Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-01-2025 01:02

General

  • Target

    dd49cb0cdc819682f71a76643ca69ad86cf25e616a4868e164cdde535b324bfa.exe

  • Size

    2.5MB

  • MD5

    955b5c84e9db2eba7f71d15229611e54

  • SHA1

    803fb7d591b378efb2f33f3f4596b41d488edb34

  • SHA256

    dd49cb0cdc819682f71a76643ca69ad86cf25e616a4868e164cdde535b324bfa

  • SHA512

    318626a5488ddeecc6af91ad37aa30c9811057c41bc39a7de76a4de2bbf5de3dadfafdfbf367b2ec7ecbeb9886e8ca28429179cf754b5bd0b4b2bca6b72dc516

  • SSDEEP

    49152:fnsHyjtk2MYC5GD8oIInpcITYbNbNWo4kSH3OqtwIfKI4GD2z5pvnQ:fnsmtk2akhiIT4bNJFY3Oqtr4lpvQ

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 22 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd49cb0cdc819682f71a76643ca69ad86cf25e616a4868e164cdde535b324bfa.exe
    "C:\Users\Admin\AppData\Local\Temp\dd49cb0cdc819682f71a76643ca69ad86cf25e616a4868e164cdde535b324bfa.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:632
    • C:\Users\Admin\AppData\Local\Temp\._cache_dd49cb0cdc819682f71a76643ca69ad86cf25e616a4868e164cdde535b324bfa.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_dd49cb0cdc819682f71a76643ca69ad86cf25e616a4868e164cdde535b324bfa.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4764
      • \??\c:\users\admin\appdata\local\temp\._cache_dd49cb0cdc819682f71a76643ca69ad86cf25e616a4868e164cdde535b324bfa.exe 
        c:\users\admin\appdata\local\temp\._cache_dd49cb0cdc819682f71a76643ca69ad86cf25e616a4868e164cdde535b324bfa.exe 
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:672
      • C:\Windows\Resources\Themes\icsys.icn.exe
        C:\Windows\Resources\Themes\icsys.icn.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1680
        • \??\c:\windows\resources\themes\explorer.exe
          c:\windows\resources\themes\explorer.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4916
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3512
            • \??\c:\windows\resources\svchost.exe
              c:\windows\resources\svchost.exe
              6⤵
              • Modifies visiblity of hidden/system files in Explorer
              • Executes dropped EXE
              • Adds Run key to start application
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:4836
              • \??\c:\windows\resources\spoolsv.exe
                c:\windows\resources\spoolsv.exe PR
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:4068
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4548
      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1144
        • \??\c:\users\admin\appdata\local\temp\._cache_synaptics.exe 
          c:\users\admin\appdata\local\temp\._cache_synaptics.exe  InjUpdate
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:4268
        • C:\Windows\Resources\Themes\icsys.icn.exe
          C:\Windows\Resources\Themes\icsys.icn.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2068
          • \??\c:\windows\resources\themes\explorer.exe
            c:\windows\resources\themes\explorer.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:1992
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    2.5MB

    MD5

    955b5c84e9db2eba7f71d15229611e54

    SHA1

    803fb7d591b378efb2f33f3f4596b41d488edb34

    SHA256

    dd49cb0cdc819682f71a76643ca69ad86cf25e616a4868e164cdde535b324bfa

    SHA512

    318626a5488ddeecc6af91ad37aa30c9811057c41bc39a7de76a4de2bbf5de3dadfafdfbf367b2ec7ecbeb9886e8ca28429179cf754b5bd0b4b2bca6b72dc516

  • C:\Users\Admin\AppData\Local\Temp\._cache_dd49cb0cdc819682f71a76643ca69ad86cf25e616a4868e164cdde535b324bfa.exe

    Filesize

    1.8MB

    MD5

    391ae2a331ac042af3375a8bec61c542

    SHA1

    2b4ac01d34886e81d492e9b5ce8e0c3867378241

    SHA256

    ab3c3cfc26b066a0118eb29d96751d60f078dbd432b6f2faa6ecdf5b14b8d96e

    SHA512

    c4bd6e66c0a220b2a5e0f4684c85d0a201d9b6ba54fd7a64d47bf3d1851b3d361b3c18f1917c34f68239c47ee31cb414dc4bc3607f8167116ca0b7bfa251ccb5

  • C:\Users\Admin\AppData\Local\Temp\LLZ3UmW8.xlsm

    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    135KB

    MD5

    68a42b15f0ab89f3c39a0ec47795f483

    SHA1

    ab075899b447d233ce4b263956414baba183dec9

    SHA256

    f20e051792addb4f7f2325777b2c3673b5ae828619329d31e6387667e394bfb2

    SHA512

    7b3af64c4fe15b0205fd810714ebd948f34e36f8fe26ca4ef9f11b8185f41b60f4c0d9d2822786e3914925456a6fbabd40483e807abbc87635a08911fb9a479a

  • C:\Windows\Resources\Themes\icsys.icn.exe

    Filesize

    135KB

    MD5

    b2b0f7ed52405ce562cdf3fc98642fc4

    SHA1

    ea849492e1f78495de05274e86166d949f3c5d52

    SHA256

    99540984de3d492d34879a243e04d9ed1c64babe9f41fbaab6ab60bab54083a7

    SHA512

    e63923a1db48345a393f2ae786e54ddc6cd1657d33b6f72df13a5034a17d127671d88ddf6f71e5b97ee3ec597fd966ce450d872db6b7bdf3d181b8c9010caa01

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    bd1d1f414bf4e81a3692effa9d4e7043

    SHA1

    d60b5ceea252e8eddb5918be9fab8a7fc76a893a

    SHA256

    ed86bc3270b626487256aea938588e0024aa4d4cc461dd45c360f6a3fcecc50d

    SHA512

    b30ecb900f7b8b7f42e9acc1edc8a0a9bda2b005d13bab695a710952f95dd68d935a5f32348951242b9f359061789a6cdd52d8677c7a32d764d9714a03e37cfc

  • C:\Windows\Resources\svchost.exe

    Filesize

    135KB

    MD5

    ccb6d445ec8d7fea637916d1c3ecf147

    SHA1

    f058c1d4b2a111a0ba941e2f5e78836b6123400c

    SHA256

    34ed03ad2f71ee7f4098e1027efc66062a7e9e476be6d9f6102cbd6dcc7f65a2

    SHA512

    a192cc6e6f7107c2b1d3a821c1ec76122ec2dba041bdceaa9842ce58c3a96d4b8424d97222e1f47cd28ffa0cca2d77ac53b17a341e6f8002fe3f8ea2ee6c1183

  • \??\c:\users\admin\appdata\local\temp\._cache_dd49cb0cdc819682f71a76643ca69ad86cf25e616a4868e164cdde535b324bfa.exe 

    Filesize

    1.7MB

    MD5

    d440e40758c321682e212e61e6bf297e

    SHA1

    ad0e6fd020d5619a76789e7dc4c51503aa51c854

    SHA256

    03afa67e7c0bebf918c799b844b7ef8f9eb7f982caf6de5f62710e92484cc104

    SHA512

    7456186ef64e682cd6e90bb3598e1c90bd17cc0f0616dbb113c596496a8603973930eca7c5e9b4b5dc12f69456b234b90e500ae60e8cc5a9abb3ff7f4ee5b0bc

  • memory/632-0-0x0000000002630000-0x0000000002631000-memory.dmp

    Filesize

    4KB

  • memory/632-133-0x0000000000400000-0x0000000000690000-memory.dmp

    Filesize

    2.6MB

  • memory/672-197-0x000001DCD2810000-0x000001DCD282A000-memory.dmp

    Filesize

    104KB

  • memory/672-196-0x000001DCD2290000-0x000001DCD2440000-memory.dmp

    Filesize

    1.7MB

  • memory/1144-201-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1144-285-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1680-269-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1992-283-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2068-284-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3512-268-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3848-208-0x00007FF845D30000-0x00007FF845D40000-memory.dmp

    Filesize

    64KB

  • memory/3848-217-0x00007FF843660000-0x00007FF843670000-memory.dmp

    Filesize

    64KB

  • memory/3848-212-0x00007FF843660000-0x00007FF843670000-memory.dmp

    Filesize

    64KB

  • memory/3848-210-0x00007FF845D30000-0x00007FF845D40000-memory.dmp

    Filesize

    64KB

  • memory/3848-211-0x00007FF845D30000-0x00007FF845D40000-memory.dmp

    Filesize

    64KB

  • memory/3848-207-0x00007FF845D30000-0x00007FF845D40000-memory.dmp

    Filesize

    64KB

  • memory/3848-209-0x00007FF845D30000-0x00007FF845D40000-memory.dmp

    Filesize

    64KB

  • memory/4068-267-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4548-271-0x0000000000400000-0x0000000000690000-memory.dmp

    Filesize

    2.6MB

  • memory/4548-134-0x00000000022E0000-0x00000000022E1000-memory.dmp

    Filesize

    4KB

  • memory/4548-250-0x00000000022E0000-0x00000000022E1000-memory.dmp

    Filesize

    4KB

  • memory/4548-314-0x0000000000400000-0x0000000000690000-memory.dmp

    Filesize

    2.6MB

  • memory/4764-270-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4764-60-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4836-317-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4916-316-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB