Analysis
-
max time kernel
140s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 09:04
Behavioral task
behavioral1
Sample
一键上号8.0正式版(上不去号切换模式).exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
一键上号8.0正式版(上不去号切换模式).exe
Resource
win10v2004-20241007-en
General
-
Target
一键上号8.0正式版(上不去号切换模式).exe
-
Size
1.0MB
-
MD5
7bfcd8f6d2396fac92e1693cbc15fc0d
-
SHA1
b60b4aa3be6ca2bb357d7e921685dffc88bf6196
-
SHA256
922f57f2041b3e1e0a5ef916bed236a658332ced17091d551d1580c0fae62629
-
SHA512
fbf4ae62c34c475f9d090e2003d3b492347c9a6023898f24f2d7dce7943eefebb463bc816c4c7edc1a66b8d547983e799db42c241635745c4a2285ee6b7d9526
-
SSDEEP
24576:ensJ39LyjbJkQFMhmC+6GD9d2Aup39eCLjVg:ensHyjtk2MYC5GDuAoDS
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 一键上号8.0正式版(上不去号切换模式).exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 一键上号8.0正式版(上不去号切换模式).exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\一键上号8.0正式版(上不去号切换模式).exe"C:\Users\Admin\AppData\Local\Temp\一键上号8.0正式版(上不去号切换模式).exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2036
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:228