Analysis

  • max time kernel
    115s
  • max time network
    116s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/12/2024, 18:09

General

  • Target

    2176b4beaacf8e3b19b1d705a8db7c27f809b1bbee638640d069a4c48a819cd0N.exe

  • Size

    3.9MB

  • MD5

    86d42c6f52f9f1062459b56abcabca00

  • SHA1

    ce1cbb6eb431e994af4b0c4a6ae8d30f433f690c

  • SHA256

    2176b4beaacf8e3b19b1d705a8db7c27f809b1bbee638640d069a4c48a819cd0

  • SHA512

    8b308db7c4cf7493fda605d0d0d8584143f24c075a2cf2897f448e67978a01ac6bb9458e3e83610e15cd1ed973bfd002fb76f8503ec084fa4394cb6391214db7

  • SSDEEP

    98304:gnsmtk2ahkLU/JStFbfmesLjZXdNywOmZtyZRc:+LVU/4HmesnZXdNft3

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2176b4beaacf8e3b19b1d705a8db7c27f809b1bbee638640d069a4c48a819cd0N.exe
    "C:\Users\Admin\AppData\Local\Temp\2176b4beaacf8e3b19b1d705a8db7c27f809b1bbee638640d069a4c48a819cd0N.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:880
    • C:\Users\Admin\AppData\Local\Temp\._cache_2176b4beaacf8e3b19b1d705a8db7c27f809b1bbee638640d069a4c48a819cd0N.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_2176b4beaacf8e3b19b1d705a8db7c27f809b1bbee638640d069a4c48a819cd0N.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4812
      • C:\Users\Admin\AppData\Local\Temp\is-86CHU.tmp\._cache_2176b4beaacf8e3b19b1d705a8db7c27f809b1bbee638640d069a4c48a819cd0N.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-86CHU.tmp\._cache_2176b4beaacf8e3b19b1d705a8db7c27f809b1bbee638640d069a4c48a819cd0N.tmp" /SL5="$A0164,2358658,891392,C:\Users\Admin\AppData\Local\Temp\._cache_2176b4beaacf8e3b19b1d705a8db7c27f809b1bbee638640d069a4c48a819cd0N.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1776
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3320
      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2216
        • C:\Users\Admin\AppData\Local\Temp\is-KUGV4.tmp\._cache_Synaptics.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-KUGV4.tmp\._cache_Synaptics.tmp" /SL5="$F0042,2358658,891392,C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1364
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:432

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Synaptics\Synaptics.exe

          Filesize

          3.9MB

          MD5

          86d42c6f52f9f1062459b56abcabca00

          SHA1

          ce1cbb6eb431e994af4b0c4a6ae8d30f433f690c

          SHA256

          2176b4beaacf8e3b19b1d705a8db7c27f809b1bbee638640d069a4c48a819cd0

          SHA512

          8b308db7c4cf7493fda605d0d0d8584143f24c075a2cf2897f448e67978a01ac6bb9458e3e83610e15cd1ed973bfd002fb76f8503ec084fa4394cb6391214db7

        • C:\Users\Admin\AppData\Local\Temp\._cache_2176b4beaacf8e3b19b1d705a8db7c27f809b1bbee638640d069a4c48a819cd0N.exe

          Filesize

          3.2MB

          MD5

          1b50ce242dd763b770ca7e05466e186b

          SHA1

          c59aa047f52646395ad80776984027c6086802a1

          SHA256

          f896a27899119752630680bab492f5304ab15fbc8753ecbd18e6b62cec62aee2

          SHA512

          3f688631faabf4b3b66ce8e00df9055dd4c69e6c22561af687b64c601ec736861c8d5f2c8b40b16bcd254096a17672ed4b282a783914f45809b389fce8b0f1db

        • C:\Users\Admin\AppData\Local\Temp\F9B75E00

          Filesize

          26KB

          MD5

          d32b20d2cfd4af2d966cee5716434764

          SHA1

          005e531eba37f0a8d9b4e107f2dee9197d399063

          SHA256

          0e4f883f0ac84244fe8893dc6f30f90f35b616f5ee7cb2ed6130fd1b8b0cf1cb

          SHA512

          2b7feefc75f92ee68a2a7403ae39994bac6070e9643a10798b6ce43195ec5d8ffffc56b8bc80e38fdb73f3c237dd159d7f0b2498b3e330fe62529de0ea501a74

        • C:\Users\Admin\AppData\Local\Temp\JbD6VLk5.xlsm

          Filesize

          17KB

          MD5

          e566fc53051035e1e6fd0ed1823de0f9

          SHA1

          00bc96c48b98676ecd67e81a6f1d7754e4156044

          SHA256

          8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

          SHA512

          a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

        • C:\Users\Admin\AppData\Local\Temp\is-86CHU.tmp\._cache_2176b4beaacf8e3b19b1d705a8db7c27f809b1bbee638640d069a4c48a819cd0N.tmp

          Filesize

          3.1MB

          MD5

          5b38d4f71d58ea68c3c58d72b3e974af

          SHA1

          64d4c6762e40cb5e380c7ef7e0622cd5cea67bfd

          SHA256

          aa0b73fae0c26c2cfe6417f202f092e1153596fe788910f8173d6e196969170a

          SHA512

          38e3f5ed40884f248f11c0940b9394ad649cdae3a6dff58580e14f6a31479ea7e18b25599491751a86423f1b548fbad66e71bf75e33a45eb64eba58b1e034a44

        • memory/432-206-0x00007FFB05E30000-0x00007FFB05E40000-memory.dmp

          Filesize

          64KB

        • memory/432-207-0x00007FFB05E30000-0x00007FFB05E40000-memory.dmp

          Filesize

          64KB

        • memory/432-201-0x00007FFB07E90000-0x00007FFB07EA0000-memory.dmp

          Filesize

          64KB

        • memory/432-203-0x00007FFB07E90000-0x00007FFB07EA0000-memory.dmp

          Filesize

          64KB

        • memory/432-202-0x00007FFB07E90000-0x00007FFB07EA0000-memory.dmp

          Filesize

          64KB

        • memory/432-200-0x00007FFB07E90000-0x00007FFB07EA0000-memory.dmp

          Filesize

          64KB

        • memory/432-199-0x00007FFB07E90000-0x00007FFB07EA0000-memory.dmp

          Filesize

          64KB

        • memory/880-0-0x00000000009C0000-0x00000000009C1000-memory.dmp

          Filesize

          4KB

        • memory/880-135-0x0000000000400000-0x00000000007EB000-memory.dmp

          Filesize

          3.9MB

        • memory/1364-263-0x0000000000400000-0x0000000000722000-memory.dmp

          Filesize

          3.1MB

        • memory/1364-318-0x0000000000400000-0x0000000000722000-memory.dmp

          Filesize

          3.1MB

        • memory/1364-333-0x0000000000400000-0x0000000000722000-memory.dmp

          Filesize

          3.1MB

        • memory/1364-328-0x0000000000400000-0x0000000000722000-memory.dmp

          Filesize

          3.1MB

        • memory/1364-323-0x0000000000400000-0x0000000000722000-memory.dmp

          Filesize

          3.1MB

        • memory/1364-293-0x0000000000400000-0x0000000000722000-memory.dmp

          Filesize

          3.1MB

        • memory/1364-286-0x0000000000400000-0x0000000000722000-memory.dmp

          Filesize

          3.1MB

        • memory/1364-281-0x0000000000400000-0x0000000000722000-memory.dmp

          Filesize

          3.1MB

        • memory/1364-276-0x0000000000400000-0x0000000000722000-memory.dmp

          Filesize

          3.1MB

        • memory/1364-271-0x0000000000400000-0x0000000000722000-memory.dmp

          Filesize

          3.1MB

        • memory/1776-325-0x0000000000400000-0x0000000000722000-memory.dmp

          Filesize

          3.1MB

        • memory/1776-320-0x0000000000400000-0x0000000000722000-memory.dmp

          Filesize

          3.1MB

        • memory/1776-273-0x0000000000400000-0x0000000000722000-memory.dmp

          Filesize

          3.1MB

        • memory/1776-335-0x0000000000400000-0x0000000000722000-memory.dmp

          Filesize

          3.1MB

        • memory/1776-278-0x0000000000400000-0x0000000000722000-memory.dmp

          Filesize

          3.1MB

        • memory/1776-132-0x0000000000400000-0x0000000000722000-memory.dmp

          Filesize

          3.1MB

        • memory/1776-283-0x0000000000400000-0x0000000000722000-memory.dmp

          Filesize

          3.1MB

        • memory/1776-261-0x0000000000400000-0x0000000000722000-memory.dmp

          Filesize

          3.1MB

        • memory/1776-330-0x0000000000400000-0x0000000000722000-memory.dmp

          Filesize

          3.1MB

        • memory/1776-268-0x0000000000400000-0x0000000000722000-memory.dmp

          Filesize

          3.1MB

        • memory/1776-289-0x0000000000400000-0x0000000000722000-memory.dmp

          Filesize

          3.1MB

        • memory/1776-315-0x0000000000400000-0x0000000000722000-memory.dmp

          Filesize

          3.1MB

        • memory/2216-195-0x0000000000400000-0x00000000004E7000-memory.dmp

          Filesize

          924KB

        • memory/2216-262-0x0000000000400000-0x00000000004E7000-memory.dmp

          Filesize

          924KB

        • memory/3320-316-0x0000000000400000-0x00000000007EB000-memory.dmp

          Filesize

          3.9MB

        • memory/3320-269-0x0000000000400000-0x00000000007EB000-memory.dmp

          Filesize

          3.9MB

        • memory/3320-260-0x0000000000400000-0x00000000007EB000-memory.dmp

          Filesize

          3.9MB

        • memory/4812-258-0x0000000000400000-0x00000000004E7000-memory.dmp

          Filesize

          924KB

        • memory/4812-69-0x0000000000400000-0x00000000004E7000-memory.dmp

          Filesize

          924KB

        • memory/4812-71-0x0000000000401000-0x00000000004B7000-memory.dmp

          Filesize

          728KB