Analysis

  • max time kernel
    141s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-01-2025 18:42

General

  • Target

    SECURE BYTE GUI.exe

  • Size

    3.0MB

  • MD5

    5fa89257ffe3d63a516c62da039d0750

  • SHA1

    b059c9c996cad2ba4abc6b60ee666c2e6f76fa7a

  • SHA256

    610ff05c8f1526b31828d9686e0253067a243f6a9699e5d5e5042d9093b91e67

  • SHA512

    9582af140de025dff2a382c07bcd9d731ac90812fa407fdf25b1d9ce323c024d3227a135e1253a81c4dabd3828e779fc249feceb2da246d8f712df4c668986f4

  • SSDEEP

    49152:ensHyjtk2MYC5GDr137myorpRvFDTNYksUu0hQuE:ensmtk2aTWP

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SECURE BYTE GUI.exe
    "C:\Users\Admin\AppData\Local\Temp\SECURE BYTE GUI.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:812
    • C:\Users\Admin\AppData\Local\Temp\._cache_SECURE BYTE GUI.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_SECURE BYTE GUI.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1616
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 628
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2948
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2260
      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2720
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 624
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2356
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    3.0MB

    MD5

    5fa89257ffe3d63a516c62da039d0750

    SHA1

    b059c9c996cad2ba4abc6b60ee666c2e6f76fa7a

    SHA256

    610ff05c8f1526b31828d9686e0253067a243f6a9699e5d5e5042d9093b91e67

    SHA512

    9582af140de025dff2a382c07bcd9d731ac90812fa407fdf25b1d9ce323c024d3227a135e1253a81c4dabd3828e779fc249feceb2da246d8f712df4c668986f4

  • C:\Users\Admin\AppData\Local\Temp\BAvZHAhp.xlsm

    Filesize

    28KB

    MD5

    2bb4ef89a1bd6bad83600e0d76eb6476

    SHA1

    af0ea47e6c61e39134609d6009298f6070497910

    SHA256

    c493afed2bbe654592225c9d9e28e75f0d45d6f7129e9bd71d80d93e990bb18c

    SHA512

    fd2c88f5bad0c59621fd584efb555f3c5ab941a1d4100d919b88b1fd27d15cc1e4d9e836d949281ca0764f5a0a9ed2f27820ecdd1f57d91b85e7d4d8df1e4964

  • C:\Users\Admin\AppData\Local\Temp\BAvZHAhp.xlsm

    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Users\Admin\AppData\Local\Temp\BAvZHAhp.xlsm

    Filesize

    22KB

    MD5

    87f36bc6c264442a10b89135d68688f8

    SHA1

    2c2c6518290edb9319c1ee4795c895ffd9363a4c

    SHA256

    223524625019f27a3b2caaab21d89e3a73285866289c364f277dc41c9b76ac42

    SHA512

    79cbcf20418f7f3e415cd65f2580dfeb44e8661ae444ac469aa5e7f9341fce1588afb1b0b04482d98d397dd4acf1e2960a320132fb7bc5c06e9fef42e79006b0

  • \Users\Admin\AppData\Local\Temp\._cache_SECURE BYTE GUI.exe

    Filesize

    2.3MB

    MD5

    e6da7106c6b97b3d5015aa402daa57ee

    SHA1

    5663c196b2a974a0d95d1101be10c4bddf9c7fa6

    SHA256

    7579295e68c78cc770ab66e5adf53cbeb6c11a968158f79313f2a39f42fa19b3

    SHA512

    8d59dab5ad918ac7ef5ce0be00b19c2d25d45ac1889492fff59cdcc5ab5df6f00fba6611fa0fdae44018580115d68cc64003d79b2ebfb8d8b59a31e3067ff6fc

  • memory/812-26-0x0000000000400000-0x0000000000709000-memory.dmp

    Filesize

    3.0MB

  • memory/812-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1616-78-0x0000000000E70000-0x00000000010BC000-memory.dmp

    Filesize

    2.3MB

  • memory/2260-104-0x0000000000400000-0x0000000000709000-memory.dmp

    Filesize

    3.0MB

  • memory/2260-105-0x0000000000400000-0x0000000000709000-memory.dmp

    Filesize

    3.0MB

  • memory/2260-137-0x0000000000400000-0x0000000000709000-memory.dmp

    Filesize

    3.0MB

  • memory/2708-37-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2708-93-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2720-38-0x0000000000350000-0x000000000059C000-memory.dmp

    Filesize

    2.3MB