Analysis

  • max time kernel
    117s
  • max time network
    129s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    04-01-2025 14:00

General

  • Target

    res/Lib/aapt.exe

  • Size

    2.3MB

  • MD5

    380095ec86872cfcab1e1031a16e4750

  • SHA1

    bd5b040d47d16b7847174f9a5ce88732c87aa400

  • SHA256

    7f79865298d3abf371d496a29ad9ae1176d52cebd1635d05ef6d87fb770a6989

  • SHA512

    7aea4411b7892701dc31a980df8b0331804e3206f72dff5f8dba940b4e6250e85181a6c66b78112ba5c835947b223db81f19443f0fc4292d1e605872d1a47201

  • SSDEEP

    49152:ZnsHyjtk2MYC5GDMPNjtbkZdmFxzKyfMKiTYQ0QQQKXQQQQQQQf0Qm:Znsmtk2apNjtQZ8Pfz

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\res\Lib\aapt.exe
    "C:\Users\Admin\AppData\Local\Temp\res\Lib\aapt.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1580
    • C:\Users\Admin\AppData\Local\Temp\res\Lib\._cache_aapt.exe
      "C:\Users\Admin\AppData\Local\Temp\res\Lib\._cache_aapt.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:448
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:952
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3688
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations=is-enterprise-managed=no --field-trial-handle=4200,i,15868025601356667099,14629187417892041246,262144 --variations-seed-version --mojo-platform-channel-handle=4260 /prefetch:8
    1⤵
      PID:1372

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Synaptics\Synaptics.exe

      Filesize

      744KB

      MD5

      b2b36f3e560521d53bd607dd291e3c08

      SHA1

      bd06a34548c2a028bd92b9c3e486fa6da9523757

      SHA256

      b950370de86a4496da5959653b7370c9a8ffa6481698d463997951f534442cf9

      SHA512

      3896171d0aad860aca5cb53165757915e7c7f0a4273f0c2815751b9dfbee0ffd6f9b444edc0d9e082686ecd7cfd6ace3d68a4c5bfccd56ae57fa8a00ce8f660f

    • C:\Users\Admin\AppData\Local\Temp\10985E00

      Filesize

      21KB

      MD5

      a870376385fabf3511642766a09f53a3

      SHA1

      e001df38a2b9013b9a654b72ceaf66eca6149074

      SHA256

      656887a1cd2de97ea6cd32eb2a7ceb2090c63d4ceff6506e952e8a3e19e8c685

      SHA512

      37910ae66a967a43e62b74a6b972ad657ec1223f17d7d7b1f7dceaec67a355e8d50eb29aa0ce2f892143d16047d8ceba2ad778e3a742758dbe6e3a905d2465b7

    • C:\Users\Admin\AppData\Local\Temp\fpdar6bN.xlsm

      Filesize

      17KB

      MD5

      e566fc53051035e1e6fd0ed1823de0f9

      SHA1

      00bc96c48b98676ecd67e81a6f1d7754e4156044

      SHA256

      8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

      SHA512

      a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

    • C:\Users\Admin\AppData\Local\Temp\res\Lib\._cache_aapt.exe

      Filesize

      1.6MB

      MD5

      80f136b0642bbc25c7578e0d24d4673b

      SHA1

      883596e63700c45ab0d4d880b883f687f65c2457

      SHA256

      aa18b5646881ff3b8ca9879045a1b4a44e2d5b24fbe14486fc8236789de8237a

      SHA512

      4a95ac6b8d6252b68ccc842e8dd36056d5b0a773a86d4a8234f39cc2195ccec06fc64954655956447dfc27896720c92f8dfa4a39c2bb568c21fcc588723d86fc

    • memory/952-102-0x0000000002100000-0x0000000002101000-memory.dmp

      Filesize

      4KB

    • memory/952-179-0x0000000000400000-0x00000000004C0000-memory.dmp

      Filesize

      768KB

    • memory/952-155-0x0000000000400000-0x00000000004C0000-memory.dmp

      Filesize

      768KB

    • memory/952-151-0x0000000002100000-0x0000000002101000-memory.dmp

      Filesize

      4KB

    • memory/952-150-0x0000000000400000-0x00000000004C0000-memory.dmp

      Filesize

      768KB

    • memory/1580-0-0x00000000024F0000-0x00000000024F1000-memory.dmp

      Filesize

      4KB

    • memory/1580-100-0x0000000000400000-0x000000000065A000-memory.dmp

      Filesize

      2.4MB

    • memory/3688-106-0x00007FF893B90000-0x00007FF893BA0000-memory.dmp

      Filesize

      64KB

    • memory/3688-109-0x00007FF8911D0000-0x00007FF8911E0000-memory.dmp

      Filesize

      64KB

    • memory/3688-108-0x00007FF8911D0000-0x00007FF8911E0000-memory.dmp

      Filesize

      64KB

    • memory/3688-107-0x00007FF893B90000-0x00007FF893BA0000-memory.dmp

      Filesize

      64KB

    • memory/3688-103-0x00007FF893B90000-0x00007FF893BA0000-memory.dmp

      Filesize

      64KB

    • memory/3688-105-0x00007FF893B90000-0x00007FF893BA0000-memory.dmp

      Filesize

      64KB

    • memory/3688-104-0x00007FF893B90000-0x00007FF893BA0000-memory.dmp

      Filesize

      64KB