Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2024 03:58

General

  • Target

    zhuzhu.exe

  • Size

    5.8MB

  • MD5

    675f03db23d403573a3a6f708a0e4369

  • SHA1

    78ee9afafe6bf18d2c42d816629b6f9ed1e3ea2f

  • SHA256

    ee4c8a187e1e1bd62abe49faece1f327dc7718c736dd1e427c025d73fa796cf8

  • SHA512

    c9055873fcbcefd7aeb8414627d4aa7645014bc2a609a4993317a45465a2ffdbeb38dbfb6c7677350203fe1e7d1f3906fc670ae74d1a75fbd91533044f513240

  • SSDEEP

    98304:unsmtk2asgF0ET9HlrxRVwJMACNiREvBvlvwvCvxvD:wL8Z9HhxRVwJMAqoetRqA9D

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\zhuzhu.exe
    "C:\Users\Admin\AppData\Local\Temp\zhuzhu.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:796
    • C:\Users\Admin\AppData\Local\Temp\._cache_zhuzhu.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_zhuzhu.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2532
      • C:\Users\Admin\AppData\Roaming\._cache_zhuzhu.exe
        "C:\Users\Admin\AppData\Roaming\._cache_zhuzhu.exe"
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4172
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1948
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:60
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /C powershell -ExecutionPolicy Bypass -File C:\Users\Admin\AppData\Local\updated.ps1
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2712
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -ExecutionPolicy Bypass -File C:\Users\Admin\AppData\Local\updated.ps1
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1824
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2836
      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2036
  • C:\Users\Admin\Downloads\inst.exe
    C:\Users\Admin\Downloads\inst.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:3368
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    5.8MB

    MD5

    675f03db23d403573a3a6f708a0e4369

    SHA1

    78ee9afafe6bf18d2c42d816629b6f9ed1e3ea2f

    SHA256

    ee4c8a187e1e1bd62abe49faece1f327dc7718c736dd1e427c025d73fa796cf8

    SHA512

    c9055873fcbcefd7aeb8414627d4aa7645014bc2a609a4993317a45465a2ffdbeb38dbfb6c7677350203fe1e7d1f3906fc670ae74d1a75fbd91533044f513240

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    74beabd4347b1ecc24fdc6cd9bb2ec64

    SHA1

    b793909bd2bf91d40eafb71194cc3eeb0c057110

    SHA256

    80d19c23e407ccffe9f5b43087c752b2157294a1e42d887705b9924ceb9e6af9

    SHA512

    f36be6d71e6ae79ffa79e9bc8d57e79cc14ace932fcc2106ab4df8f4ba99506dac3c007d986dfe3bf8884977a411ba1faa713489dc27b25c23bec49d42abd802

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    20KB

    MD5

    0798f479b00a143320e7f13347a77d28

    SHA1

    d5796d61147a3e2e11dabdb9c022e00d43c63d35

    SHA256

    a7566cfe7a2da378668b96a91f4ea5edda70711adf95b9bc5dfa5646592870f5

    SHA512

    1ed90a925631c2f03e06539897abe1779a971e584024e4862e2efb559b8c731ceb81b1b5a7fc85e7fb2172f322a2aa3a9719afd91aba4d4876cbf455bd95ae37

  • C:\Users\Admin\AppData\Local\Temp\._cache_zhuzhu.exe

    Filesize

    5.0MB

    MD5

    b4f00fba3327488d4cb6fd36b2d567c6

    SHA1

    4f0548a2f6bf73a85ff17f40f420098019ac05ff

    SHA256

    d6a84954e038ddf4a0026705e0942fc003cfdc04e58f658a6bd9e89c37c57d18

    SHA512

    c573147adfeba7d313cc79498a1c107679f0e69805e3aa8260b3e57dba282088bca082536d7866d4708529bf8c3bef56b2005bd9d59a870e3d29132f6fd3d897

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_dklygtck.rmt.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\tHzDucyx.xlsm

    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Users\Admin\AppData\Local\Temp\{A44B7723-4283-41b8-B9C0-6B1983C61382}.tmp\sites.dll

    Filesize

    1.4MB

    MD5

    a2ff2c72e739e0cf4c73b623444ca39d

    SHA1

    ff886e63c894a20f30c136a8264cfa33d41b8331

    SHA256

    c1eb83993c85e01ee6ae84eb6e05744ff8c3ccc02c41d09c22286e3012ef46fc

    SHA512

    844dab35a1625d5bf1bd814a36fb80d5670d3dfee5cf65ad8be53784b486dcc08898b7577a323c7c7e1e83655f861ea86c5453cfa4c3d55353d329ef3af6320b

  • C:\Users\Admin\AppData\Local\Temp\{AB531F15-34E0-41b9-A8A4-6EC26D799854}.tmp\360P2SP.dll

    Filesize

    688KB

    MD5

    d875875eb3282b692ab10e946ea22361

    SHA1

    34bcef8a8cb0e1db44671892ac3cbd74d3c541a8

    SHA256

    0eca2e140f973b2011c633d4d92e512a1f77e1da610cfe0f4538c0b451270016

    SHA512

    972466310d3c145141320584b5f3e431c6888bda2ba1036f85e68e534ed6fb97ba04cbd46d8d9c401dc5857100dc1bff1bad82b50514f3e5c582522f22fd2b5c

  • C:\Users\Admin\AppData\Local\updated.ps1

    Filesize

    151B

    MD5

    aa0e1012d3b7c24fad1be4806756c2cf

    SHA1

    fe0d130af9105d9044ff3d657d1abeaf0b750516

    SHA256

    fc47e1fa89397c3139d9047dc667531a9153a339f8e29ac713e518d51a995897

    SHA512

    15fae192951747a0c71059f608700f88548f3e60bb5c708b206bf793a7e3d059a278f2058d4ac86b86781b202037401a29602ee4d6c0cbaaff532cef311975f4

  • C:\Users\Admin\Downloads\inst.exe

    Filesize

    3.9MB

    MD5

    aaa0f14bdfe3777eee342c27de409e6d

    SHA1

    6b5f9a7b71e6b105d1bfa26b0c7a4931ed9e5179

    SHA256

    b35314c2c3b1aab777d621c6fd8516a877b27efbde4dd4addd6843c411e96aa3

    SHA512

    d584d30083e34964d846c88eb558dba338e3b8982d6d71efec36461aea12127cfcba2be9510d9ef254a85680a2ba2ddb21583ce5e77d5cf3ac0a65800e5ab25a

  • memory/60-375-0x0000000007260000-0x000000000726A000-memory.dmp

    Filesize

    40KB

  • memory/60-341-0x0000000005940000-0x0000000005C94000-memory.dmp

    Filesize

    3.3MB

  • memory/60-383-0x00000000073F0000-0x0000000007401000-memory.dmp

    Filesize

    68KB

  • memory/60-372-0x0000000006480000-0x000000000649E000-memory.dmp

    Filesize

    120KB

  • memory/60-373-0x00000000070A0000-0x0000000007143000-memory.dmp

    Filesize

    652KB

  • memory/60-323-0x0000000004FD0000-0x00000000055F8000-memory.dmp

    Filesize

    6.2MB

  • memory/60-361-0x0000000006E50000-0x0000000006E82000-memory.dmp

    Filesize

    200KB

  • memory/60-362-0x0000000072210000-0x000000007225C000-memory.dmp

    Filesize

    304KB

  • memory/796-0-0x0000000002840000-0x0000000002841000-memory.dmp

    Filesize

    4KB

  • memory/796-129-0x0000000000400000-0x00000000009CE000-memory.dmp

    Filesize

    5.8MB

  • memory/1824-358-0x0000000006E30000-0x0000000006E4A000-memory.dmp

    Filesize

    104KB

  • memory/1824-324-0x0000000005B50000-0x0000000005B72000-memory.dmp

    Filesize

    136KB

  • memory/1824-354-0x0000000006950000-0x000000000699C000-memory.dmp

    Filesize

    304KB

  • memory/1824-353-0x0000000006910000-0x000000000692E000-memory.dmp

    Filesize

    120KB

  • memory/1824-388-0x000000006DC60000-0x000000006DFB4000-memory.dmp

    Filesize

    3.3MB

  • memory/1824-325-0x00000000062A0000-0x0000000006306000-memory.dmp

    Filesize

    408KB

  • memory/1824-374-0x0000000008B80000-0x00000000091FA000-memory.dmp

    Filesize

    6.5MB

  • memory/1824-322-0x0000000003000000-0x0000000003036000-memory.dmp

    Filesize

    216KB

  • memory/1824-359-0x0000000006EA0000-0x0000000006EC2000-memory.dmp

    Filesize

    136KB

  • memory/1824-387-0x0000000072210000-0x000000007225C000-memory.dmp

    Filesize

    304KB

  • memory/1824-357-0x0000000007900000-0x0000000007996000-memory.dmp

    Filesize

    600KB

  • memory/1824-360-0x0000000007F50000-0x00000000084F4000-memory.dmp

    Filesize

    5.6MB

  • memory/1824-326-0x0000000006310000-0x0000000006376000-memory.dmp

    Filesize

    408KB

  • memory/2036-379-0x0000000000400000-0x0000000000919000-memory.dmp

    Filesize

    5.1MB

  • memory/2280-376-0x00007FFD2D870000-0x00007FFD2D880000-memory.dmp

    Filesize

    64KB

  • memory/2280-381-0x00007FFD2D870000-0x00007FFD2D880000-memory.dmp

    Filesize

    64KB

  • memory/2280-386-0x00007FFD2AF10000-0x00007FFD2AF20000-memory.dmp

    Filesize

    64KB

  • memory/2280-382-0x00007FFD2AF10000-0x00007FFD2AF20000-memory.dmp

    Filesize

    64KB

  • memory/2280-380-0x00007FFD2D870000-0x00007FFD2D880000-memory.dmp

    Filesize

    64KB

  • memory/2280-377-0x00007FFD2D870000-0x00007FFD2D880000-memory.dmp

    Filesize

    64KB

  • memory/2280-378-0x00007FFD2D870000-0x00007FFD2D880000-memory.dmp

    Filesize

    64KB

  • memory/2532-69-0x00000000026C0000-0x00000000026C1000-memory.dmp

    Filesize

    4KB

  • memory/2532-314-0x0000000010000000-0x0000000010019000-memory.dmp

    Filesize

    100KB

  • memory/2532-252-0x0000000010000000-0x0000000010019000-memory.dmp

    Filesize

    100KB

  • memory/2532-190-0x0000000010000000-0x0000000010019000-memory.dmp

    Filesize

    100KB

  • memory/2532-315-0x0000000000400000-0x0000000000919000-memory.dmp

    Filesize

    5.1MB

  • memory/2532-189-0x0000000002BC0000-0x0000000002BDE000-memory.dmp

    Filesize

    120KB

  • memory/2532-70-0x0000000002B90000-0x0000000002B91000-memory.dmp

    Filesize

    4KB

  • memory/2836-356-0x0000000000400000-0x00000000009CE000-memory.dmp

    Filesize

    5.8MB

  • memory/2836-425-0x0000000000400000-0x00000000009CE000-memory.dmp

    Filesize

    5.8MB

  • memory/2836-472-0x0000000000400000-0x00000000009CE000-memory.dmp

    Filesize

    5.8MB

  • memory/4172-421-0x0000000003850000-0x0000000003888000-memory.dmp

    Filesize

    224KB

  • memory/4172-401-0x0000000000400000-0x0000000000919000-memory.dmp

    Filesize

    5.1MB

  • memory/4172-352-0x0000000003100000-0x0000000003124000-memory.dmp

    Filesize

    144KB

  • memory/4172-316-0x0000000010000000-0x0000000010019000-memory.dmp

    Filesize

    100KB

  • memory/4172-417-0x0000000003100000-0x0000000003124000-memory.dmp

    Filesize

    144KB

  • memory/4172-418-0x0000000003850000-0x0000000003888000-memory.dmp

    Filesize

    224KB

  • memory/4172-419-0x0000000003850000-0x0000000003888000-memory.dmp

    Filesize

    224KB

  • memory/4172-420-0x0000000003850000-0x0000000003888000-memory.dmp

    Filesize

    224KB

  • memory/4172-399-0x0000000003100000-0x0000000003124000-memory.dmp

    Filesize

    144KB

  • memory/4172-423-0x0000000003100000-0x0000000003124000-memory.dmp

    Filesize

    144KB

  • memory/4172-422-0x0000000003100000-0x0000000003124000-memory.dmp

    Filesize

    144KB

  • memory/4172-346-0x0000000003100000-0x0000000003124000-memory.dmp

    Filesize

    144KB

  • memory/4172-430-0x0000000000400000-0x0000000000919000-memory.dmp

    Filesize

    5.1MB

  • memory/4172-433-0x0000000000400000-0x0000000000919000-memory.dmp

    Filesize

    5.1MB

  • memory/4172-436-0x0000000010000000-0x0000000010019000-memory.dmp

    Filesize

    100KB

  • memory/4172-439-0x0000000000400000-0x0000000000919000-memory.dmp

    Filesize

    5.1MB

  • memory/4172-442-0x0000000000400000-0x0000000000919000-memory.dmp

    Filesize

    5.1MB

  • memory/4172-446-0x0000000000400000-0x0000000000919000-memory.dmp

    Filesize

    5.1MB

  • memory/4172-451-0x0000000000400000-0x0000000000919000-memory.dmp

    Filesize

    5.1MB

  • memory/4172-398-0x0000000003100000-0x0000000003124000-memory.dmp

    Filesize

    144KB

  • memory/4172-474-0x0000000000400000-0x0000000000919000-memory.dmp

    Filesize

    5.1MB