Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 04:40
Behavioral task
behavioral1
Sample
VPN Plus V2/VPN Plus V2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
VPN Plus V2/VPN Plus V2.exe
Resource
win10v2004-20241007-en
General
-
Target
VPN Plus V2/VPN Plus V2.exe
-
Size
2.6MB
-
MD5
30a3448e4e667492151d200221cc2330
-
SHA1
392e50785ea1f153b3031d13150ab518c662b446
-
SHA256
40332154e44a8a75d54aba96f78927fb0e670db9cca93c6219088fb9d3b3c1f4
-
SHA512
df441bd04d7f8bc1e3d2b43d376de9a47275238ac20e4b635ce806b01d3ad025f806db553e7ecbc331fb64040032b424ef80263f8d007bab018510687d575b4e
-
SSDEEP
49152:MnsHyjtk2MYC5GDYecxZBslbm1C5Xj+zlyVUBcpm2TFBUQn:Mnsmtk2aAMZB4m1C5X65yVGcp5TB
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation ._cache_VPN Plus V2.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation VPNPlus.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation VPNPlus.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation VPN Plus V2.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 9 IoCs
pid Process 2188 ._cache_VPN Plus V2.exe 2804 Synaptics.exe 208 VPN Plus Config.exe 1624 VPNPlus.exe 956 ._cache_Synaptics.exe 1332 VPN Plus Config.exe 3416 VPNPlus.exe 1576 ._cache_VPNPlus.exe 2932 ._cache_VPNPlus.exe -
Loads dropped DLL 2 IoCs
pid Process 3416 VPNPlus.exe 3416 VPNPlus.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" VPN Plus V2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VPN Plus V2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VPNPlus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VPNPlus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_VPNPlus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_VPNPlus.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ VPN Plus V2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ VPNPlus.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ VPNPlus.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1760 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1760 EXCEL.EXE 1760 EXCEL.EXE 1760 EXCEL.EXE 1760 EXCEL.EXE 1760 EXCEL.EXE 1760 EXCEL.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2788 wrote to memory of 2188 2788 VPN Plus V2.exe 83 PID 2788 wrote to memory of 2188 2788 VPN Plus V2.exe 83 PID 2788 wrote to memory of 2804 2788 VPN Plus V2.exe 84 PID 2788 wrote to memory of 2804 2788 VPN Plus V2.exe 84 PID 2788 wrote to memory of 2804 2788 VPN Plus V2.exe 84 PID 2188 wrote to memory of 208 2188 ._cache_VPN Plus V2.exe 85 PID 2188 wrote to memory of 208 2188 ._cache_VPN Plus V2.exe 85 PID 2188 wrote to memory of 1624 2188 ._cache_VPN Plus V2.exe 86 PID 2188 wrote to memory of 1624 2188 ._cache_VPN Plus V2.exe 86 PID 2188 wrote to memory of 1624 2188 ._cache_VPN Plus V2.exe 86 PID 2804 wrote to memory of 956 2804 Synaptics.exe 87 PID 2804 wrote to memory of 956 2804 Synaptics.exe 87 PID 956 wrote to memory of 1332 956 ._cache_Synaptics.exe 90 PID 956 wrote to memory of 1332 956 ._cache_Synaptics.exe 90 PID 956 wrote to memory of 3416 956 ._cache_Synaptics.exe 91 PID 956 wrote to memory of 3416 956 ._cache_Synaptics.exe 91 PID 956 wrote to memory of 3416 956 ._cache_Synaptics.exe 91 PID 1624 wrote to memory of 1576 1624 VPNPlus.exe 93 PID 1624 wrote to memory of 1576 1624 VPNPlus.exe 93 PID 1624 wrote to memory of 1576 1624 VPNPlus.exe 93 PID 3416 wrote to memory of 2932 3416 VPNPlus.exe 94 PID 3416 wrote to memory of 2932 3416 VPNPlus.exe 94 PID 3416 wrote to memory of 2932 3416 VPNPlus.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\VPN Plus V2\VPN Plus V2.exe"C:\Users\Admin\AppData\Local\Temp\VPN Plus V2\VPN Plus V2.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\VPN Plus V2\._cache_VPN Plus V2.exe"C:\Users\Admin\AppData\Local\Temp\VPN Plus V2\._cache_VPN Plus V2.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Roaming\VPN Plus Config.exe"C:\Users\Admin\AppData\Roaming\VPN Plus Config.exe"3⤵
