Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2024 10:36

General

  • Target

    xyxmml.msi

  • Size

    1.7MB

  • MD5

    51dd5767de678bb6359cbb175319f0ec

  • SHA1

    76ae487dda6cf3651a9b2b30614c0fefd1f3149c

  • SHA256

    5a49f64634ac29f37b3e53f5a1e37b90e8f3a385683f24083c68aee092408314

  • SHA512

    ffb798290e2f6840eb8f0587dc675e8654589bfd070b1c54e49c7984272aa94da3a493cbd28b1dddef1f6a44b09ad9fd8a14ec0d77b90f948dc85089f91cc8a0

  • SSDEEP

    49152:+EJnsHyjtk2MYC5GDChloJfWJ255hpB14Rd:1nsmtk2arhlTJ23h

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 8 IoCs
  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 55 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\xyxmml.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:372
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4324
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4932
    • C:\Windows\Installer\MSIBE7E.tmp
      "C:\Windows\Installer\MSIBE7E.tmp"
      2⤵
      • Adds Run key to start application
      • Checks computer location settings
      • Drops file in System32 directory
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3604
      • C:\ProgramData\Synaptics\Synaptics.exe
        "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4444
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:4532
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\e57bd67.rbs

    Filesize

    623B

    MD5

    37670388df915faa1bfd65ee47ebe2c9

    SHA1

    88c024788069845caa9c30db5ac57502548bcd49

    SHA256

    01d7f39efd8205d652ed82523aa4436828fa5123e90e3e52e5c0e7d4702ffee8

    SHA512

    5df525909cc9de0c579fb73f9f8eb0e902c0654f4aeece1664d17a02e9e43e39089bdf4190e08031ab7eb57e5b0ae6da869491cbced0d96fbfc7cfe92560c29b

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    753KB

    MD5

    7103f3eec43bbabe34068295157f9f1c

    SHA1

    a35d73e54e4ba166ac30889f57fa58284881102a

    SHA256

    2b6db5563d77c827f5a662cb0a05359450db29948863f9a5556c19ce14d05305

    SHA512

    f8a257aba57a1eacf8f280651e74f97d2e14f326139282abb506764c95fb57db9c4708bafd1ac027b030c40a866be2bd04b3b0bfac82f748b147e8a17dbd7188

  • C:\Users\Admin\AppData\Local\Temp\9AD75E00

    Filesize

    23KB

    MD5

    0cc7727d1d54d54f69e4d30c7096bb28

    SHA1

    c86515f0a1ddaa3e982391e80255b19acd1893c1

    SHA256

    4352aa6035c0eca2142cd9069eeeb59e7847bb0b086c91adfbc683d6d5c07354

    SHA512

    aaf342299496a816bff18aa2ac16fffdfb1916a84150c3fbc415460db6b4ffe996ebf0f05073e2db91a2e1e6da83bb8676026f800480d100c10cad03eb0e7fd4

  • C:\Users\Admin\AppData\Local\Temp\ir8cSvSf.xlsm

    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Windows\Installer\MSIBE7E.tmp

    Filesize

    1.6MB

    MD5

    1d2237faf8e6198625010cb580280901

    SHA1

    592449bddf763bb63c22f638cb42f71484f87f06

    SHA256

    78643b903379276085c5ef0092afc5c10dee821c5754e01bc8ef835907b16ac4

    SHA512

    8abe1ff967d92c663080caf54f315e534ea296c91474d66cd327dccc38a3aa8685101649bb120e28f1438011596dde4f2f83e8150c90d51529efce9906a5aa0b

  • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

    Filesize

    24.1MB

    MD5

    68a8498e3962de2a8cea3d4eaaeee41c

    SHA1

    7cbd0d311f8e3056c8d72ff46efd2f49e6c1d7ac

    SHA256

    c7cddddf9e0d86570e5851b56be9dad259828a4914405616af5317d8a1ab1af9

    SHA512

    5de86f947433aa00fddc8bdc372240a13469a14a709c79fdd22781fb114bc02b6bc741a3630eeb3f3032efe49d08db66ef9eb618af46d340f7d8557365582de3

  • \??\Volume{625ed6c4-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{f4bb0147-5447-4148-94d2-2414c713458e}_OnDiskSnapshotProp

    Filesize

    6KB

    MD5

    e45c516c810ad835311206ae15c24f30

    SHA1

    b237962a9c1c3316fd316b54aa4c47247e01f708

    SHA256

    540ff07589c1f9fc15be22d8f750ea551884d7a68179d481c2e717a7a8de427d

    SHA512

    7161ed23fb0f2b0164eec5ea8fff5b36bf11148fe030dfebab3ffb6fe1dd367102b27a91201b5cfa5752875799db75f4828223572770f403edd011ffe1cab098

  • memory/3084-91-0x00007FF980250000-0x00007FF980260000-memory.dmp

    Filesize

    64KB

  • memory/3084-95-0x00007FF980250000-0x00007FF980260000-memory.dmp

    Filesize

    64KB

  • memory/3084-96-0x00007FF97DB00000-0x00007FF97DB10000-memory.dmp

    Filesize

    64KB

  • memory/3084-97-0x00007FF97DB00000-0x00007FF97DB10000-memory.dmp

    Filesize

    64KB

  • memory/3084-94-0x00007FF980250000-0x00007FF980260000-memory.dmp

    Filesize

    64KB

  • memory/3084-92-0x00007FF980250000-0x00007FF980260000-memory.dmp

    Filesize

    64KB

  • memory/3084-93-0x00007FF980250000-0x00007FF980260000-memory.dmp

    Filesize

    64KB

  • memory/3604-80-0x0000000000400000-0x00000000005AC000-memory.dmp

    Filesize

    1.7MB

  • memory/4444-148-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/4444-179-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB