Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2024 12:23

General

  • Target

    AntiPubs Dork Searcher EZ/Searcher.exe

  • Size

    7.7MB

  • MD5

    89b8241a6504c5f75684558cf8262c92

  • SHA1

    f2572052d0905be7c6df457564f7815419f4a225

  • SHA256

    2d1ce8a3c009c75c31057b02b0fabe91e479ce28d42ac146301e7b7a5944c9de

  • SHA512

    5a05c1d3eb88279329c0a93bd5473732be9d48a0d96527be70d6df04b53d3b386a1282f427e2485d8e1ea34815f38f5e74801b4dcbf6eaaa21c6519a0cecc34b

  • SSDEEP

    98304:Tnsmtk2aDyldpqU5s+h9oK4MtPSXDjLWdNo/v5LlCKly37gjA1tCJa8IRku6FmlC:rLKyldD5smuMQDfUi/vXgIa8IRkZI2N

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AntiPubs Dork Searcher EZ\Searcher.exe
    "C:\Users\Admin\AppData\Local\Temp\AntiPubs Dork Searcher EZ\Searcher.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2996
    • C:\Users\Admin\AppData\Local\Temp\AntiPubs Dork Searcher EZ\._cache_Searcher.exe
      "C:\Users\Admin\AppData\Local\Temp\AntiPubs Dork Searcher EZ\._cache_Searcher.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2748
      • \??\c:\users\admin\appdata\local\temp\antipubs dork searcher ez\._cache_searcher.exe 
        "c:\users\admin\appdata\local\temp\antipubs dork searcher ez\._cache_searcher.exe "
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2716
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Users\Admin\AppData\Local\Temp\AntiPubs Dork Searcher EZ\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\AntiPubs Dork Searcher EZ\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2552
        • \??\c:\users\admin\appdata\local\temp\antipubs dork searcher ez\._cache_synaptics.exe 
          "c:\users\admin\appdata\local\temp\antipubs dork searcher ez\._cache_synaptics.exe " InjUpdate
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:988
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    7.7MB

    MD5

    89b8241a6504c5f75684558cf8262c92

    SHA1

    f2572052d0905be7c6df457564f7815419f4a225

    SHA256

    2d1ce8a3c009c75c31057b02b0fabe91e479ce28d42ac146301e7b7a5944c9de

    SHA512

    5a05c1d3eb88279329c0a93bd5473732be9d48a0d96527be70d6df04b53d3b386a1282f427e2485d8e1ea34815f38f5e74801b4dcbf6eaaa21c6519a0cecc34b

  • C:\Users\Admin\AppData\Local\Temp\3IdIraSs.xlsm

    Filesize

    27KB

    MD5

    8ad82ae99d54525db7023795c134d0ac

    SHA1

    0c5bb7442a66fe9150ca9276f8d67d9ccc20f46c

    SHA256

    db87efb9f2cc83cd05548ce4f9f90248a763b71bec56bcbf8c5b0339bd3f2ff0

    SHA512

    068921ce84f62b6a710a6e1d13bc89434c85a1d62a09ee286fd0588eebddee34d28ff130c37b71097f21ea8dcb07f4418cd8e7a28ff446cdbc764f03b3d5d15a

  • C:\Users\Admin\AppData\Local\Temp\3IdIraSs.xlsm

    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Users\Admin\AppData\Local\Temp\AntiPubs Dork Searcher EZ\._cache_Searcher.exe

    Filesize

    7.0MB

    MD5

    15eb4b61e2e64ac84925535dc5ffe8de

    SHA1

    b95491efa58261ca585878238fa24d98fae41287

    SHA256

    3b28aaf3dd8ea9623ab80e4f567e65b8bb5db686b129f27f6d9bc0907f2ed289

    SHA512

    489751c78f8aded9a4b77eada0cccedab4d0faf50443607e17d81f65856ff77ad2842cb2ba5002e377c48fff441d86d38f74273367353fc2572a80ff980c14b5

  • C:\Windows\Resources\Themes\icsys.icn.exe

    Filesize

    135KB

    MD5

    bb38812e659c3d728f409ba8206da43e

    SHA1

    231777c045c807c20eb964c5a8714e1de9e4302b

    SHA256

    9eee738a0be74282659e61da2764f358cd5db063019bab247d513b5b63af748f

    SHA512

    91854244be2838e0efa5f3566ce3a4518484ab71fff5f06b86ef0b1309cb9e8dc988d63b0d35e54a6c7515b0c1cea9b95bbdfd469415459a46c58e96ed42a2fc

  • \Users\Admin\AppData\Local\Temp\AntiPubs Dork Searcher EZ\._cache_searcher.exe 

    Filesize

    6.8MB

    MD5

    d4b43b2ce490d8786ccde6debcad2251

    SHA1

    e88d0c6b5c336ee7c03e145532a6ce44db28af90

    SHA256

    3aad4931bc76e1d654e5fe3fc6a1a10277b0d66190a8547782a3d7fa117ccc27

    SHA512

    8bff940911e750f06c76c724b92de0753f4089d92f95e5d3d3659de3869a91908c6de25e480a0101d8149fcc881b71f585c39a2e9206393bb89f1f5e43bdda46

  • memory/580-65-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/988-62-0x00000000025E0000-0x00000000025F6000-memory.dmp

    Filesize

    88KB

  • memory/988-63-0x00000000005E0000-0x00000000005E6000-memory.dmp

    Filesize

    24KB

  • memory/988-55-0x0000000000600000-0x0000000000CD8000-memory.dmp

    Filesize

    6.8MB

  • memory/2552-61-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2684-108-0x0000000000400000-0x0000000000BB8000-memory.dmp

    Filesize

    7.7MB

  • memory/2684-143-0x0000000000400000-0x0000000000BB8000-memory.dmp

    Filesize

    7.7MB

  • memory/2684-43-0x00000000045A0000-0x00000000045BF000-memory.dmp

    Filesize

    124KB

  • memory/2684-64-0x0000000000400000-0x0000000000BB8000-memory.dmp

    Filesize

    7.7MB

  • memory/2684-109-0x0000000000400000-0x0000000000BB8000-memory.dmp

    Filesize

    7.7MB

  • memory/2684-144-0x00000000045A0000-0x00000000045BF000-memory.dmp

    Filesize

    124KB

  • memory/2716-57-0x0000000000530000-0x0000000000544000-memory.dmp

    Filesize

    80KB

  • memory/2716-59-0x0000000000590000-0x00000000005B0000-memory.dmp

    Filesize

    128KB

  • memory/2716-58-0x0000000000560000-0x0000000000566000-memory.dmp

    Filesize

    24KB

  • memory/2716-56-0x0000000000F80000-0x0000000001658000-memory.dmp

    Filesize

    6.8MB

  • memory/2748-60-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2748-14-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2996-0-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2996-26-0x0000000000400000-0x0000000000BB8000-memory.dmp

    Filesize

    7.7MB

  • memory/2996-13-0x00000000045B0000-0x00000000045CF000-memory.dmp

    Filesize

    124KB

  • memory/2996-1-0x0000000000C30000-0x0000000000C4F000-memory.dmp

    Filesize

    124KB