Analysis

  • max time kernel
    110s
  • max time network
    106s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-01-2025 01:30

General

  • Target

    18f7c93f28b9c1a00ff7b5012494ff335517bf540740059f320d3d36bf12946a.exe

  • Size

    1.5MB

  • MD5

    d21dbc4a0f56fd4fc0703c1874913ef5

  • SHA1

    1fa360c7852e06a102f1f93929b94b695d7eccad

  • SHA256

    18f7c93f28b9c1a00ff7b5012494ff335517bf540740059f320d3d36bf12946a

  • SHA512

    79ecec0b3224ba15c24820aa28bfc56fe58a1810dd74aef5d590d5327385330285cae7b96c9660b51c2aafd68eaf4b6b04ba3ba9cd37cef1646e1c35180090a1

  • SSDEEP

    12288:SMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9OR2atPultPuaxL:SnsJ39LyjbJkQFMhmC+6GD92hUxR

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18f7c93f28b9c1a00ff7b5012494ff335517bf540740059f320d3d36bf12946a.exe
    "C:\Users\Admin\AppData\Local\Temp\18f7c93f28b9c1a00ff7b5012494ff335517bf540740059f320d3d36bf12946a.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2516
    • C:\Users\Admin\AppData\Local\Temp\._cache_18f7c93f28b9c1a00ff7b5012494ff335517bf540740059f320d3d36bf12946a.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_18f7c93f28b9c1a00ff7b5012494ff335517bf540740059f320d3d36bf12946a.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2068
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2664
      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2728
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    1.5MB

    MD5

    d21dbc4a0f56fd4fc0703c1874913ef5

    SHA1

    1fa360c7852e06a102f1f93929b94b695d7eccad

    SHA256

    18f7c93f28b9c1a00ff7b5012494ff335517bf540740059f320d3d36bf12946a

    SHA512

    79ecec0b3224ba15c24820aa28bfc56fe58a1810dd74aef5d590d5327385330285cae7b96c9660b51c2aafd68eaf4b6b04ba3ba9cd37cef1646e1c35180090a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d12a9a03fe30bacf967652ed56d04007

    SHA1

    27cb97954100a183961e8451975db2eb8a435d63

    SHA256

    b7ffd9e2653635bdc95859b798390a14da0d91ab7816cb348526fe766e017f72

    SHA512

    573acb34e560455f101c75cf6931a6a3a8514f68f7446a5b82886d9cc93539e0ec3380a31138386487334b4f80db39313185e208fa7a9717834c5fb27b05c09a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1f9ec4125c723f4b501a1c29c6154163

    SHA1

    7d4ae546981107c76b16bdc6d782c57f980908a3

    SHA256

    e7a4b51182c03082affcf2eb95f6a2105fc4adf6a085f761c50d99a3e4456b98

    SHA512

    c3e4ef3951b64d010fc931f2929c271101c83d4c15b4166ceb219d3d6716809efc2ab5182485fa221716de9cd8774b84eacb004786ad3452cc359c39c49e2909

  • C:\Users\Admin\AppData\Local\Temp\AQOH31nN.xlsm

    Filesize

    23KB

    MD5

    e9cf44fa86e9d9e7facdcb04cf018ad8

    SHA1

    34375286601318786ae9051908b2069ddbbb9847

    SHA256

    9fdc3fde9b080d861563799d778a59d26da9d072d4b649a3c9a1732e9311a84b

    SHA512

    96e3cb5c18cda06263d2beb98c43cd238a48326eff7f70d3eaa74405415f3bfe262673aba35530d961d15958ffe16f77589247152187d09794011a172d8525b1

  • C:\Users\Admin\AppData\Local\Temp\AQOH31nN.xlsm

    Filesize

    25KB

    MD5

    0a0d27a59712125015a7c5d9385a6e9c

    SHA1

    b9dcf480304fbbe939e5d4161c55e21dbd829e3f

    SHA256

    95a9ea7910026b1d5c4a1809d83c06e6907e933ce8f062b25175c442bda0b684

    SHA512

    c3c8b29908b38c9e057b4214533ceb0a37ff0cc929e065edc0744b59ddc08bf829f39d96b80220c771e865d0365669952ecc71ccb3178e3f53df9d09d71332d4

  • C:\Users\Admin\AppData\Local\Temp\AQOH31nN.xlsm

    Filesize

    21KB

    MD5

    d64f8031ffb559e5b7751cff5d2ff206

    SHA1

    90eaea0b23d99724eb65aafc87397077d82ef237

    SHA256

    dde3f27255c6f1785513c9f28ad63fccef56ea3d6439dbe2adcee29cd7eb9bd6

    SHA512

    47b945977c597faa6d9fbcf47472ece7689c7d16e11a5d071ebbb3e7118689f8c85aeaa37c38a696001a2bc54f319ab764ee77bb610e55c376ac5b62eef20a5f

  • C:\Users\Admin\AppData\Local\Temp\AQOH31nN.xlsm

    Filesize

    21KB

    MD5

    19ef792a5880324682ecbf059b6b2991

    SHA1

    c5d17d40237a2acffc43038f96dd8a34670d485c

    SHA256

    a8342d5149d5f83b8dfd76a3d9eb19986fbc10a8ff4c6d27978e61a872dac7f5

    SHA512

    2b9865175824b5b0047548250dd23516b84a7218b66872fcc2577ffedffe366215a67fcf13cd8646e2dc7fdfe6cb4607426aa0d35f87de04e52c158d446e7f80

  • C:\Users\Admin\AppData\Local\Temp\AQOH31nN.xlsm

    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Users\Admin\AppData\Local\Temp\AQOH31nN.xlsm

    Filesize

    26KB

    MD5

    0d1ef08d145b4bbc7ed2d571459892ad

    SHA1

    e4e6ae184002fee7bcc769bbd9cb80aaf213dc7e

    SHA256

    18b2492862a264177691b2f9855308483c0c9b587d4d6bd92bb8bab3eb6821d7

    SHA512

    c25f2a10c95e72132d72c2b2570f5ebb17e875880310296d400e01cda5c9dc41ddc061bdf3fe23edf1971ddd420fbb526fcf4d4edd56e8fd3d4338c0525364d2

  • C:\Users\Admin\AppData\Local\Temp\CabC534.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC5E1.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\Desktop\~$OpenBackup.xlsx

    Filesize

    165B

    MD5

    ff09371174f7c701e75f357a187c06e8

    SHA1

    57f9a638fd652922d7eb23236c80055a91724503

    SHA256

    e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8

    SHA512

    e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882

  • \Users\Admin\AppData\Local\Temp\._cache_18f7c93f28b9c1a00ff7b5012494ff335517bf540740059f320d3d36bf12946a.exe

    Filesize

    771KB

    MD5

    219ae5867a6b114d747a04659a9da0f4

    SHA1

    6aad9485e3232f94880d03cdf5bb89ddbdb57d60

    SHA256

    3393141632520238f5cbb6bc188463124bc2e2d1bf23ddc9d6de69482695842b

    SHA512

    4194ec2057e3249b71782555aeff518a05001643ab9c5d0bba317c7806c120eb0d6ece6e2a44ca2f742c5dab58952160520ae53906939bbd732cf0b2f591938d

  • memory/2068-18-0x0000000000E90000-0x0000000000F56000-memory.dmp

    Filesize

    792KB

  • memory/2516-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2516-26-0x0000000000400000-0x0000000000583000-memory.dmp

    Filesize

    1.5MB

  • memory/2664-99-0x0000000000400000-0x0000000000583000-memory.dmp

    Filesize

    1.5MB

  • memory/2664-188-0x0000000000400000-0x0000000000583000-memory.dmp

    Filesize

    1.5MB

  • memory/2664-189-0x0000000000400000-0x0000000000583000-memory.dmp

    Filesize

    1.5MB

  • memory/2664-223-0x0000000000400000-0x0000000000583000-memory.dmp

    Filesize

    1.5MB

  • memory/2728-36-0x0000000000F80000-0x0000000001046000-memory.dmp

    Filesize

    792KB

  • memory/2832-100-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2832-187-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB