Overview
overview
10Static
static
10Modules/ffmpeg.exe
windows10-ltsc 2021-x64
3Plugins/sqlite3.dll
windows10-ltsc 2021-x64
5Users/real...51.apk
windows10-ltsc 2021-x64
3res/Lib/7z.dll
windows10-ltsc 2021-x64
3res/Lib/7z.exe
windows10-ltsc 2021-x64
10res/Lib/ApkEditor.jar
windows10-ltsc 2021-x64
1res/Lib/aapt.exe
windows10-ltsc 2021-x64
10res/Lib/apksigner.jar
windows10-ltsc 2021-x64
1res/Lib/apktool.jar
windows10-ltsc 2021-x64
1res/Lib/junk.ps1
windows10-ltsc 2021-x64
3res/Lib/li...ni.dll
windows10-ltsc 2021-x64
3res/Lib/li...-1.dll
windows10-ltsc 2021-x64
3platformBi...32.dll
windows10-ltsc 2021-x64
3platformBi...ge.dll
windows10-ltsc 2021-x64
3platformBi...32.dll
windows10-ltsc 2021-x64
3platformBi...ge.dll
windows10-ltsc 2021-x64
3platformBi...32.dll
windows10-ltsc 2021-x64
3platformBi...ge.dll
windows10-ltsc 2021-x64
3platformBi...ol.bat
windows10-ltsc 2021-x64
3platformBi...ol.jar
windows10-ltsc 2021-x64
1platformBi...ch.dll
windows10-ltsc 2021-x64
3platformBi...wt.dll
windows10-ltsc 2021-x64
3platformBi...db.exe
windows10-ltsc 2021-x64
3platformBi...vm.dll
windows10-ltsc 2021-x64
3platformBi...em.dll
windows10-ltsc 2021-x64
3platformBi...et.dll
windows10-ltsc 2021-x64
3platformBi...er.dll
windows10-ltsc 2021-x64
3platformBi...pe.dll
windows10-ltsc 2021-x64
3platformBi...of.dll
windows10-ltsc 2021-x64
3platformBi...db.exe
windows10-ltsc 2021-x64
3platformBi...nt.dll
windows10-ltsc 2021-x64
3platformBi...sc.dll
windows10-ltsc 2021-x64
3Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
04-01-2025 14:00
Behavioral task
behavioral1
Sample
Modules/ffmpeg.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
Plugins/sqlite3.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral3
Sample
Users/realme 11 Pro 5G/14451.apk
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral4
Sample
res/Lib/7z.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral5
Sample
res/Lib/7z.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral6
Sample
res/Lib/ApkEditor.jar
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral7
Sample
res/Lib/aapt.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral8
Sample
res/Lib/apksigner.jar
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral9
Sample
res/Lib/apktool.jar
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral10
Sample
res/Lib/junk.ps1
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral11
Sample
res/Lib/libaapt2_jni.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral12
Sample
res/Lib/libwinpthread-1.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral13
Sample
platformBinary32/bin/JAWTAccessBridge-32.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral14
Sample
platformBinary32/bin/JAWTAccessBridge.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral15
Sample
platformBinary32/bin/JavaAccessBridge-32.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral16
Sample
platformBinary32/bin/JavaAccessBridge.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral17
Sample
platformBinary32/bin/WindowsAccessBridge-32.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral18
Sample
platformBinary32/bin/WindowsAccessBridge.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral19
Sample
platformBinary32/bin/apktool.bat
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral20
Sample
platformBinary32/bin/apktool.jar
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral21
Sample
platformBinary32/bin/attach.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral22
Sample
platformBinary32/bin/awt.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral23
Sample
platformBinary32/bin/clhsdb.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral24
Sample
platformBinary32/bin/client/jvm.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral25
Sample
platformBinary32/bin/dt_shmem.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral26
Sample
platformBinary32/bin/dt_socket.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral27
Sample
platformBinary32/bin/fontmanager.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral28
Sample
platformBinary32/bin/freetype.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral29
Sample
platformBinary32/bin/hprof.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral30
Sample
platformBinary32/bin/hsdb.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral31
Sample
platformBinary32/bin/instrument.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral32
Sample
platformBinary32/bin/j2pcsc.dll
Resource
win10ltsc2021-20241211-en
General
-
Target
res/Lib/aapt.exe
-
Size
2.3MB
-
MD5
380095ec86872cfcab1e1031a16e4750
-
SHA1
bd5b040d47d16b7847174f9a5ce88732c87aa400
-
SHA256
7f79865298d3abf371d496a29ad9ae1176d52cebd1635d05ef6d87fb770a6989
-
SHA512
7aea4411b7892701dc31a980df8b0331804e3206f72dff5f8dba940b4e6250e85181a6c66b78112ba5c835947b223db81f19443f0fc4292d1e605872d1a47201
-
SSDEEP
49152:ZnsHyjtk2MYC5GDMPNjtbkZdmFxzKyfMKiTYQ0QQQKXQQQQQQQf0Qm:Znsmtk2apNjtQZ8Pfz
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1411052346-3904498293-150013998-1000\Control Panel\International\Geo\Nation aapt.exe -
Executes dropped EXE 2 IoCs
pid Process 448 ._cache_aapt.exe 952 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\????? = "C:\\ProgramData\\Synaptics\\Synaptics.exe" aapt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aapt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_aapt.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ aapt.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3688 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3688 EXCEL.EXE 3688 EXCEL.EXE 3688 EXCEL.EXE 3688 EXCEL.EXE 3688 EXCEL.EXE 3688 EXCEL.EXE 3688 EXCEL.EXE 3688 EXCEL.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1580 wrote to memory of 448 1580 aapt.exe 91 PID 1580 wrote to memory of 448 1580 aapt.exe 91 PID 1580 wrote to memory of 448 1580 aapt.exe 91 PID 1580 wrote to memory of 952 1580 aapt.exe 93 PID 1580 wrote to memory of 952 1580 aapt.exe 93 PID 1580 wrote to memory of 952 1580 aapt.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\res\Lib\aapt.exe"C:\Users\Admin\AppData\Local\Temp\res\Lib\aapt.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\res\Lib\._cache_aapt.exe"C:\Users\Admin\AppData\Local\Temp\res\Lib\._cache_aapt.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:448
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:952
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3688
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations=is-enterprise-managed=no --field-trial-handle=4200,i,15868025601356667099,14629187417892041246,262144 --variations-seed-version --mojo-platform-channel-handle=4260 /prefetch:81⤵PID:1372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
744KB
MD5b2b36f3e560521d53bd607dd291e3c08
SHA1bd06a34548c2a028bd92b9c3e486fa6da9523757
SHA256b950370de86a4496da5959653b7370c9a8ffa6481698d463997951f534442cf9
SHA5123896171d0aad860aca5cb53165757915e7c7f0a4273f0c2815751b9dfbee0ffd6f9b444edc0d9e082686ecd7cfd6ace3d68a4c5bfccd56ae57fa8a00ce8f660f
-
Filesize
21KB
MD5a870376385fabf3511642766a09f53a3
SHA1e001df38a2b9013b9a654b72ceaf66eca6149074
SHA256656887a1cd2de97ea6cd32eb2a7ceb2090c63d4ceff6506e952e8a3e19e8c685
SHA51237910ae66a967a43e62b74a6b972ad657ec1223f17d7d7b1f7dceaec67a355e8d50eb29aa0ce2f892143d16047d8ceba2ad778e3a742758dbe6e3a905d2465b7
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
1.6MB
MD580f136b0642bbc25c7578e0d24d4673b
SHA1883596e63700c45ab0d4d880b883f687f65c2457
SHA256aa18b5646881ff3b8ca9879045a1b4a44e2d5b24fbe14486fc8236789de8237a
SHA5124a95ac6b8d6252b68ccc842e8dd36056d5b0a773a86d4a8234f39cc2195ccec06fc64954655956447dfc27896720c92f8dfa4a39c2bb568c21fcc588723d86fc