Analysis

  • max time kernel
    111s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2024 03:27

General

  • Target

    aaa3be69951ce3c7ecfd3b8fcbcabce1a3dfd7286842b29561c6bfe253c89612N.exe

  • Size

    899KB

  • MD5

    66bdd4395672267e01f4dfdc12bfb140

  • SHA1

    bc6e038dd193b34a155c53f8eea8eaa5c1adf661

  • SHA256

    aaa3be69951ce3c7ecfd3b8fcbcabce1a3dfd7286842b29561c6bfe253c89612

  • SHA512

    c2eb33bbd03727eb1692b80efc02cc7dcd250b74f6d5b181b1b0f57bc60b421740116c5d5e2caec59796fbbb1e46de3422f09a4a932988ba7be46a085cad70f0

  • SSDEEP

    12288:Aaxr7vr7fYnPHv3jz/jDnTnbPr7Hf/TLzAHr3fP37bv/4wDvbwt2ThTA0eOzkv4d:Aad7PThXJkQFMhmC+6GD9Yuu1OUjezCu

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Extracted

Family

bdaejec

C2

ddos.dnsnb8.net

Signatures

  • Bdaejec

    Bdaejec is a backdoor written in C++.

  • Bdaejec family
  • Detects Bdaejec Backdoor. 1 IoCs

    Bdaejec is backdoor written in C++.

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks system information in the registry 2 TTPs 2 IoCs

    System information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aaa3be69951ce3c7ecfd3b8fcbcabce1a3dfd7286842b29561c6bfe253c89612N.exe
    "C:\Users\Admin\AppData\Local\Temp\aaa3be69951ce3c7ecfd3b8fcbcabce1a3dfd7286842b29561c6bfe253c89612N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3488
    • C:\Windows\svchost.exe
      "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\aaa3be69951ce3c7ecfd3b8fcbcabce1a3dfd7286842b29561c6bfe253c89612N.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5072
      • C:\Users\Admin\AppData\Local\Temp\aaa3be69951ce3c7ecfd3b8fcbcabce1a3dfd7286842b29561c6bfe253c89612N.exe
        "C:\Users\Admin\AppData\Local\Temp\aaa3be69951ce3c7ecfd3b8fcbcabce1a3dfd7286842b29561c6bfe253c89612N.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4876
        • C:\Users\Admin\AppData\Local\Temp\._cache_aaa3be69951ce3c7ecfd3b8fcbcabce1a3dfd7286842b29561c6bfe253c89612N.exe
          "C:\Users\Admin\AppData\Local\Temp\._cache_aaa3be69951ce3c7ecfd3b8fcbcabce1a3dfd7286842b29561c6bfe253c89612N.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1412
          • C:\Users\Admin\AppData\Local\Temp\hYQTRm.exe
            C:\Users\Admin\AppData\Local\Temp\hYQTRm.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Drops file in Program Files directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2280
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\28e43091.bat" "
              6⤵
              • System Location Discovery: System Language Discovery
              PID:3588
        • C:\ProgramData\Synaptics\Synaptics.exe
          "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3292
          • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
            "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:4792
  • C:\Windows\svchost.exe
    C:\Windows\svchost.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:2632
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks computer location settings
    • Executes dropped EXE
    • Checks system information in the registry
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0GUUC90F\k2[1].rar

    Filesize

    4B

    MD5

    d3b07384d113edec49eaa6238ad5ff00

    SHA1

    f1d2d2f924e986ac86fdf7b36c94bcdf32beec15

    SHA256

    b5bb9d8014a0f9b1d61e21e796d78dccdf1352f23cd32812f4850b878ae4944c

    SHA512

    0cf9180a764aba863a67b6d72f0918bc131c6772642cb2dce5a34f0a702f9470ddc2bf125c12198b1995c233c34b4afd346c54a2334c350a948a51b6e8b4e6b6

  • C:\Users\Admin\AppData\Local\Temp\._cache_aaa3be69951ce3c7ecfd3b8fcbcabce1a3dfd7286842b29561c6bfe253c89612N.exe

    Filesize

    108KB

    MD5

    838c86c10651a998d6b5bbefdfe0e057

    SHA1

    85b8e551bd52573971dcd535c49b1041cf1f787b

    SHA256

    7ee62526c811e92685adc487e96ce65f7cf803b09d7805a3696e021dfdbd3cab

    SHA512

    5db840904ebdf9cbae64b580577f544f4c3cf8c3f37a743e74fcc1d53525c5e67d3c7af4a6e7a1281f3199b7f5c2e3e8521c4b3bcfdd18cac0146e1c5f902f18

