Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-01-2025 19:22

General

  • Target

    2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe

  • Size

    20.9MB

  • MD5

    6cb693db239cbe4ace20488191cd0f6a

  • SHA1

    5fc1473386f9bf520ace7600c6b1b8aba976b6bf

  • SHA256

    e7829ce1e9faac6902ced6066882fb01e881c8e92c64d02251f9adaa0ad43262

  • SHA512

    bd01bf4755203ab0b4726fc4386536bb6d9c16f1cfd80ccb0e529682a2faf202d885f4980cecb85f43d8cce7c6c468514291765867af5b6218701d518a0005fc

  • SSDEEP

    393216:7p8aaGp8aakp8aamp8aa/p8aa5p8aaDp8aa9p8aaXp8aahp8aa:Vxaixa4xaCxahxazxadxa/xa5xabxa

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Extracted

Family

remcos

Botnet

ABILLION+NAIRA

C2

nzobaku.ddns.net:8081

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-S0L1LJ

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2852
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\BLznCuyzwk.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2636
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BLznCuyzwk" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9F4B.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:2520
    • C:\Users\Admin\AppData\Local\Temp\2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe
      "C:\Users\Admin\AppData\Local\Temp\2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:484
      • C:\Users\Admin\AppData\Local\Temp\._cache_2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2824
      • C:\ProgramData\Synaptics\Synaptics.exe
        "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1700
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Synaptics\Synaptics.exe"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2400
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\BLznCuyzwk.exe"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1716
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BLznCuyzwk" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF6FC.tmp"
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:2240
        • C:\ProgramData\Synaptics\Synaptics.exe
          "C:\ProgramData\Synaptics\Synaptics.exe"
          4⤵
          • Executes dropped EXE
          PID:3048
        • C:\ProgramData\Synaptics\Synaptics.exe
          "C:\ProgramData\Synaptics\Synaptics.exe"
          4⤵
          • Executes dropped EXE
          PID:1832
        • C:\ProgramData\Synaptics\Synaptics.exe
          "C:\ProgramData\Synaptics\Synaptics.exe"
          4⤵
          • Executes dropped EXE
          PID:1544
        • C:\ProgramData\Synaptics\Synaptics.exe
          "C:\ProgramData\Synaptics\Synaptics.exe"
          4⤵
          • Executes dropped EXE
          PID:1976
        • C:\ProgramData\Synaptics\Synaptics.exe
          "C:\ProgramData\Synaptics\Synaptics.exe"
          4⤵
          • Executes dropped EXE
          PID:1068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    20.9MB

    MD5

    6cb693db239cbe4ace20488191cd0f6a

    SHA1

    5fc1473386f9bf520ace7600c6b1b8aba976b6bf

    SHA256

    e7829ce1e9faac6902ced6066882fb01e881c8e92c64d02251f9adaa0ad43262

    SHA512

    bd01bf4755203ab0b4726fc4386536bb6d9c16f1cfd80ccb0e529682a2faf202d885f4980cecb85f43d8cce7c6c468514291765867af5b6218701d518a0005fc

  • C:\ProgramData\remcos\logs.dat

    Filesize

    144B

    MD5

    f543c061617e9700982b7facbbe7c143

    SHA1

    10e3392259a8fff6d48586641c204f84cb2e5563

    SHA256

    21cf122cbeff2731576b01fea0a2c56c21f74de3cd1673dde0a93b5615edf12c

    SHA512

    eba61fde23d384d22783ebe7a613381816054bdc97bf587caea21659822ec430fd8a857470fd9b830eb1c4ec5b1a867fc557f684d90c2762d9e50a72df82a15b

  • C:\Users\Admin\AppData\Local\Temp\tmp9F4B.tmp

    Filesize

    1KB

    MD5

    7daa0e3c6f21a9f3adbbe29b2692c23f

    SHA1

    52b57abdd1d42e34ebf28fa2f2320e4789770e16

    SHA256

    06d73eb702e143cda4be2bd2a2d84482d3982dcf9f143fb6373cca16b8ab35d2

    SHA512

    5d81a3a9bfbfe5a2761b2bfe334e3b5545cd347654e00f8ec8b9a3e5d1f2b127daaa71bf02785274165f3653c7f9a03dc1f2616b02290195fd1642b16f7ee475

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\QT4E5H3LKI5OS7BOJIWL.temp

    Filesize

    7KB

    MD5

    a004d73e4ce3e2a7001a74b355274bde

    SHA1

    3aea21d2ff356cb90b7dae17ef882bdef8a351e0

    SHA256

    84a86624067d9bdbec99aade789072d3a0ed93769ba2a130e676f66a30b13852

    SHA512

    b8567a7395ed83ae16f019786c1489733ae7b139c586fa5008dfa76ab3a80dce67fd0009e470bc8dc835db700e86c12da2c4496fac9696c0754932b4d2a038b1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    dbd6bbfa274870d5ad812c34d1b954e3

    SHA1

    4339c56f6db346d02600e135759cf94317279ee0

    SHA256

    f068037e9286a1b40a85565610cf2835f3e6df9b7c3a04be1f4def05a25c6b54

    SHA512

    977a60c2fcb0f996d2cc5d3265f6d90905684e1dcc385f5ca3225ff3f085901d2d5788b6e5cac4067b77d4f63436a017c8e020724fb692f6c3746bd5e5f74b23

  • \Users\Admin\AppData\Local\Temp\._cache_2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe

    Filesize

    483KB

    MD5

    f3b57ccad1c0a308635e17aa591e4038

    SHA1

    ca67ad3c74523b844fc23563f7b288f0389fd645

    SHA256

    5ad6b9a917f35be0a1d66c771069c2143ad765737eedd85436acbc0f95a4c0e7

    SHA512

    5ed754a1b254e8a4b03e0445ac0081c94aaf179c2974827ce4ff10b7deb765d819243b2084212d7c91be9ddc07bf94f55e35f85564781b4124b61647a2f0977a

  • memory/484-25-0x0000000000400000-0x000000000053B000-memory.dmp

    Filesize

    1.2MB

  • memory/484-35-0x0000000000400000-0x000000000053B000-memory.dmp

    Filesize

    1.2MB

  • memory/484-30-0x0000000000400000-0x000000000053B000-memory.dmp

    Filesize

    1.2MB

  • memory/484-23-0x0000000000400000-0x000000000053B000-memory.dmp

    Filesize

    1.2MB

  • memory/484-21-0x0000000000400000-0x000000000053B000-memory.dmp

    Filesize

    1.2MB

  • memory/484-20-0x0000000000400000-0x000000000053B000-memory.dmp

    Filesize

    1.2MB

  • memory/484-33-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/484-27-0x0000000000400000-0x000000000053B000-memory.dmp

    Filesize

    1.2MB

  • memory/484-34-0x0000000000400000-0x000000000053B000-memory.dmp

    Filesize

    1.2MB

  • memory/484-31-0x0000000000400000-0x000000000053B000-memory.dmp

    Filesize

    1.2MB

  • memory/1700-62-0x0000000000070000-0x0000000001556000-memory.dmp

    Filesize

    20.9MB

  • memory/2672-6-0x0000000006480000-0x00000000065FE000-memory.dmp

    Filesize

    1.5MB

  • memory/2672-5-0x00000000747F0000-0x0000000074EDE000-memory.dmp

    Filesize

    6.9MB

  • memory/2672-0-0x00000000747FE000-0x00000000747FF000-memory.dmp

    Filesize

    4KB

  • memory/2672-38-0x00000000747F0000-0x0000000074EDE000-memory.dmp

    Filesize

    6.9MB

  • memory/2672-4-0x00000000747FE000-0x00000000747FF000-memory.dmp

    Filesize

    4KB

  • memory/2672-3-0x0000000000900000-0x0000000000918000-memory.dmp

    Filesize

    96KB

  • memory/2672-2-0x00000000747F0000-0x0000000074EDE000-memory.dmp

    Filesize

    6.9MB

  • memory/2672-1-0x0000000000920000-0x0000000001E06000-memory.dmp

    Filesize

    20.9MB