Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-01-2025 23:32

General

  • Target

    4b9a374c136502529bcafeb728a58a27bd0407fb839add8276fbb15004b50ed3N.exe

  • Size

    2.6MB

  • MD5

    525b2fd46d2aebd8acb6bd4200c79c70

  • SHA1

    f792a76e6223fabbef5060c8e4fd80cd16ec061d

  • SHA256

    4b9a374c136502529bcafeb728a58a27bd0407fb839add8276fbb15004b50ed3

  • SHA512

    4d658a6c3b822c45d8ecaafffd400bf21295703020b61a1a0b57d04a0e1cdc16d7d72bd378d1bee8d44952cd687c83bb6a4e2e6d65c25104a87aa9b6a4d8f04d

  • SSDEEP

    49152:gnsHyjtk2MYC5GDnYolY+iOo7/PpGpL0oh6jgvZ:gnsmtk2aDoCOqpG1fh6jgR

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 26 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b9a374c136502529bcafeb728a58a27bd0407fb839add8276fbb15004b50ed3N.exe
    "C:\Users\Admin\AppData\Local\Temp\4b9a374c136502529bcafeb728a58a27bd0407fb839add8276fbb15004b50ed3N.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:976
    • C:\Users\Admin\AppData\Local\Temp\._cache_4b9a374c136502529bcafeb728a58a27bd0407fb839add8276fbb15004b50ed3N.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_4b9a374c136502529bcafeb728a58a27bd0407fb839add8276fbb15004b50ed3N.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4000
      • \??\c:\users\admin\appdata\local\temp\._cache_4b9a374c136502529bcafeb728a58a27bd0407fb839add8276fbb15004b50ed3n.exe 
        c:\users\admin\appdata\local\temp\._cache_4b9a374c136502529bcafeb728a58a27bd0407fb839add8276fbb15004b50ed3n.exe 
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        PID:4188
      • C:\Users\Admin\AppData\Local\icsys.icn.exe
        C:\Users\Admin\AppData\Local\icsys.icn.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3316
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3728
      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2724
        • \??\c:\users\admin\appdata\local\temp\._cache_synaptics.exe 
          c:\users\admin\appdata\local\temp\._cache_synaptics.exe  InjUpdate
          4⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:3168
        • C:\Users\Admin\AppData\Local\icsys.icn.exe
          C:\Users\Admin\AppData\Local\icsys.icn.exe
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4988
          • \??\c:\windows\system\explorer.exe
            c:\windows\system\explorer.exe
            5⤵
            • Modifies WinLogon for persistence
            • Modifies visiblity of hidden/system files in Explorer
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2940
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              6⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:4024
              • \??\c:\windows\system\svchost.exe
                c:\windows\system\svchost.exe
                7⤵
                • Modifies WinLogon for persistence
                • Modifies visiblity of hidden/system files in Explorer
                • Boot or Logon Autostart Execution: Active Setup
                • Executes dropped EXE
                • Adds Run key to start application
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:216
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe PR
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:2104
                • C:\Windows\SysWOW64\at.exe
                  at 23:34 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4288
                • C:\Windows\SysWOW64\at.exe
                  at 23:35 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1576
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    2.6MB

    MD5

    525b2fd46d2aebd8acb6bd4200c79c70

    SHA1

    f792a76e6223fabbef5060c8e4fd80cd16ec061d

    SHA256

    4b9a374c136502529bcafeb728a58a27bd0407fb839add8276fbb15004b50ed3

    SHA512

    4d658a6c3b822c45d8ecaafffd400bf21295703020b61a1a0b57d04a0e1cdc16d7d72bd378d1bee8d44952cd687c83bb6a4e2e6d65c25104a87aa9b6a4d8f04d

  • C:\Users\Admin\AppData\Local\Temp\._cache_4b9a374c136502529bcafeb728a58a27bd0407fb839add8276fbb15004b50ed3N.exe

    Filesize

    1.9MB

    MD5

    6cab864533a299853f65a2c65d2c013b

    SHA1

    58d06ffffe4e4b14b7eb392a2ce8aa1e9ab27cf9

    SHA256

    2cd738461c8944a57780cbbc426c189599bd7c32ba8b38a56493fb3ba3e2624c

    SHA512

    a49273595d740c17f8b2a0d87e7f9ab89971edb70fe782178cecd44dda9c1a7690d4a777a22ffa98add482f5e538aeba7bfb4279883a1b6b6113513cd7e5814b

  • C:\Users\Admin\AppData\Local\Temp\DE975E00

    Filesize

    22KB

    MD5

    d16fee749896103d86096dc1c476e39c

    SHA1

    672f0859031dfca31cb9ef5eee0de0d3032bdb48

    SHA256

    1bc6e967be290cb7b105e9a5e667dffa8ee4821a458d02d391ed4522cbb70407

    SHA512

    956c5ee2c8b36be1bf309ffe45e559e6ba81f2e87d7fea47ab51cc72323eac5f7ecdbe47cf02c6f5c16b29ee84626fda2cbec09b14873d34f0e740fa32b388bc

  • C:\Users\Admin\AppData\Local\Temp\tKfmYF3F.xlsm

    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Users\Admin\AppData\Local\icsys.icn.exe

    Filesize

    206KB

    MD5

    370a09c146d6836b664651e7d92d3e8d

    SHA1

    eabeb391996a2eda0b30e088cdde381f4b737dd4

    SHA256

    7c0b05b33d7fdc83fb72b7fc9685666e24c7a3846cf33dabd83ab579a296fd40

    SHA512

    98faccdd90d5c9f5ef09ee1184e92d98e89585f7aec0a764af9e23dec0d8aba22bf8071fead54f4a68c60d82de77ff095782f33364cbaf0dddce5a94ce2740c1

  • C:\Users\Admin\AppData\Roaming\mrsys.exe

    Filesize

    206KB

    MD5

    d38bbf6437c6ff36323771adccdd5991

    SHA1

    0b5759c5e96713436faf0e83a8e21f4dbe8e0443

    SHA256

    d0238e6111f7f8e1b0d1c78fe06764f2edf77b1f9a5ad9caf2f9fcb85b3679e2

    SHA512

    61f9210b4ee19feb5f2e0e8c98e9a5c25de3fcde95f144a6c98944d852ca7d66b28a281ab4683908758c3c66a612ff60ec035ee5d4c9e3b26cb86c437a4d326c

  • \??\c:\users\admin\appdata\local\temp\._cache_4b9a374c136502529bcafeb728a58a27bd0407fb839add8276fbb15004b50ed3n.exe 

    Filesize

    1.7MB

    MD5

    408e9726f1a063874b9b841f1a066e7a

    SHA1

    a7bde856807a58ff4278974b28aba0e0b475c6fd

    SHA256

    bc9f40641b7b1652a42939695a79f4b2b2cf109f0c6f7ebeae4a060915fea311

    SHA512

    0efa1d8bfdd881df71d68934898eb76c7e7672d80688aae4b9029c450900490e7fd3a5a801033edb919e05188b222246d1c418907b1b7f8624c3f909c400532b

  • \??\c:\windows\system\explorer.exe

    Filesize

    206KB

    MD5

    ad2b03d7f24b88d8f3b97f356bc8c1b8

    SHA1

    94686bab3cd2af27767aad0965b3ae5fd2847d5c

    SHA256

    27963edc4da48d2d47edcd99b82564aebc4c3475d32700612404f64f5cd3fc05

    SHA512

    5f3c297b32f9f7467a01ba88a4658eca1ff8b27119582927cb14c66af829d727a312643aa9f4ef2cd4c5d7c3e3dad417be3c87a2a4e813b6b9d83809f7723c6b

  • \??\c:\windows\system\spoolsv.exe

    Filesize

    206KB

    MD5

    d9c3f37ccda63450f998ff976d5d2ce5

    SHA1

    27fd95a5558d9976c8bc258f700aa28d4a800b5e

    SHA256

    b3aaa8db6700b90126882b4539f1d75f6828da6790bb0fbc35644cd6f9cd8f93

    SHA512

    8e47caf77bc1653d75bdb2a281798af64c2e44c602d97cf522b5dcf85da15efbb67383b9f5bf545026aebab463e554681afd7725a09018506b3d29c2a6349272

  • \??\c:\windows\system\svchost.exe

    Filesize

    206KB

    MD5

    d8f35e8df3059b502200f1b64a80029b

    SHA1

    9848daa56d28d70932a67a899a9e85353ab8f422

    SHA256

    9917a2fb83c5c89977d702f737a6ba298bd441a9217f3f9ac858b5369c3f3f90

    SHA512

    a97bee081230e7ddd2a2da43477399157ec61baea86cc8b60a5a504060b499bbcdb8d498ed61192da2fdeda91a228144d9e98827f71f8d0d3c193140a5ec655f

  • memory/216-254-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/216-354-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/976-0-0x0000000002450000-0x0000000002451000-memory.dmp

    Filesize

    4KB

  • memory/976-133-0x0000000000400000-0x00000000006A2000-memory.dmp

    Filesize

    2.6MB

  • memory/1552-209-0x00007FFCA0690000-0x00007FFCA06A0000-memory.dmp

    Filesize

    64KB

  • memory/1552-215-0x00007FFC9DFB0000-0x00007FFC9DFC0000-memory.dmp

    Filesize

    64KB

  • memory/1552-214-0x00007FFC9DFB0000-0x00007FFC9DFC0000-memory.dmp

    Filesize

    64KB

  • memory/1552-207-0x00007FFCA0690000-0x00007FFCA06A0000-memory.dmp

    Filesize

    64KB

  • memory/1552-208-0x00007FFCA0690000-0x00007FFCA06A0000-memory.dmp

    Filesize

    64KB

  • memory/1552-210-0x00007FFCA0690000-0x00007FFCA06A0000-memory.dmp

    Filesize

    64KB

  • memory/1552-205-0x00007FFCA0690000-0x00007FFCA06A0000-memory.dmp

    Filesize

    64KB

  • memory/2104-262-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2724-272-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2940-352-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/3316-265-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/3728-135-0x0000000000970000-0x0000000000971000-memory.dmp

    Filesize

    4KB

  • memory/3728-351-0x0000000000400000-0x00000000006A2000-memory.dmp

    Filesize

    2.6MB

  • memory/3728-320-0x0000000000400000-0x00000000006A2000-memory.dmp

    Filesize

    2.6MB

  • memory/3728-319-0x0000000000970000-0x0000000000971000-memory.dmp

    Filesize

    4KB

  • memory/4000-266-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/4000-64-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/4024-248-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/4024-270-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/4188-218-0x000000001D3F0000-0x000000001D48C000-memory.dmp

    Filesize

    624KB

  • memory/4188-199-0x00000000017A0000-0x00000000017A1000-memory.dmp

    Filesize

    4KB

  • memory/4188-217-0x000000001CF20000-0x000000001D3EE000-memory.dmp

    Filesize

    4.8MB

  • memory/4188-267-0x000000001E360000-0x000000001E402000-memory.dmp

    Filesize

    648KB

  • memory/4188-231-0x00000000016E0000-0x00000000016E8000-memory.dmp

    Filesize

    32KB

  • memory/4988-271-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/4988-222-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB