFD133F0000-0x00007FFD13400000-memory.dmp

    Filesize

    64KB

  • memory/4224-197-0x00007FFD133F0000-0x00007FFD13400000-memory.dmp

    Filesize

    64KB

  • memory/4224-199-0x00007FFD133F0000-0x00007FFD13400000-memory.dmp

    Filesize

    64KB

  • memory/4224-200-0x00007FFD133F0000-0x00007FFD13400000-memory.dmp

    Filesize

    64KB

  • memory/4224-201-0x00007FFD11390000-0x00007FFD113A0000-memory.dmp

    Filesize

    64KB

  • memory/4224-202-0x00007FFD11390000-0x00007FFD113A0000-memory.dmp

    Filesize

    64KB

  • memory/4224-196-0x00007FFD133F0000-0x00007FFD13400000-memory.dmp

    Filesize

    64KB

  • memory/5084-193-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/5084-175-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/5084-263-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/5084-304-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB