Analysis

  • max time kernel
    116s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2024 19:02

General

  • Target

    7167adbb22aab40a5627fdc2dd1431491b721c18723f1cc8d8ee55d64cd14576N.exe

  • Size

    940KB

  • MD5

    7c845bb4efb5f123e541588f3fadaa50

  • SHA1

    4f20c525faca5843b603321cb5e37fae0a9e9e27

  • SHA256

    7167adbb22aab40a5627fdc2dd1431491b721c18723f1cc8d8ee55d64cd14576

  • SHA512

    126e72a65b0067b8c3df507608bc56bda8c66f5cea3ba9f9232de28ac1b824ff53e30b837826aab414f508eeaf15d22a67ad1e8193687ecd4423033ac59f7ad4

  • SSDEEP

    24576:qatawOapJkQFMhmC+6GD9luu1OUjezCkz:Dk2MYC5GDjuukUjezJ

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Program Files directory 51 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7167adbb22aab40a5627fdc2dd1431491b721c18723f1cc8d8ee55d64cd14576N.exe
    "C:\Users\Admin\AppData\Local\Temp\7167adbb22aab40a5627fdc2dd1431491b721c18723f1cc8d8ee55d64cd14576N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4988
    • C:\Windows\svchost.exe
      "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\7167adbb22aab40a5627fdc2dd1431491b721c18723f1cc8d8ee55d64cd14576N.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3024
      • C:\Users\Admin\AppData\Local\Temp\7167adbb22aab40a5627fdc2dd1431491b721c18723f1cc8d8ee55d64cd14576N.exe
        "C:\Users\Admin\AppData\Local\Temp\7167adbb22aab40a5627fdc2dd1431491b721c18723f1cc8d8ee55d64cd14576N.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3100
        • C:\Users\Admin\AppData\Local\Temp\._cache_7167adbb22aab40a5627fdc2dd1431491b721c18723f1cc8d8ee55d64cd14576N.exe
          "C:\Users\Admin\AppData\Local\Temp\._cache_7167adbb22aab40a5627fdc2dd1431491b721c18723f1cc8d8ee55d64cd14576N.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1840
          • C:\Windows\svchost.exe
            "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\._cache_7167adbb22aab40a5627fdc2dd1431491b721c18723f1cc8d8ee55d64cd14576N.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2184
            • C:\Users\Admin\AppData\Local\Temp\._cache_7167adbb22aab40a5627fdc2dd1431491b721c18723f1cc8d8ee55d64cd14576N.exe
              "C:\Users\Admin\AppData\Local\Temp\._cache_7167adbb22aab40a5627fdc2dd1431491b721c18723f1cc8d8ee55d64cd14576N.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4668
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\._cache_7167adbb22aab40a5627fdc2dd1431491b721c18723f1cc8d8ee55d64cd14576N.exe /F /Q
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4848
        • C:\ProgramData\Synaptics\Synaptics.exe
          "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:5076
          • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
            "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
            5⤵
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1688
            • C:\Windows\svchost.exe
              "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:848
              • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
                "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2892
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe /F /Q
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3688
  • C:\Windows\svchost.exe
    C:\Windows\svchost.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:1924
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1132

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\._cache_7167adbb22aab40a5627fdc2dd1431491b721c18723f1cc8d8ee55d64cd14576N.exe

    Filesize

    151KB

    MD5

    225f6de23eff2965a91dd65d54b4b573

    SHA1

    2ac82b85a6fdb80e2917b9590aa471c2abed796e

    SHA256

    68969b0415e3753e4e8be75969d16dac8ac94e735e179a585686bc2be5696d1c

    SHA512

    8f2f94f41406de0da5d6250429e7cd515fc73b1305bc1b7aca9ab89c1e0004c61fed74bf8651f1b1a8fe2ed03f213f0da0d5b8aa59d574de412f54938c232d04

  • C:\Users\Admin\AppData\Local\Temp\._cache_7167adbb22aab40a5627fdc2dd1431491b721c18723f1cc8d8ee55d64cd14576N.exe

    Filesize

    116KB

    MD5

    186c20394b10fff0ca33bd987da5a298

    SHA1

    61312a4a7e45d3e0ba01eaa1124eb8dd4ebf6404

    SHA256

    1ca517df71c284a4b4e254e1c4bcf1b2ec5d3b5758e5681dc6780fd058447293

    SHA512

    4434f8081c7e53290dc444077522d8436dcf348c93df99803734d544d22e26d7ac251ac56c06c26c5add56537a4990cc0df6bc504bd1236edc50446d4f5054b7

  • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

    Filesize

    128KB

    MD5

    61facd1a83bf723d666baba7da27fa5e

    SHA1

    856dd921cdabe01ad20e37ed46b87577ebbf2288

    SHA256

    4f93e63a55041d86371981c234eb975f571bd09b0013ac61ac0005864623e6f7

    SHA512

    496a77362f50c7df2e0f6fd43a5e5d648267b1f649911d6893f5ca51cd8b376d8b27932636bf38e87ef3296d470aae311ddf12c66a0d4c835da011df12f291fe

  • C:\Users\Admin\AppData\Local\Temp\7167adbb22aab40a5627fdc2dd1431491b721c18723f1cc8d8ee55d64cd14576N.exe

    Filesize

    905KB

    MD5

    7ecbf9577dd876241e1d7ecffe023c03

    SHA1

    ef8f92ae95c117d4b7da52aa5e207b6855f7376d

    SHA256

    2e3f3a3dfcc1d5cc4235248e62d39825796b67fc65c386267ab389b47310b2a7

    SHA512

    5117d0940a7ea86433c88c7be810b3b3b3b7415c6e18aff5e5a045ff2928bf245d862e1111885880afa12292158069194b83e1a210b1bafa994b4df3aeec43a8

  • C:\Users\Admin\AppData\Local\Temp\BYvDPv81.xlsm

    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Windows\svchost.exe

    Filesize

    35KB

    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • memory/848-216-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1132-222-0x00007FFEF3DF0000-0x00007FFEF3E00000-memory.dmp

    Filesize

    64KB

  • memory/1132-220-0x00007FFEF6090000-0x00007FFEF60A0000-memory.dmp

    Filesize

    64KB

  • memory/1132-223-0x00007FFEF3DF0000-0x00007FFEF3E00000-memory.dmp

    Filesize

    64KB

  • memory/1132-221-0x00007FFEF6090000-0x00007FFEF60A0000-memory.dmp

    Filesize

    64KB

  • memory/1132-218-0x00007FFEF6090000-0x00007FFEF60A0000-memory.dmp

    Filesize

    64KB

  • memory/1132-219-0x00007FFEF6090000-0x00007FFEF60A0000-memory.dmp

    Filesize

    64KB

  • memory/1132-217-0x00007FFEF6090000-0x00007FFEF60A0000-memory.dmp

    Filesize

    64KB

  • memory/1688-210-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/1840-79-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/1924-241-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1924-250-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1924-244-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2184-91-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/3024-10-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/3100-13-0x00000000007E0000-0x00000000007E1000-memory.dmp

    Filesize

    4KB

  • memory/3100-149-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/4988-3-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/5076-242-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/5076-277-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB