Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2024 19:02

General

  • Target

    7167adbb22aab40a5627fdc2dd1431491b721c18723f1cc8d8ee55d64cd14576N.exe

  • Size

    940KB

  • MD5

    7c845bb4efb5f123e541588f3fadaa50

  • SHA1

    4f20c525faca5843b603321cb5e37fae0a9e9e27

  • SHA256

    7167adbb22aab40a5627fdc2dd1431491b721c18723f1cc8d8ee55d64cd14576

  • SHA512

    126e72a65b0067b8c3df507608bc56bda8c66f5cea3ba9f9232de28ac1b824ff53e30b837826aab414f508eeaf15d22a67ad1e8193687ecd4423033ac59f7ad4

  • SSDEEP

    24576:qatawOapJkQFMhmC+6GD9luu1OUjezCkz:Dk2MYC5GDjuukUjezJ

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 14 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Program Files directory 39 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7167adbb22aab40a5627fdc2dd1431491b721c18723f1cc8d8ee55d64cd14576N.exe
    "C:\Users\Admin\AppData\Local\Temp\7167adbb22aab40a5627fdc2dd1431491b721c18723f1cc8d8ee55d64cd14576N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Windows\svchost.exe
      "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\7167adbb22aab40a5627fdc2dd1431491b721c18723f1cc8d8ee55d64cd14576N.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3060
      • C:\Users\Admin\AppData\Local\Temp\7167adbb22aab40a5627fdc2dd1431491b721c18723f1cc8d8ee55d64cd14576N.exe
        "C:\Users\Admin\AppData\Local\Temp\7167adbb22aab40a5627fdc2dd1431491b721c18723f1cc8d8ee55d64cd14576N.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2060
        • C:\Users\Admin\AppData\Local\Temp\._cache_7167adbb22aab40a5627fdc2dd1431491b721c18723f1cc8d8ee55d64cd14576N.exe
          "C:\Users\Admin\AppData\Local\Temp\._cache_7167adbb22aab40a5627fdc2dd1431491b721c18723f1cc8d8ee55d64cd14576N.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2364
          • C:\Windows\svchost.exe
            "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\._cache_7167adbb22aab40a5627fdc2dd1431491b721c18723f1cc8d8ee55d64cd14576N.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2736
            • C:\Users\Admin\AppData\Local\Temp\._cache_7167adbb22aab40a5627fdc2dd1431491b721c18723f1cc8d8ee55d64cd14576N.exe
              "C:\Users\Admin\AppData\Local\Temp\._cache_7167adbb22aab40a5627fdc2dd1431491b721c18723f1cc8d8ee55d64cd14576N.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2860
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\._cache_7167adbb22aab40a5627fdc2dd1431491b721c18723f1cc8d8ee55d64cd14576N.exe /F /Q
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2628
        • C:\ProgramData\Synaptics\Synaptics.exe
          "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2964
          • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
            "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
            5⤵
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1648
            • C:\Windows\svchost.exe
              "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2124
              • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
                "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:992
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe /F /Q
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:860
  • C:\Windows\svchost.exe
    C:\Windows\svchost.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2472
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\._cache_7167adbb22aab40a5627fdc2dd1431491b721c18723f1cc8d8ee55d64cd14576N.exe

    Filesize

    151KB

    MD5

    225f6de23eff2965a91dd65d54b4b573

    SHA1

    2ac82b85a6fdb80e2917b9590aa471c2abed796e

    SHA256

    68969b0415e3753e4e8be75969d16dac8ac94e735e179a585686bc2be5696d1c

    SHA512

    8f2f94f41406de0da5d6250429e7cd515fc73b1305bc1b7aca9ab89c1e0004c61fed74bf8651f1b1a8fe2ed03f213f0da0d5b8aa59d574de412f54938c232d04

  • C:\Users\Admin\AppData\Local\Temp\7167adbb22aab40a5627fdc2dd1431491b721c18723f1cc8d8ee55d64cd14576N.exe

    Filesize

    905KB

    MD5

    7ecbf9577dd876241e1d7ecffe023c03

    SHA1

    ef8f92ae95c117d4b7da52aa5e207b6855f7376d

    SHA256

    2e3f3a3dfcc1d5cc4235248e62d39825796b67fc65c386267ab389b47310b2a7

    SHA512

    5117d0940a7ea86433c88c7be810b3b3b3b7415c6e18aff5e5a045ff2928bf245d862e1111885880afa12292158069194b83e1a210b1bafa994b4df3aeec43a8

  • C:\Users\Admin\AppData\Local\Temp\BMBPaxxX.xlsm

    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Windows\svchost.exe

    Filesize

    35KB

    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • \Users\Admin\AppData\Local\Temp\._cache_7167adbb22aab40a5627fdc2dd1431491b721c18723f1cc8d8ee55d64cd14576N.exe

    Filesize

    116KB

    MD5

    186c20394b10fff0ca33bd987da5a298

    SHA1

    61312a4a7e45d3e0ba01eaa1124eb8dd4ebf6404

    SHA256

    1ca517df71c284a4b4e254e1c4bcf1b2ec5d3b5758e5681dc6780fd058447293

    SHA512

    4434f8081c7e53290dc444077522d8436dcf348c93df99803734d544d22e26d7ac251ac56c06c26c5add56537a4990cc0df6bc504bd1236edc50446d4f5054b7

  • memory/540-94-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1648-78-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/2060-63-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/2060-17-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2124-89-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2364-44-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/2472-91-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2472-127-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2536-5-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2736-55-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2964-92-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/2964-117-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/2964-119-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/2964-158-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/3060-21-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB