Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-01-2025 18:51

General

  • Target

    2025-01-03_080cb568ad618c933f5f93d628f3d1f7_luca-stealer_magniber.exe

  • Size

    12.6MB

  • MD5

    080cb568ad618c933f5f93d628f3d1f7

  • SHA1

    fa8a2680b0bf53db66c2e7a4a067b2c7188d92c8

  • SHA256

    ba5bda3a3bae477c9975bedcbbbc95d0d0f974d15363efe10c4c96b41a62b68e

  • SHA512

    9744d1af4eb85280947d97fd40d3f2eaca91e2b59d74eaf4733de0760a609798e6028557fa9515317c43df08e8c8fac9d20e321dfaf223c0eec340bcc495d082

  • SSDEEP

    196608:58upg+GYCkf4qg4h/FQvGy8upg+GYCkf4qg4h/FQvGvpFvqcA:5tgb4d/SvGytgb4d/SvGj

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzonerat family
  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Warzone RAT payload 9 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-03_080cb568ad618c933f5f93d628f3d1f7_luca-stealer_magniber.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-03_080cb568ad618c933f5f93d628f3d1f7_luca-stealer_magniber.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3744
    • C:\Users\Admin\AppData\Local\Temp\2025-01-03_080cb568ad618c933f5f93d628f3d1f7_luca-stealer_magniber.exe
      "C:\Users\Admin\AppData\Local\Temp\2025-01-03_080cb568ad618c933f5f93d628f3d1f7_luca-stealer_magniber.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3776
      • C:\Users\Admin\AppData\Local\Temp\2025-01-03_080cb568ad618c933f5f93d628f3d1f7_luca-stealer_magniber.exe
        "C:\Users\Admin\AppData\Local\Temp\2025-01-03_080cb568ad618c933f5f93d628f3d1f7_luca-stealer_magniber.exe"
        3⤵
        • Checks computer location settings
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1576
        • C:\Users\Admin\AppData\Local\Temp\._cache_2025-01-03_080cb568ad618c933f5f93d628f3d1f7_luca-stealer_magniber.exe
          "C:\Users\Admin\AppData\Local\Temp\._cache_2025-01-03_080cb568ad618c933f5f93d628f3d1f7_luca-stealer_magniber.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3580
        • C:\ProgramData\Synaptics\Synaptics.exe
          "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4248
          • C:\ProgramData\Synaptics\Synaptics.exe
            "C:\ProgramData\Synaptics\Synaptics.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4784
            • C:\ProgramData\Synaptics\Synaptics.exe
              "C:\ProgramData\Synaptics\Synaptics.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:3236
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 436
                7⤵
                • Program crash
                PID:2848
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3236 -ip 3236
    1⤵
      PID:4012

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Synaptics\Synaptics.exe

      Filesize

      12.6MB

      MD5

      080cb568ad618c933f5f93d628f3d1f7

      SHA1

      fa8a2680b0bf53db66c2e7a4a067b2c7188d92c8

      SHA256

      ba5bda3a3bae477c9975bedcbbbc95d0d0f974d15363efe10c4c96b41a62b68e

      SHA512

      9744d1af4eb85280947d97fd40d3f2eaca91e2b59d74eaf4733de0760a609798e6028557fa9515317c43df08e8c8fac9d20e321dfaf223c0eec340bcc495d082

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\2025-01-03_080cb568ad618c933f5f93d628f3d1f7_luca-stealer_magniber.exe.log

      Filesize

      1KB

      MD5

      8ec831f3e3a3f77e4a7b9cd32b48384c

      SHA1

      d83f09fd87c5bd86e045873c231c14836e76a05c

      SHA256

      7667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982

      SHA512

      26bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3

    • C:\Users\Admin\AppData\Local\Temp\._cache_2025-01-03_080cb568ad618c933f5f93d628f3d1f7_luca-stealer_magniber.exe

      Filesize

      132KB

      MD5

      ea15890b9eca7ebe540e1ebcdbd0ce5a

      SHA1

      4536ad88bcac07f6cba0c8cc300a0b333c0a6c45

      SHA256

      9b8556cccc608749131c32f145cdb6dcfaa5b0ec5304b597bab65a6cb5cb65f8

      SHA512

      8d1545991d8413ff57effce63208b81d2a2afea6126e62d7c71eca02d227d4417d141b008b42d30ea3fa7b999eed0b8de5734e4ab6d939623d6497fd56742f25

    • memory/1576-14-0x0000000000400000-0x00000000004E3000-memory.dmp

      Filesize

      908KB

    • memory/1576-122-0x0000000000400000-0x00000000004E3000-memory.dmp

      Filesize

      908KB

    • memory/1576-17-0x0000000003430000-0x0000000003431000-memory.dmp

      Filesize

      4KB

    • memory/1576-16-0x0000000000400000-0x00000000004E3000-memory.dmp

      Filesize

      908KB

    • memory/1576-15-0x0000000000400000-0x00000000004E3000-memory.dmp

      Filesize

      908KB

    • memory/1576-13-0x0000000000400000-0x00000000004E3000-memory.dmp

      Filesize

      908KB

    • memory/3236-127-0x0000000001100000-0x00000000011E3000-memory.dmp

      Filesize

      908KB

    • memory/3236-131-0x0000000001100000-0x00000000011E3000-memory.dmp

      Filesize

      908KB

    • memory/3744-21-0x0000000074D60000-0x0000000075510000-memory.dmp

      Filesize

      7.7MB

    • memory/3744-4-0x0000000074D60000-0x0000000075510000-memory.dmp

      Filesize

      7.7MB

    • memory/3744-1-0x00000000005C0000-0x0000000001254000-memory.dmp

      Filesize

      12.6MB

    • memory/3744-2-0x0000000006070000-0x0000000006614000-memory.dmp

      Filesize

      5.6MB

    • memory/3744-3-0x0000000005B60000-0x0000000005BF2000-memory.dmp

      Filesize

      584KB

    • memory/3744-8-0x00000000033B0000-0x00000000033B8000-memory.dmp

      Filesize

      32KB

    • memory/3744-7-0x00000000066C0000-0x000000000675C000-memory.dmp

      Filesize

      624KB

    • memory/3744-0-0x0000000074D6E000-0x0000000074D6F000-memory.dmp

      Filesize

      4KB

    • memory/3744-6-0x00000000067E0000-0x0000000006C2A000-memory.dmp

      Filesize

      4.3MB

    • memory/3744-5-0x0000000005DB0000-0x0000000005DBA000-memory.dmp

      Filesize

      40KB

    • memory/3776-9-0x0000000001550000-0x000000000196C000-memory.dmp

      Filesize

      4.1MB

    • memory/3776-47-0x0000000074D60000-0x0000000075510000-memory.dmp

      Filesize

      7.7MB

    • memory/3776-11-0x0000000074D60000-0x0000000075510000-memory.dmp

      Filesize

      7.7MB

    • memory/3776-10-0x0000000074D60000-0x0000000075510000-memory.dmp

      Filesize

      7.7MB

    • memory/3776-12-0x0000000006110000-0x0000000006222000-memory.dmp

      Filesize

      1.1MB