Analysis

  • max time kernel
    148s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    08-01-2025 17:31

General

  • Target

    2025-01-08_06de160b924d40d3e9fa1ec4a7a126bb_avoslocker_hijackloader_luca-stealer.exe

  • Size

    3.1MB

  • MD5

    06de160b924d40d3e9fa1ec4a7a126bb

  • SHA1

    c7e29826c3f4107d3c2494e6bb2a36a7b3a044aa

  • SHA256

    db0e411a92e50a355454661f59b72cba859f17069a246895e3f4f0c3e62cf137

  • SHA512

    87e3a3fba9834253678f69e842b1185ff5510941e91ac4c1a1702e000aa1e5d694e1605f6b3404a97a65f397578fd32da4f8a7987ad9cbb88065ea7ef41fb875

  • SSDEEP

    49152:5dGnsHyjtk2MYC5GDoOU/zXNUfEeXAxhF2rl/IuOryOvKODjj3POMjUfkptVxp/0:TGnsmtk2apOU/jIEeQfoR/IuOFVjUu5W

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 49 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-08_06de160b924d40d3e9fa1ec4a7a126bb_avoslocker_hijackloader_luca-stealer.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-08_06de160b924d40d3e9fa1ec4a7a126bb_avoslocker_hijackloader_luca-stealer.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2568
    • C:\Users\Admin\AppData\Local\Temp\zgokr00.exe
      "C:\Users\Admin\AppData\Local\Temp\zgokr00.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2920
      • C:\Users\Admin\AppData\Roaming\Dibifu_9\vshost32.exe
        "C:\Users\Admin\AppData\Roaming\Dibifu_9\vshost32.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:2712
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del C:\Users\Admin\AppData\Local\Temp\zgokr00.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2344
        • C:\Windows\SysWOW64\choice.exe
          choice /C Y /N /D Y /T 3
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1992
    • C:\Users\Admin\AppData\Local\Temp\.2025-01-08_06de160b924d40d3e9fa1ec4a7a126bb_avoslocker_hijackloader_luca-stealer.exe
      "C:\Users\Admin\AppData\Local\Temp\.2025-01-08_06de160b924d40d3e9fa1ec4a7a126bb_avoslocker_hijackloader_luca-stealer.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2908
      • C:\Users\Admin\AppData\Local\Temp\._cache_.2025-01-08_06de160b924d40d3e9fa1ec4a7a126bb_avoslocker_hijackloader_luca-stealer.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_.2025-01-08_06de160b924d40d3e9fa1ec4a7a126bb_avoslocker_hijackloader_luca-stealer.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2980
        • C:\Users\Admin\AppData\Local\Temp\jds259425513.tmp\._cache_.2025-01-08_06de160b924d40d3e9fa1ec4a7a126bb_avoslocker_hijackloader_luca-stealer.exe
          "C:\Users\Admin\AppData\Local\Temp\jds259425513.tmp\._cache_.2025-01-08_06de160b924d40d3e9fa1ec4a7a126bb_avoslocker_hijackloader_luca-stealer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Modifies system certificate store
          • Suspicious use of SetWindowsHookEx
          PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\._cache_.2025-01-08_06de160b924d40d3e9fa1ec4a7a126bb_avoslocker_hijackloader_luca-stealer.exe

    Filesize

    2.2MB

    MD5

    d6d7f90978a6aa6a4bb1eaa53154881d

    SHA1

    9a2e8a8464bf5b28229faea669f2ae6d6a0973d2

    SHA256

    5cb03fddbe1e55a14282171eb4768a8cffa1d12a7123a63caba364c8f5495a54

    SHA512

    ff8190d9fdc1cee5838c31808bf347af089624c9fe971c10fe8cecfd39a6cafde13dfc82694184e854e9e734d66ae1f0a961fcef4afd8b2740eb2c6afbf51e06

  • C:\Users\Admin\AppData\Local\Temp\jds259425513.tmp\._cache_.2025-01-08_06de160b924d40d3e9fa1ec4a7a126bb_avoslocker_hijackloader_luca-stealer.exe

    Filesize

    1.9MB

    MD5

    a05dbfbe3a88017f1ec5b2abf96ed0ad

    SHA1

    7ee98080fe870e6be5828ab4d82982367532ddb3

    SHA256

    8b73184c395fac04d2dcb40244430a9b9d4e3094a06d8a4d129435e00f147171

    SHA512

    5a600c2984c761b34e1aacaa73c8e6848bdc488a9582c8f30076f883644a93455fc9f57a9bb142ae8607df2e2ef02522e797712ab35a957238865820a115457a

  • C:\Users\Admin\AppData\Local\Temp\jusched.log

    Filesize

    3KB

    MD5

    0686ff8b2faa717dbe0f2c9934acae46

    SHA1

    0eeefcb51d4e98e5636d306172faea4a2e424c7e

    SHA256

    e9b4b93b3c57e3b89abe1972eaecbb1c06096d5227f4d145e3affa54c587d7d6

    SHA512

    3f18cc467976ceb1de79f00a36312edfa48a6bacb663d3c9fc06934b333a47d1af3858b226cc042fd0520d61fbc4605043a18ddae4a0e0cb07e96dfb2c7a9103

  • C:\Users\Admin\AppData\Local\Temp\jusched.log

    Filesize

    32KB

    MD5

    2071d48e8db4cb44cbeea7151f9d7696

    SHA1

    6d408fc968cc513d7730c8b0d232c7428a13feda

    SHA256

    fe147b9ab40fdca340ce0ac48a347b5e6761623323a86ec6e084733d5ede3f90

    SHA512

    cb02518e1d642116822a42875ebd2bc66a2ef38466937411587d725362fd2e9ba67b667f9b38c4984f963c0e40f021cb3d0e1da2a0b3fd88d399a9d77d13775d

  • C:\Users\Admin\AppData\Local\Temp\zgokr00.exe

    Filesize

    182KB

    MD5

    a72fdeb367d01313d3bb84d705928ae3

    SHA1

    5d18508c8e09808c3be38c6ecad0f75198eec5c3

    SHA256

    dc50f43227259376b18c450471ac19a426a21d6ebe5f5bc8b821b053ab0431e6

    SHA512

    46ef2f75d0762dd64e6d102398a506d1c58848dd23e58dc5e28a2dca2992a32f180c86803f8400cbe62ecafe62b059b291871c8c33b16a32003ec67ac99a95b2

  • \Users\Admin\AppData\Local\Temp\.2025-01-08_06de160b924d40d3e9fa1ec4a7a126bb_avoslocker_hijackloader_luca-stealer.exe

    Filesize

    3.0MB

    MD5

    864aaf86f3c22e6370742fab8821f738

    SHA1

    21dc4ce7892765671668d7c2b784b14ef7f7bdd1

    SHA256

    952ec7fec4cfdf64142995052776e8346f082b105cf26c5d0a94995f03582923

    SHA512

    62c32126de48fe890c5aef5152c7146e07c48aaaa01ae6cfe4d122f23f06b1d6756e52efc6ddea01a0936932669d5863acd7688dab3fef89b188c0bc65ec3b73

  • \Users\Admin\AppData\Roaming\Dibifu_9\IconExtractor.dll

    Filesize

    10KB

    MD5

    a21a157e7f27cb80cdd82cdb02dc2da6

    SHA1

    90a8a42d7356f06b1c144e657071461ddb224752

    SHA256

    35ba8730dd874fca3c0348bb38f972c099dbc7ba0f1c9b748dcfebdde1b0004e

    SHA512

    c4c68a9fa6f130526a0a0ec010d92dae38b81aebcf0fa3256b561987aa7b26e98b69bbc2acad4bafdc29ee2e6f714d81583baac2e28a8a25f62045ad84dba2a5

  • memory/2568-1-0x0000000001170000-0x00000000011A4000-memory.dmp

    Filesize

    208KB

  • memory/2568-2-0x00000000748C0000-0x0000000074FAE000-memory.dmp

    Filesize

    6.9MB

  • memory/2568-192-0x00000000748C0000-0x0000000074FAE000-memory.dmp

    Filesize

    6.9MB

  • memory/2568-191-0x00000000748CE000-0x00000000748CF000-memory.dmp

    Filesize

    4KB

  • memory/2568-0-0x00000000748CE000-0x00000000748CF000-memory.dmp

    Filesize

    4KB

  • memory/2712-58-0x00000000003C0000-0x00000000003C8000-memory.dmp

    Filesize

    32KB

  • memory/2712-37-0x0000000000C10000-0x0000000000C44000-memory.dmp

    Filesize

    208KB

  • memory/2908-193-0x0000000000400000-0x00000000006FB000-memory.dmp

    Filesize

    3.0MB

  • memory/2920-66-0x00000000748C0000-0x0000000074FAE000-memory.dmp

    Filesize

    6.9MB

  • memory/2920-18-0x0000000000B90000-0x0000000000BC4000-memory.dmp

    Filesize

    208KB

  • memory/2920-19-0x00000000748C0000-0x0000000074FAE000-memory.dmp

    Filesize

    6.9MB