Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-01-2025 12:34

General

  • Target

    44cf972df985f247a432f697c3027eb3c3442d3d205fa104675435818786de4eN.exe

  • Size

    1.5MB

  • MD5

    1940f421969441cb34907d5efd734fc0

  • SHA1

    17cd0de8a0d3d66ad4998c435c1c7151fa1a620a

  • SHA256

    44cf972df985f247a432f697c3027eb3c3442d3d205fa104675435818786de4e

  • SHA512

    844c573879f6e50cd6f744bfa04fa4165f8385102a1a48cfe78e792f57c1f7a6f6967f3047e570a45872b53531efb5750897c22f8af431b510f0698a983c3f97

  • SSDEEP

    12288:SMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9OR2atPultPuaxj:SnsJ39LyjbJkQFMhmC+6GD92hUxZ

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44cf972df985f247a432f697c3027eb3c3442d3d205fa104675435818786de4eN.exe
    "C:\Users\Admin\AppData\Local\Temp\44cf972df985f247a432f697c3027eb3c3442d3d205fa104675435818786de4eN.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Users\Admin\AppData\Local\Temp\._cache_44cf972df985f247a432f697c3027eb3c3442d3d205fa104675435818786de4eN.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_44cf972df985f247a432f697c3027eb3c3442d3d205fa104675435818786de4eN.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2120
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2632
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    1.5MB

    MD5

    1940f421969441cb34907d5efd734fc0

    SHA1

    17cd0de8a0d3d66ad4998c435c1c7151fa1a620a

    SHA256

    44cf972df985f247a432f697c3027eb3c3442d3d205fa104675435818786de4e

    SHA512

    844c573879f6e50cd6f744bfa04fa4165f8385102a1a48cfe78e792f57c1f7a6f6967f3047e570a45872b53531efb5750897c22f8af431b510f0698a983c3f97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dcc03f7040fcb5c46648b18677a82ddb

    SHA1

    bcc1ddec7055c9bc7223b150b9badb193027a180

    SHA256

    a0dfa059f7754198562896c877a43ba99cf9e81442a507d503db1e4829d54eb7

    SHA512

    e12f7ec3a2df097e40c02df93c09d07e39304900bf4fd78095b0623bee5535fa2848ba93ade3d7d824af79e34abbd62080bdea44bb32e37c409fe57944fbc271

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    de7131bbac3edf06114239d7eff904f2

    SHA1

    b0e864d7ee4eba3f45cf33d5ec75edc71f334a3d

    SHA256

    8f6da5631d2eae27974dc0b1ece916efc7d76fb4783f02ea0d2d2d4791dd8f9d

    SHA512

    e978dfb5f6a3b9210589191684d384ea2096e64de82b974a26f7ba33115d32223818cbf31fbe1279843bd33b27f5440bd048cf95b95f4c124ef1e7ae28b83006

  • C:\Users\Admin\AppData\Local\Temp\._cache_44cf972df985f247a432f697c3027eb3c3442d3d205fa104675435818786de4eN.exe

    Filesize

    771KB

    MD5

    219ae5867a6b114d747a04659a9da0f4

    SHA1

    6aad9485e3232f94880d03cdf5bb89ddbdb57d60

    SHA256

    3393141632520238f5cbb6bc188463124bc2e2d1bf23ddc9d6de69482695842b

    SHA512

    4194ec2057e3249b71782555aeff518a05001643ab9c5d0bba317c7806c120eb0d6ece6e2a44ca2f742c5dab58952160520ae53906939bbd732cf0b2f591938d

  • C:\Users\Admin\AppData\Local\Temp\CabF567.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF5D7.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\ucb7urnA.xlsm

    Filesize

    28KB

    MD5

    0ffaf7737bd8f8e74de535a27339a6e3

    SHA1

    7192267d37f28d2bb9cdb44592b2692671ee5d3b

    SHA256

    f05de9df1717d474fc92f6e3f3d48678b4c53c0d9cc9a89f9f1b824377abc43d

    SHA512

    c8a758584af560fd3a48092d72b4e32f98ff3585931e57fca2c48d6e8e0922697e1a27be2f45ffcaed4b30edf77c9a6e334873554e9c7d8991561dc607a77383

  • C:\Users\Admin\AppData\Local\Temp\ucb7urnA.xlsm

    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Users\Admin\AppData\Local\Temp\ucb7urnA.xlsm

    Filesize

    33KB

    MD5

    3f43d954cdc3e5702767cf7ec3a86466

    SHA1

    11d5dd74800ac298984db6523d1ee22ed8a96f8b

    SHA256

    7a696645722d5ba3c9b976ac95c6e6a8900b5e032946b4b6bf31b290e2d5a66f

    SHA512

    c9b027845cfb90393f8eec756d79eaec9d764e3cb6da62ebd9237e212895b67d2b20c0a08c93729f7c5249a9f654fc9f8f3e86a9da57978aedcde22e85fcae55

  • C:\Users\Admin\AppData\Local\Temp\ucb7urnA.xlsm

    Filesize

    31KB

    MD5

    56e84d2e0a98e37f8ed69d08bdc4797e

    SHA1

    a1bcb03c66e4a3305260093b895641168f75ed65

    SHA256

    4bc2f3ee38b9a0505fd3505850acb0443b7dd29917be650ed29b73365ec0b9d9

    SHA512

    99b131ea65b0c0d2d96b8c50930f33439c67bca9da1eba9a99e190bc57ff21033dc5a64aeeffe39437af383351895ed892e7834ca7d89ebc2ea935fe234beb19

  • C:\Users\Admin\AppData\Local\Temp\ucb7urnA.xlsm

    Filesize

    31KB

    MD5

    7c49449d41eeee26b1e34a98f7bd7de4

    SHA1

    6a1ea8090679229c4c5782e03643c48bf605d3d9

    SHA256

    211080ff19fe1dc694824a5d56a0b5953169d25cfac76ddac5dbb81d4a2b4f41

    SHA512

    b3da084f41ee1791c54ea4ebd64bff20d0083c2ec12337c097d0d23096289c01df2145ba817ee0c07ec0bda41ba59891f88c2629015cd3ede7420bc7c70d4f7d

  • C:\Users\Admin\Downloads\~$InvokeRepair.xlsx

    Filesize

    165B

    MD5

    ff09371174f7c701e75f357a187c06e8

    SHA1

    57f9a638fd652922d7eb23236c80055a91724503

    SHA256

    e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8

    SHA512

    e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882

  • memory/2120-28-0x00000000001A0000-0x0000000000266000-memory.dmp

    Filesize

    792KB

  • memory/2632-36-0x0000000000F90000-0x0000000001056000-memory.dmp

    Filesize

    792KB

  • memory/2672-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2672-25-0x0000000000400000-0x0000000000583000-memory.dmp

    Filesize

    1.5MB

  • memory/2728-179-0x0000000000400000-0x0000000000583000-memory.dmp

    Filesize

    1.5MB

  • memory/2728-214-0x0000000000400000-0x0000000000583000-memory.dmp

    Filesize

    1.5MB

  • memory/2736-37-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB