Analysis

  • max time kernel
    110s
  • max time network
    101s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2024 02:35

General

  • Target

    e397e81f529becf675472779616d70a369cb591c7f642db0f3dce1555f6d58b9N.exe

  • Size

    2.0MB

  • MD5

    2305b1a8b8f394f371e997337140cc00

  • SHA1

    1f1dccb5df62526a069ebdf019115c4284f18922

  • SHA256

    e397e81f529becf675472779616d70a369cb591c7f642db0f3dce1555f6d58b9

  • SHA512

    9633e37977215f08acf35c7e7106d00f2d347d6c1b89990fd5808bdd489e05881c54b66a774f9fd297482980fec1e77d9b6e41f5a6d2a6dc4baabdd4a2c2c12c

  • SSDEEP

    49152:XnsHyjtk2MYC5GDgvRlyycuEU7NyZ7JOyra/uN4E:Xnsmtk2aXy1uEU7Nu7JOyUq

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e397e81f529becf675472779616d70a369cb591c7f642db0f3dce1555f6d58b9N.exe
    "C:\Users\Admin\AppData\Local\Temp\e397e81f529becf675472779616d70a369cb591c7f642db0f3dce1555f6d58b9N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Users\Admin\AppData\Local\Temp\._cache_e397e81f529becf675472779616d70a369cb591c7f642db0f3dce1555f6d58b9N.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_e397e81f529becf675472779616d70a369cb591c7f642db0f3dce1555f6d58b9N.exe"
      2⤵
      • Executes dropped EXE
      PID:3044
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2016
      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        PID:2316
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    2.0MB

    MD5

    2305b1a8b8f394f371e997337140cc00

    SHA1

    1f1dccb5df62526a069ebdf019115c4284f18922

    SHA256

    e397e81f529becf675472779616d70a369cb591c7f642db0f3dce1555f6d58b9

    SHA512

    9633e37977215f08acf35c7e7106d00f2d347d6c1b89990fd5808bdd489e05881c54b66a774f9fd297482980fec1e77d9b6e41f5a6d2a6dc4baabdd4a2c2c12c

  • C:\Users\Admin\AppData\Local\Temp\79kvyvtg.xlsm

    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Users\Admin\AppData\Local\Temp\79kvyvtg.xlsm

    Filesize

    25KB

    MD5

    0d69857ac2232d2c47979dd9f1ccd2fd

    SHA1

    46966a682c89784567379a2babd73b0b86a3dc7e

    SHA256

    145693e23a5a999651ffe63e40be46c05e6e513e88497fc4d4c75b4fbeee707d

    SHA512

    e23cc48a1108f3b4ce62cd5f5e1044a5821ae08ac365e130d2870a736183d6dc28dc0c563d7366852153f896c238291c8f219dd2a010edf28b8f2b4673979f9c

  • C:\Users\Admin\AppData\Local\Temp\79kvyvtg.xlsm

    Filesize

    23KB

    MD5

    63842aca2f0fbe1ea0e0d8024ab9bf05

    SHA1

    843efe62e651ff4ead5399da1ea6832c95ce741d

    SHA256

    c4fed45b4e9b8f1c2e5115451cf2350b688ce4f8f2535f29d30960cf98285d22

    SHA512

    60147519a1cfaa20db10283698b43811ccdf3cc28db5dc99b84fd0a540cbb6e4bf28d70a2a783d5329ad83edbd482c1def43419b5da99bf356d4ea8118615676

  • C:\Users\Admin\AppData\Local\Temp\79kvyvtg.xlsm

    Filesize

    21KB

    MD5

    e6ad182519fb1c4b3165e32b013b34e1

    SHA1

    edda6e2f2acf16898463bfa456e46aa07501315e

    SHA256

    6a9485bbe31b557c0bf330928a382f63159fcb39349e7be30da09e2fc73a2729

    SHA512

    d139463ad68315be37288a887ee07876d6d1e4f5e0bc6f4923fbcb0bfff2e63d17df6b18930c4350838a2cc26ef3230c502f5431af7d765995b820d748bccab3

  • C:\Users\Admin\AppData\Local\Temp\79kvyvtg.xlsm

    Filesize

    21KB

    MD5

    68fbc177ba87a0f476f366dfb7437260

    SHA1

    b86d6deb9bc6d025c1058dfe31acfc65af2a4040

    SHA256

    7f6e875a3d4a79ac0295b4966b27e89d7f0c788cea135fc6f823d3306275e6fa

    SHA512

    72bdb1a6b7525a6093803b0506acd60e6434b97ee2d93ccc974dc65db50e81c120c75d33f1d2c7f8a26799a2c1be6795cc6d6c84ea50faf08be5b682c0e7d301

  • C:\Users\Admin\AppData\Local\Temp\79kvyvtg.xlsm

    Filesize

    26KB

    MD5

    7ef808e3017e0644abfb2bae159a8927

    SHA1

    7b1c601a27b0c82a73a35df39744dd673859305a

    SHA256

    dd342896d116cc98c6afcc97f99a0c45460d739e6359ec53cb22afcf0578ece4

    SHA512

    39005dec2bdc50e5956b654a3d7b8fc87c796e62331a6751bcd7d6310982136f9144a10ad02a5834fd6bc30bd75974365e83ba9b9165b18a2e043b0a23b0371f

  • C:\Users\Admin\Desktop\~$OpenBackup.xlsx

    Filesize

    165B

    MD5

    ff09371174f7c701e75f357a187c06e8

    SHA1

    57f9a638fd652922d7eb23236c80055a91724503

    SHA256

    e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8

    SHA512

    e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882

  • \Users\Admin\AppData\Local\Temp\._cache_e397e81f529becf675472779616d70a369cb591c7f642db0f3dce1555f6d58b9N.exe

    Filesize

    1.2MB

    MD5

    e2c16921ee7d949dbb70234fc235f726

    SHA1

    8f97c737f378559e257804accdc8fa73a179143a

    SHA256

    bdfe57913c83bc1e5647ef0b75c647ff3b36673790d2abb3593dcf9f1b426ad6

    SHA512

    184d7b3b0e67ca9fabdf85f4c70a319fbbca63b07ce7e487e5a539eda9d93de9b757a32e132d0d50f64b7f45bd4f7e271e2e41c0d972b462188f2cf2ba362205

  • memory/1872-140-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1872-53-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2016-142-0x0000000000400000-0x00000000005F9000-memory.dmp

    Filesize

    2.0MB

  • memory/2016-141-0x0000000000400000-0x00000000005F9000-memory.dmp

    Filesize

    2.0MB

  • memory/2016-174-0x0000000000400000-0x00000000005F9000-memory.dmp

    Filesize

    2.0MB

  • memory/2104-32-0x0000000000400000-0x00000000005F9000-memory.dmp

    Filesize

    2.0MB

  • memory/2104-0-0x00000000003B0000-0x00000000003B1000-memory.dmp

    Filesize

    4KB

  • memory/2316-48-0x0000000000020000-0x0000000000030000-memory.dmp

    Filesize

    64KB

  • memory/2316-49-0x0000000000020000-0x0000000000030000-memory.dmp

    Filesize

    64KB

  • memory/2316-50-0x0000000000020000-0x0000000000030000-memory.dmp

    Filesize

    64KB

  • memory/2316-51-0x0000000000020000-0x0000000000030000-memory.dmp

    Filesize

    64KB

  • memory/2316-52-0x0000000000020000-0x0000000000030000-memory.dmp

    Filesize

    64KB

  • memory/3044-37-0x0000000000020000-0x0000000000030000-memory.dmp

    Filesize

    64KB

  • memory/3044-35-0x0000000000020000-0x0000000000030000-memory.dmp

    Filesize

    64KB

  • memory/3044-36-0x0000000000020000-0x0000000000030000-memory.dmp

    Filesize

    64KB

  • memory/3044-11-0x0000000000020000-0x0000000000030000-memory.dmp

    Filesize

    64KB

  • memory/3044-12-0x0000000000020000-0x0000000000030000-memory.dmp

    Filesize

    64KB

  • memory/3044-13-0x0000000000020000-0x0000000000030000-memory.dmp

    Filesize

    64KB

  • memory/3044-23-0x0000000000020000-0x0000000000030000-memory.dmp

    Filesize

    64KB