Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-01-2025 18:55

General

  • Target

    2025-01-03_080cb568ad618c933f5f93d628f3d1f7_luca-stealer_magniber.exe

  • Size

    12.6MB

  • MD5

    080cb568ad618c933f5f93d628f3d1f7

  • SHA1

    fa8a2680b0bf53db66c2e7a4a067b2c7188d92c8

  • SHA256

    ba5bda3a3bae477c9975bedcbbbc95d0d0f974d15363efe10c4c96b41a62b68e

  • SHA512

    9744d1af4eb85280947d97fd40d3f2eaca91e2b59d74eaf4733de0760a609798e6028557fa9515317c43df08e8c8fac9d20e321dfaf223c0eec340bcc495d082

  • SSDEEP

    196608:58upg+GYCkf4qg4h/FQvGy8upg+GYCkf4qg4h/FQvGvpFvqcA:5tgb4d/SvGytgb4d/SvGj

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzonerat family
  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Warzone RAT payload 12 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-03_080cb568ad618c933f5f93d628f3d1f7_luca-stealer_magniber.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-03_080cb568ad618c933f5f93d628f3d1f7_luca-stealer_magniber.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:748
    • C:\Users\Admin\AppData\Local\Temp\2025-01-03_080cb568ad618c933f5f93d628f3d1f7_luca-stealer_magniber.exe
      "C:\Users\Admin\AppData\Local\Temp\2025-01-03_080cb568ad618c933f5f93d628f3d1f7_luca-stealer_magniber.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:928
      • C:\Users\Admin\AppData\Local\Temp\2025-01-03_080cb568ad618c933f5f93d628f3d1f7_luca-stealer_magniber.exe
        "C:\Users\Admin\AppData\Local\Temp\2025-01-03_080cb568ad618c933f5f93d628f3d1f7_luca-stealer_magniber.exe"
        3⤵
        • Checks computer location settings
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3364
        • C:\Users\Admin\AppData\Local\Temp\._cache_2025-01-03_080cb568ad618c933f5f93d628f3d1f7_luca-stealer_magniber.exe
          "C:\Users\Admin\AppData\Local\Temp\._cache_2025-01-03_080cb568ad618c933f5f93d628f3d1f7_luca-stealer_magniber.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4880
        • C:\ProgramData\Synaptics\Synaptics.exe
          "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1908
          • C:\ProgramData\Synaptics\Synaptics.exe
            "C:\ProgramData\Synaptics\Synaptics.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4152
            • C:\ProgramData\Synaptics\Synaptics.exe
              "C:\ProgramData\Synaptics\Synaptics.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:5048
              • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
                "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:2172
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    12.6MB

    MD5

    080cb568ad618c933f5f93d628f3d1f7

    SHA1

    fa8a2680b0bf53db66c2e7a4a067b2c7188d92c8

    SHA256

    ba5bda3a3bae477c9975bedcbbbc95d0d0f974d15363efe10c4c96b41a62b68e

    SHA512

    9744d1af4eb85280947d97fd40d3f2eaca91e2b59d74eaf4733de0760a609798e6028557fa9515317c43df08e8c8fac9d20e321dfaf223c0eec340bcc495d082

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\2025-01-03_080cb568ad618c933f5f93d628f3d1f7_luca-stealer_magniber.exe.log

    Filesize

    1KB

    MD5

    8ec831f3e3a3f77e4a7b9cd32b48384c

    SHA1

    d83f09fd87c5bd86e045873c231c14836e76a05c

    SHA256

    7667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982

    SHA512

    26bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3

  • C:\Users\Admin\AppData\Local\Temp\._cache_2025-01-03_080cb568ad618c933f5f93d628f3d1f7_luca-stealer_magniber.exe

    Filesize

    132KB

    MD5

    ea15890b9eca7ebe540e1ebcdbd0ce5a

    SHA1

    4536ad88bcac07f6cba0c8cc300a0b333c0a6c45

    SHA256

    9b8556cccc608749131c32f145cdb6dcfaa5b0ec5304b597bab65a6cb5cb65f8

    SHA512

    8d1545991d8413ff57effce63208b81d2a2afea6126e62d7c71eca02d227d4417d141b008b42d30ea3fa7b999eed0b8de5734e4ab6d939623d6497fd56742f25

  • C:\Users\Admin\AppData\Local\Temp\6d6gepFb.xlsm

    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Users\Admin\AppData\Local\Temp\B8A75E00

    Filesize

    24KB

    MD5

    0a17d9da3d803aa412321661204422db

    SHA1

    c5e9ab3dd4b00b3c4ae65010906eeb18959eafac

    SHA256

    2f86262809874996e55676f58e513bcd5cdd8e48122b3273ad275a591f97705c

    SHA512

    c8baee55b453a6a94e694b0e14c899dc6ba36cde74e7ff0a268e8241a7cceadd41caf8f5a97b4717bde2d63a25952f19afe1a82876f6043658ad0b6a28a0758f

  • memory/748-6-0x0000000006600000-0x0000000006A4A000-memory.dmp

    Filesize

    4.3MB

  • memory/748-21-0x0000000074430000-0x0000000074BE0000-memory.dmp

    Filesize

    7.7MB

  • memory/748-7-0x0000000005E80000-0x0000000005F1C000-memory.dmp

    Filesize

    624KB

  • memory/748-8-0x0000000005390000-0x0000000005398000-memory.dmp

    Filesize

    32KB

  • memory/748-0-0x000000007443E000-0x000000007443F000-memory.dmp

    Filesize

    4KB

  • memory/748-5-0x0000000005C20000-0x0000000005C2A000-memory.dmp

    Filesize

    40KB

  • memory/748-4-0x0000000074430000-0x0000000074BE0000-memory.dmp

    Filesize

    7.7MB

  • memory/748-3-0x00000000059B0000-0x0000000005A42000-memory.dmp

    Filesize

    584KB

  • memory/748-2-0x0000000006050000-0x00000000065F4000-memory.dmp

    Filesize

    5.6MB

  • memory/748-1-0x0000000000330000-0x0000000000FC4000-memory.dmp

    Filesize

    12.6MB

  • memory/928-10-0x0000000074430000-0x0000000074BE0000-memory.dmp

    Filesize

    7.7MB

  • memory/928-47-0x0000000074430000-0x0000000074BE0000-memory.dmp

    Filesize

    7.7MB

  • memory/928-9-0x0000000001110000-0x000000000152C000-memory.dmp

    Filesize

    4.1MB

  • memory/928-12-0x0000000074430000-0x0000000074BE0000-memory.dmp

    Filesize

    7.7MB

  • memory/928-11-0x0000000005CF0000-0x0000000005E02000-memory.dmp

    Filesize

    1.1MB

  • memory/2280-166-0x00007FFB12690000-0x00007FFB126A0000-memory.dmp

    Filesize

    64KB

  • memory/2280-162-0x00007FFB12690000-0x00007FFB126A0000-memory.dmp

    Filesize

    64KB

  • memory/2280-168-0x00007FFB10530000-0x00007FFB10540000-memory.dmp

    Filesize

    64KB

  • memory/2280-167-0x00007FFB10530000-0x00007FFB10540000-memory.dmp

    Filesize

    64KB

  • memory/2280-163-0x00007FFB12690000-0x00007FFB126A0000-memory.dmp

    Filesize

    64KB

  • memory/2280-164-0x00007FFB12690000-0x00007FFB126A0000-memory.dmp

    Filesize

    64KB

  • memory/2280-165-0x00007FFB12690000-0x00007FFB126A0000-memory.dmp

    Filesize

    64KB

  • memory/3364-15-0x0000000000400000-0x00000000004E3000-memory.dmp

    Filesize

    908KB

  • memory/3364-13-0x0000000000400000-0x00000000004E3000-memory.dmp

    Filesize

    908KB

  • memory/3364-122-0x0000000000400000-0x00000000004E3000-memory.dmp

    Filesize

    908KB

  • memory/3364-14-0x0000000000400000-0x00000000004E3000-memory.dmp

    Filesize

    908KB

  • memory/3364-16-0x0000000000400000-0x00000000004E3000-memory.dmp

    Filesize

    908KB

  • memory/3364-17-0x0000000001770000-0x0000000001771000-memory.dmp

    Filesize

    4KB

  • memory/5048-126-0x0000000000400000-0x00000000004E3000-memory.dmp

    Filesize

    908KB

  • memory/5048-216-0x0000000000400000-0x00000000004E3000-memory.dmp

    Filesize

    908KB

  • memory/5048-215-0x0000000000400000-0x00000000004E3000-memory.dmp

    Filesize

    908KB

  • memory/5048-217-0x0000000000400000-0x00000000004E3000-memory.dmp

    Filesize

    908KB

  • memory/5048-241-0x0000000000400000-0x00000000004E3000-memory.dmp

    Filesize

    908KB