Analysis
-
max time kernel
61s -
max time network
62s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 04:38
Behavioral task
behavioral1
Sample
VPN Plus V2.zip
Resource
win10v2004-20241007-en
General
-
Target
VPN Plus V2.zip
-
Size
1.9MB
-
MD5
57e297fdc8fcf53932979bce2dce91b7
-
SHA1
211eeb9065ee2103f8387ddb91b9b08100e3d554
-
SHA256
f4d7b1769a82abb6af1bc9e0003b8b9c783aa006aaf92b4d835f38c6aeb432dd
-
SHA512
fa8b76fa1d8bb54f65b60f47270119392dfec46f9eb5f1a581c4fed2e92b0aed3dc4a2416df9d38d508ef98268923149b774f6d43bc27c1fe2213781b522eb68
-
SSDEEP
49152:+UTzecC1U1f10jYfoIRf3QVZKmcElHgehoK0PJoke0QSc:+UGcxt1gYfoIRIVZKmcElAqgP63mc
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation VPN Plus V2.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation ._cache_VPN Plus V2.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation VPNPlus.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation VPNPlus.exe -
Executes dropped EXE 10 IoCs
pid Process 4580 VPN Plus V2.exe 772 ._cache_VPN Plus V2.exe 1720 Synaptics.exe 640 VPN Plus Config.exe 1732 VPNPlus.exe 4832 ._cache_Synaptics.exe 3980 VPN Plus Config.exe 4896 ._cache_VPNPlus.exe 3608 VPNPlus.exe 5100 ._cache_VPNPlus.exe -
Loads dropped DLL 4 IoCs
pid Process 3608 VPNPlus.exe 3608 VPNPlus.exe 1720 Synaptics.exe 1720 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" VPN Plus V2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VPN Plus V2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VPNPlus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_VPNPlus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VPNPlus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_VPNPlus.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ 7zFM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ VPN Plus V2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ VPNPlus.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ VPNPlus.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4212 EXCEL.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4480 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 4480 7zFM.exe Token: 35 4480 7zFM.exe Token: SeSecurityPrivilege 4480 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4480 7zFM.exe 4480 7zFM.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4212 EXCEL.EXE 4212 EXCEL.EXE 4212 EXCEL.EXE 4212 EXCEL.EXE 4212 EXCEL.EXE 4212 EXCEL.EXE 4212 EXCEL.EXE 4212 EXCEL.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4580 wrote to memory of 772 4580 VPN Plus V2.exe 96 PID 4580 wrote to memory of 772 4580 VPN Plus V2.exe 96 PID 4580 wrote to memory of 1720 4580 VPN Plus V2.exe 97 PID 4580 wrote to memory of 1720 4580 VPN Plus V2.exe 97 PID 4580 wrote to memory of 1720 4580 VPN Plus V2.exe 97 PID 772 wrote to memory of 640 772 ._cache_VPN Plus V2.exe 99 PID 772 wrote to memory of 640 772 ._cache_VPN Plus V2.exe 99 PID 772 wrote to memory of 1732 772 ._cache_VPN Plus V2.exe 100 PID 772 wrote to memory of 1732 772 ._cache_VPN Plus V2.exe 100 PID 772 wrote to memory of 1732 772 ._cache_VPN Plus V2.exe 100 PID 1720 wrote to memory of 4832 1720 Synaptics.exe 101 PID 1720 wrote to memory of 4832 1720 Synaptics.exe 101 PID 4832 wrote to memory of 3980 4832 ._cache_Synaptics.exe 102 PID 4832 wrote to memory of 3980 4832 ._cache_Synaptics.exe 102 PID 1732 wrote to memory of 4896 1732 VPNPlus.exe 103 PID 1732 wrote to memory of 4896 1732 VPNPlus.exe 103 PID 1732 wrote to memory of 4896 1732 VPNPlus.exe 103 PID 4832 wrote to memory of 3608 4832 ._cache_Synaptics.exe 104 PID 4832 wrote to memory of 3608 4832 ._cache_Synaptics.exe 104 PID 4832 wrote to memory of 3608 4832 ._cache_Synaptics.exe 104 PID 3608 wrote to memory of 5100 3608 VPNPlus.exe 105 PID 3608 wrote to memory of 5100 3608 VPNPlus.exe 105 PID 3608 wrote to memory of 5100 3608 VPNPlus.exe 105
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\VPN Plus V2.zip"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4480
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1304
-
C:\Users\Admin\Desktop\VPN Plus V2\VPN Plus V2.exe"C:\Users\Admin\Desktop\VPN Plus V2\VPN Plus V2.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\Desktop\VPN Plus V2\._cache_VPN Plus V2.exe"C:\Users\Admin\Desktop\VPN Plus V2\._cache_VPN Plus V2.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Roaming\VPN Plus Config.exe"C:\Users\Admin\AppData\Roaming\VPN Plus Config.exe"3⤵
- Executes dropped EXE
PID:640
-
-
C:\Users\Admin\AppData\Roaming\VPNPlus.exe"C:\Users\Admin\AppData\Roaming\VPNPlus.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\Desktop\VPN Plus V2\._cache_VPNPlus.exe"C:\Users\Admin\Desktop\VPN Plus V2\._cache_VPNPlus.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4896
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\Desktop\VPN Plus V2\._cache_Synaptics.exe"C:\Users\Admin\Desktop\VPN Plus V2\._cache_Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Roaming\VPN Plus Config.exe"C:\Users\Admin\AppData\Roaming\VPN Plus Config.exe"4⤵
- Executes dropped EXE
PID:3980
-
-
C:\Users\Admin\AppData\Roaming\VPNPlus.exe"C:\Users\Admin\AppData\Roaming\VPNPlus.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\Desktop\VPN Plus V2\._cache_VPNPlus.exe"C:\Users\Admin\Desktop\VPN Plus V2\._cache_VPNPlus.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5100
-
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD58508a38c6cc6bf70e773d3ffefb6a0ea
SHA1d43983ceaaa95859a90d76fef2d7658f3b6d897c
SHA25622b6b9802923eea49e2a7a86fe8e0c34830b62907526e7f37c46fe07b7128d07
SHA51297e5089ce7a22296bf81d4e1c0ca89be9ee391873eb607d18b26260bace87deb9f07e0a1ed56f9db51057712e87cfb1b45f3bdf4c068f5db2ea01479b2483eb4
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
293KB
MD50ffc5a768817a65ad00c3225bdcb6a70
SHA127c84ea9ad25231d0f01f95e7a5b8bc14e719184
SHA2568df7d471e2c777b50b717c44149ee1556032f8123913d5bc3366f6f8780eceae
SHA512282b605a57e3893a966ff482531bbc123ae508ca085b1781516879f09080d797e80ad60811e89f9d6fa0debda6429f5e5600968f5334931cad7a46dbeb96f96c
-
Filesize
1.2MB
MD589099b1cc2d117ad367e9cbf10042916
SHA165d2b50285a1fb3d7b1e7b691e647abc58b33d5c
SHA25695e9259b2d0a30d7e16b13d886a70d1d8cfaccd0799d1adff2e105390dbf5ceb
SHA5127eda8b5035bbe0aaa0e33b1c0eeafaee0f2a3d0b65954819adc5f3b052948d11575ea240c14037f44fa0aa6f2b029b00e6fb88d10aa63a3bed71d7703abb62f2
-
Filesize
1.9MB
MD5e765670f02fbba4fdd9317bba1c325ce
SHA1954e3c2a2d461751fdac14b958cd20d9b5fcb099
SHA25668c222268509688293c1b878e205134f9ab6c6b7a1d9c9541a9c01012e00e97f
SHA512f009bc7c6577768ad42f8bbb08313d4ad81f56b3275c6f7ed01e94f818e9682de787046282ccdf961e96c8408269e2039314a3eaa75c31c740c2d0c58fab0eab
-
Filesize
444KB
MD5f341dc884269172ef968d8fa6927275b
SHA15351fe61fd39b7704d9d63b1a36c44746536753d
SHA2562d41af98b1f58fa4c8266629e6a8eec3a06970a4bd8132f722a3ad71457da4e6
SHA5120c6933547a0f76b953a6679027e95f2d557c509ac459004baf2a2bf1bb9176d196eb1bea0ef38c6fe8a5b1ad2ecbf92e10542a2be25b563ab2af82f0bdfb1fde
-
Filesize
2.6MB
MD530a3448e4e667492151d200221cc2330
SHA1392e50785ea1f153b3031d13150ab518c662b446
SHA25640332154e44a8a75d54aba96f78927fb0e670db9cca93c6219088fb9d3b3c1f4
SHA512df441bd04d7f8bc1e3d2b43d376de9a47275238ac20e4b635ce806b01d3ad025f806db553e7ecbc331fb64040032b424ef80263f8d007bab018510687d575b4e