- Executes dropped EXE
PID:208
-
-
C:\Users\Admin\AppData\Roaming\VPNPlus.exe"C:\Users\Admin\AppData\Roaming\VPNPlus.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\VPN Plus V2\._cache_VPNPlus.exe"C:\Users\Admin\AppData\Local\Temp\VPN Plus V2\._cache_VPNPlus.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1576
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\VPN Plus V2\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\VPN Plus V2\._cache_Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Roaming\VPN Plus Config.exe"C:\Users\Admin\AppData\Roaming\VPN Plus Config.exe"4⤵
- Executes dropped EXE
PID:1332
-
-
C:\Users\Admin\AppData\Roaming\VPNPlus.exe"C:\Users\Admin\AppData\Roaming\VPNPlus.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\VPN Plus V2\._cache_VPNPlus.exe"C:\Users\Admin\AppData\Local\Temp\VPN Plus V2\._cache_VPNPlus.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2932
-
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD530a3448e4e667492151d200221cc2330
SHA1392e50785ea1f153b3031d13150ab518c662b446
SHA25640332154e44a8a75d54aba96f78927fb0e670db9cca93c6219088fb9d3b3c1f4
SHA512df441bd04d7f8bc1e3d2b43d376de9a47275238ac20e4b635ce806b01d3ad025f806db553e7ecbc331fb64040032b424ef80263f8d007bab018510687d575b4e
-
Filesize
871B
MD5386677f585908a33791517dfc2317f88
SHA12e6853b4560a9ac8a74cdd5c3124a777bc0d874e
SHA2567caf8779608c167ab6fa570df00c973aff6dee850bb63439770889a68c7cdae0
SHA512876d2269e25a4b2754bdf2c7e3c410050f885d7e6bd8abce41c5fc74ae1f8c549b2266dd1588c750f614063f36c8a8e5008cea610505897d04e4ef5c3adc52d9
-
Filesize
20KB
MD5109d8ffda735fcc784663b1463665e16
SHA1a9d857b855cdbfed37c7ad86cb0eaeb063045136
SHA2560ecb2d62d397060e8d9102d4bcce88c25746afb0d6f9174dfb054dc09fd3d632
SHA51288ee31aa6943066a992b019b2ad28da7fd15fe79e2aa2b17f7acc9c665fb6019f52c72457371ed42fad674cb6a9fcc21471d149bf494f7d39fe6d0ebedb6ba48
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
1.9MB
MD5e765670f02fbba4fdd9317bba1c325ce
SHA1954e3c2a2d461751fdac14b958cd20d9b5fcb099
SHA25668c222268509688293c1b878e205134f9ab6c6b7a1d9c9541a9c01012e00e97f
SHA512f009bc7c6577768ad42f8bbb08313d4ad81f56b3275c6f7ed01e94f818e9682de787046282ccdf961e96c8408269e2039314a3eaa75c31c740c2d0c58fab0eab
-
Filesize
444KB
MD5f341dc884269172ef968d8fa6927275b
SHA15351fe61fd39b7704d9d63b1a36c44746536753d
SHA2562d41af98b1f58fa4c8266629e6a8eec3a06970a4bd8132f722a3ad71457da4e6
SHA5120c6933547a0f76b953a6679027e95f2d557c509ac459004baf2a2bf1bb9176d196eb1bea0ef38c6fe8a5b1ad2ecbf92e10542a2be25b563ab2af82f0bdfb1fde
-
Filesize
293KB
MD50ffc5a768817a65ad00c3225bdcb6a70
SHA127c84ea9ad25231d0f01f95e7a5b8bc14e719184
SHA2568df7d471e2c777b50b717c44149ee1556032f8123913d5bc3366f6f8780eceae
SHA512282b605a57e3893a966ff482531bbc123ae508ca085b1781516879f09080d797e80ad60811e89f9d6fa0debda6429f5e5600968f5334931cad7a46dbeb96f96c
-
Filesize
1.2MB
MD589099b1cc2d117ad367e9cbf10042916
SHA165d2b50285a1fb3d7b1e7b691e647abc58b33d5c
SHA25695e9259b2d0a30d7e16b13d886a70d1d8cfaccd0799d1adff2e105390dbf5ceb
SHA5127eda8b5035bbe0aaa0e33b1c0eeafaee0f2a3d0b65954819adc5f3b052948d11575ea240c14037f44fa0aa6f2b029b00e6fb88d10aa63a3bed71d7703abb62f2