  • C:\Users\Admin\AppData\Local\Temp\060B12C7.exe

    Filesize

    4B

    MD5

    20879c987e2f9a916e578386d499f629

    SHA1

    c7b33ddcc42361fdb847036fc07e880b81935d5d

    SHA256

    9f2981a7cc4d40a2a409dc895de64253acd819d7c0011c8e80b86fe899464e31

    SHA512

    bcdde1625364dd6dd143b45bdcec8d59cf8982aff33790d390b839f3869e0e815684568b14b555a596d616252aeeaa98dac2e6e551c9095ea11a575ff25ff84f

  • C:\Users\Admin\AppData\Local\Temp\14875E00

    Filesize

    23KB

    MD5

    7396d1499dbc6e82390ae5112d8c02ae

    SHA1

    406ea23a2af7fa67b646cfa627d6a77fdde31d0f

    SHA256

    d262d06a397f0be1060d414a3183e12e80301c35fe0c3d5947b031692bd563b0

    SHA512

    943b49da2c6d79f7f81bbab8484b32c6e621c0b1405f666992b462050ef08f76b9320a8f3cf201d09ad503f69537b7efec7749ea0c0671d923934fd0958567b0

  • C:\Users\Admin\AppData\Local\Temp\28e43091.bat

    Filesize

    187B

    MD5

    2ea77fb9bb7a63757e17992c27b67f62

    SHA1

    3fb9ca3852a024c5dd448b07d1ddbcaceb3a06f3

    SHA256

    8b883fa4584d855411daba03b18eed25255887be54f2461ff7aa12a5921826eb

    SHA512

    e2eec656e49f0258f90302192e3535c868981602c8abc5dec1ca94b832afcbbefa3ee8c6eeb288dfd52cef69faea86816630a0a54a4b3befd00d936e35afadb9

  • C:\Users\Admin\AppData\Local\Temp\aaa3be69951ce3c7ecfd3b8fcbcabce1a3dfd7286842b29561c6bfe253c89612N.exe

    Filesize

    864KB

    MD5

    113b5ddce3608d1a82553204b9618db0

    SHA1

    d392a7875368c481320679d4df59abe1547d4775

    SHA256

    dff9369274b5c2e386ff3460976d30583c2329f2db3d101502f65b4bc91bd60a

    SHA512

    979bcec6d8cdb4f78c9e44b3c55d74f3ac33f4d337f16d27e2b3059c5a396e378c732ff24dde705972d72aee6c3c5a61e57974a80560594838be2ceee45d3229

  • C:\Users\Admin\AppData\Local\Temp\hYQTRm.exe

    Filesize

    15KB

    MD5

    56b2c3810dba2e939a8bb9fa36d3cf96

    SHA1

    99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

    SHA256

    4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

    SHA512

    27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

  • C:\Users\Admin\AppData\Local\Temp\mKJ8Izar.xlsm

    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Windows\svchost.exe

    Filesize

    35KB

    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • memory/1412-224-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/1412-47-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2044-163-0x00007FFA4F890000-0x00007FFA4F8A0000-memory.dmp

    Filesize

    64KB

  • memory/2044-159-0x00007FFA51E90000-0x00007FFA51EA0000-memory.dmp

    Filesize

    64KB

  • memory/2044-156-0x00007FFA51E90000-0x00007FFA51EA0000-memory.dmp

    Filesize

    64KB

  • memory/2044-160-0x00007FFA51E90000-0x00007FFA51EA0000-memory.dmp

    Filesize

    64KB

  • memory/2044-158-0x00007FFA51E90000-0x00007FFA51EA0000-memory.dmp

    Filesize

    64KB

  • memory/2044-164-0x00007FFA4F890000-0x00007FFA4F8A0000-memory.dmp

    Filesize

    64KB

  • memory/2044-157-0x00007FFA51E90000-0x00007FFA51EA0000-memory.dmp

    Filesize

    64KB

  • memory/2280-228-0x00000000000A0000-0x00000000000A9000-memory.dmp

    Filesize

    36KB

  • memory/2280-117-0x00000000000A0000-0x00000000000A9000-memory.dmp

    Filesize

    36KB

  • memory/2632-225-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2632-297-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/3292-227-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/3292-299-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/3488-3-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/4792-162-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/4876-121-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/4876-13-0x0000000002270000-0x0000000002271000-memory.dmp

    Filesize

    4KB

  • memory/5072-10-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB