Analysis

  • max time kernel
    120s
  • max time network
    115s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2024 20:40

General

  • Target

    0386f907a997e0d2f1b768facff9ef0ef70e917395a7c9f9972232a786903e3cN.exe

  • Size

    1.2MB

  • MD5

    635b87245cb5ab0b4a6bf4bae99cefd0

  • SHA1

    dffe11f4febd037201eb7bc182e65d7fc1606236

  • SHA256

    0386f907a997e0d2f1b768facff9ef0ef70e917395a7c9f9972232a786903e3c

  • SHA512

    d46aea739f50ba28378c6cf201b834bfa336c0260b7fc116c9b97d4b84efb0a968975a393e9843b2f359244d0ff266e485e7fb18f4eb99f7240ec6b4cb065de3

  • SSDEEP

    24576:e5xolYQY64nsJ39LyjbJkQFMhmC+6GD9VLMWMa/k9wxa:pYNnsHyjtk2MYC5GDf7Iw4

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 18 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0386f907a997e0d2f1b768facff9ef0ef70e917395a7c9f9972232a786903e3cN.exe
    "C:\Users\Admin\AppData\Local\Temp\0386f907a997e0d2f1b768facff9ef0ef70e917395a7c9f9972232a786903e3cN.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2004
    • \??\c:\users\admin\appdata\local\temp\0386f907a997e0d2f1b768facff9ef0ef70e917395a7c9f9972232a786903e3cn.exe 
      c:\users\admin\appdata\local\temp\0386f907a997e0d2f1b768facff9ef0ef70e917395a7c9f9972232a786903e3cn.exe 
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2260
      • C:\ProgramData\Synaptics\Synaptics.exe
        "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2424
        • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
          "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1740
    • C:\Users\Admin\AppData\Local\icsys.icn.exe
      C:\Users\Admin\AppData\Local\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2536
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visiblity of hidden/system files in Explorer
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2964
        • \??\c:\windows\system\spoolsv.exe
          c:\windows\system\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2784
          • \??\c:\windows\system\svchost.exe
            c:\windows\system\svchost.exe
            5⤵
            • Modifies WinLogon for persistence
            • Modifies visiblity of hidden/system files in Explorer
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1816
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:2564
            • C:\Windows\SysWOW64\at.exe
              at 20:42 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1708
            • C:\Windows\SysWOW64\at.exe
              at 20:43 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2208
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

    Filesize

    219KB

    MD5

    95af1aeca693bd2553270882f851d566

    SHA1

    ecfaf37db3ba81298aec2d884284449854d034eb

    SHA256

    e5d72e127690fa86999f1c9c6818264eaabed7624edce401e56777a36a029c7a

    SHA512

    7cba044fe666979cd43c393ec04ef32ec416540a209a8442b845264c0801df260a29c2fcd7e1fc3de93e166e59197f7896ab77abec0595c09c4753bed9a65732

  • C:\Users\Admin\AppData\Local\Temp\WRn3hdgc.xlsm

    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Users\Admin\AppData\Local\Temp\WRn3hdgc.xlsm

    Filesize

    23KB

    MD5

    61272ef10abfe02698cd41caeeca416f

    SHA1

    c44f29c173f607f5c49f320d4354e919a345084b

    SHA256

    43785f7a7083be6137297734363a2b0cc0580a8b57829312665bda5cfb54113a

    SHA512

    e22f2e73c3483949190bd2c36263583ff3982c64a74bbec4e2c77a701056bfcc8c0fc4b049f5d6f26527ed144e5728722df207f88091a0b312271de17a7fb403

  • C:\Users\Admin\AppData\Local\Temp\WRn3hdgc.xlsm

    Filesize

    27KB

    MD5

    bc39886a43586a00cb397a9dccd5ee27

    SHA1

    02e2d6cdeda7f76d5b3da96ab411cdd479924954

    SHA256

    1c4a39ff2a9394a56fb4e2a0937eb87fdd503d0ae175e2a89a3df2da28160904

    SHA512

    5375a862de11e7ac8c892e5fe1db2c6d06f8790e8532042d46b8773d65495e6915002ab43112889747f63f9dcd2064cc3ace3c22b96886a269ef761dce06f8bb

  • C:\Users\Admin\AppData\Local\Temp\WRn3hdgc.xlsm

    Filesize

    25KB

    MD5

    ae1d1d391a6a5f7dfbe86b29b62ebd81

    SHA1

    cbad84a7a03491fc0dda7ee3794aa1f60ebd2de3

    SHA256

    0f0af729a988a7c79e6c6bcaeffde3aa20b89625b9a3b0280fc1c31354e3ecb0

    SHA512

    9e3290578f79ceee4095df8e7cbf625ba3c499af13e126edd717c18301856292e48755cee3333a2e7ff1993c8a5986b0ddf6786329e92cc9c5a8bf2339e076da

  • C:\Users\Admin\AppData\Local\icsys.icn.exe

    Filesize

    206KB

    MD5

    d6109007ddad132db4d6cbaa6c600cc6

    SHA1

    5ae8216d060b5687d1e45284a656471601164bee

    SHA256

    5b4a5172c0d199d6c1c557781ddfdad618f8847d6312c8941e5cb4b502dee76c

    SHA512

    139f4a179025a47787abb9604ce70496ebab2715c527900b05a96dc0d881d6887bea893f9a38a2b7f17a5b364fa0594623390995865a5b34b16f42be80e5cf92

  • C:\Users\Admin\AppData\Roaming\mrsys.exe

    Filesize

    206KB

    MD5

    8dbf1fe5f3df5eeda383447ef38ea11f

    SHA1

    08f70ca5cee24b82e08b95168073321c081ae6b4

    SHA256

    8fd8968348d53b8246b9a9c4fd925e0d8fcaedca20ef6591026c254052f744a9

    SHA512

    24a163cac718a4ed7501a4618d5008dbd305599e6eaf03d3890cea742be263b1dc893db078e46499c9102a70f6233e1f60a1bb185b6f7f4bd6f6042bafa97a6f

  • \Users\Admin\AppData\Local\Temp\0386f907a997e0d2f1b768facff9ef0ef70e917395a7c9f9972232a786903e3cn.exe 

    Filesize

    973KB

    MD5

    790032dd55b94919099af8b97670ac24

    SHA1

    404d441c2dc47edcaff0e29a24604d19d1ca009e

    SHA256

    27940e2d339bad9c92aa9a65fdf88ee142514758e4b951a8ae8f522069ae370c

    SHA512

    c582db5e9d43aacd60a999db79e931c4e09d200f78ab7ffe2fc704a8ec0ecce745f2c3ae0956c50070b1630e74739aa5f5bec933ab7cb1c815b64ab2208444b3

  • \Windows\system\explorer.exe

    Filesize

    206KB

    MD5

    8bf1ef95b7b756673872fe0a94a9c3b3

    SHA1

    63e10b245b7692865fb68ea2b124118b9324a924

    SHA256

    26aea6d2fbd1661ae4365d04a9f195ffa12db3af5c4cb426b2a9945e1b035eea

    SHA512

    ca1d54a994652c822181b44fe2b7792997730875308af486ef762a49e032ac8acba5f7dd5f75293f29ef02c2161ded28f19c38f4fa96dd4cc59f2a7035ed3920

  • \Windows\system\spoolsv.exe

    Filesize

    206KB

    MD5

    9ff35fa4d37f9d2d35b6b94cb2325c59

    SHA1

    ac5abce2f6a0cd025168b57a4105999e8842304f

    SHA256

    489562e5dfce39a501ea4026d367227536fae4d9d6f22b835e4f6eb18c59e937

    SHA512

    69510b0320b0a2eb3e92011c11740ade2e1bb8e100ca85e4310d8c78e64950f12c6cb9ad18427a6ac5c7ba46444263ba333c66dcea07c3ad7af7555b57e1a1c6

  • \Windows\system\svchost.exe

    Filesize

    206KB

    MD5

    8da02ae4bcf2f9c90a7ea96b39f2f380

    SHA1

    18167dd2b2e4a28367f4c0d67139d82808eb1ffb

    SHA256

    fb29d99b16ef265feea3a3279aa67c578df110139cee2d1c7ff1e50c11c4bd42

    SHA512

    94b4a32cb4331cc5a5f3ced1daebe6b0f0a80192cf4029da15aaf5505a86775bba97f954b901cd7e24f1d28c3a329bda8a7a997562d41b102f88ec700783062a

  • memory/1192-125-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1740-120-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/1740-124-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/1816-73-0x0000000000830000-0x000000000085F000-memory.dmp

    Filesize

    188KB

  • memory/1816-207-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2004-23-0x0000000002650000-0x000000000267F000-memory.dmp

    Filesize

    188KB

  • memory/2004-24-0x0000000002650000-0x000000000267F000-memory.dmp

    Filesize

    188KB

  • memory/2004-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2004-93-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2260-105-0x0000000000400000-0x00000000004F9000-memory.dmp

    Filesize

    996KB

  • memory/2260-13-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/2260-72-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/2424-122-0x0000000000400000-0x00000000004F9000-memory.dmp

    Filesize

    996KB

  • memory/2424-123-0x0000000003A80000-0x0000000003B0A000-memory.dmp

    Filesize

    552KB

  • memory/2424-121-0x0000000003A80000-0x0000000003B0A000-memory.dmp

    Filesize

    552KB

  • memory/2424-236-0x0000000000400000-0x00000000004F9000-memory.dmp

    Filesize

    996KB

  • memory/2424-195-0x0000000000400000-0x00000000004F9000-memory.dmp

    Filesize

    996KB

  • memory/2424-113-0x0000000003A80000-0x0000000003B0A000-memory.dmp

    Filesize

    552KB

  • memory/2424-193-0x0000000000400000-0x00000000004F9000-memory.dmp

    Filesize

    996KB

  • memory/2536-39-0x00000000003D0000-0x00000000003FF000-memory.dmp

    Filesize

    188KB

  • memory/2536-94-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2536-25-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2564-89-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2784-92-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2964-204-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2964-53-0x0000000000750000-0x000000000077F000-memory.dmp

    Filesize

    188KB