Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-01-2025 20:21

General

  • Target

    4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe

  • Size

    2.6MB

  • MD5

    0114727c340e4ff952938ff19491b098

  • SHA1

    72bd39f695b9580c76382e5d91b337f27c951dca

  • SHA256

    4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb

  • SHA512

    43047984f8f8a391133194d7d203b2e5efb55410abc7e8faa057c2b7695513963a28bfb822775d68263934f20b2c8b73d43a4dc67208329e4d435f6e2ef9a4db

  • SSDEEP

    49152:gnsHyjtk2MYC5GDnYolY+iOo7/PpGpL0oh6jgvp:gnsmtk2aDoCOqpG1fh6jgh

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 24 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe
    "C:\Users\Admin\AppData\Local\Temp\4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1488
    • C:\Users\Admin\AppData\Local\Temp\._cache_4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2708
      • \??\c:\users\admin\appdata\local\temp\._cache_4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe 
        c:\users\admin\appdata\local\temp\._cache_4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe 
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        PID:4816
      • C:\Users\Admin\AppData\Local\icsys.icn.exe
        C:\Users\Admin\AppData\Local\icsys.icn.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2004
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:964
      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:5080
        • \??\c:\users\admin\appdata\local\temp\._cache_synaptics.exe 
          c:\users\admin\appdata\local\temp\._cache_synaptics.exe  InjUpdate
          4⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:4604
        • C:\Users\Admin\AppData\Local\icsys.icn.exe
          C:\Users\Admin\AppData\Local\icsys.icn.exe
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1832
          • \??\c:\windows\system\explorer.exe
            c:\windows\system\explorer.exe
            5⤵
            • Modifies WinLogon for persistence
            • Modifies visiblity of hidden/system files in Explorer
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2028
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              6⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:3756
              • \??\c:\windows\system\svchost.exe
                c:\windows\system\svchost.exe
                7⤵
                • Modifies WinLogon for persistence
                • Modifies visiblity of hidden/system files in Explorer
                • Boot or Logon Autostart Execution: Active Setup
                • Executes dropped EXE
                • Adds Run key to start application
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:4528
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe PR
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:2180
                • C:\Windows\SysWOW64\at.exe
                  at 20:34 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4464
                • C:\Windows\SysWOW64\at.exe
                  at 20:35 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3940
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    2.6MB

    MD5

    0114727c340e4ff952938ff19491b098

    SHA1

    72bd39f695b9580c76382e5d91b337f27c951dca

    SHA256

    4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb

    SHA512

    43047984f8f8a391133194d7d203b2e5efb55410abc7e8faa057c2b7695513963a28bfb822775d68263934f20b2c8b73d43a4dc67208329e4d435f6e2ef9a4db

  • C:\Users\Admin\AppData\Local\Temp\._cache_4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe

    Filesize

    1.9MB

    MD5

    6cab864533a299853f65a2c65d2c013b

    SHA1

    58d06ffffe4e4b14b7eb392a2ce8aa1e9ab27cf9

    SHA256

    2cd738461c8944a57780cbbc426c189599bd7c32ba8b38a56493fb3ba3e2624c

    SHA512

    a49273595d740c17f8b2a0d87e7f9ab89971edb70fe782178cecd44dda9c1a7690d4a777a22ffa98add482f5e538aeba7bfb4279883a1b6b6113513cd7e5814b

  • C:\Users\Admin\AppData\Local\Temp\C3C75E00

    Filesize

    23KB

    MD5

    dadf32f5f12d0758fc49a94ab509c6f8

    SHA1

    42158405dbbd264d657ce3c1d96b901061101167

    SHA256

    eb9e6a90158249b31f029acbae97535055211ea890cf5f2bcb79974c7bbe6146

    SHA512

    81c4f7cd515fe80fafa88e7dd8de4d8aeabe16fcab68fdfef5390d847de23ca229b6c9cee75a204c6e3b4ba882bb6247a351daf7003e5182f27c53d2aa82cbcb

  • C:\Users\Admin\AppData\Local\Temp\PFLqdyUf.xlsm

    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Users\Admin\AppData\Local\icsys.icn.exe

    Filesize

    206KB

    MD5

    370a09c146d6836b664651e7d92d3e8d

    SHA1

    eabeb391996a2eda0b30e088cdde381f4b737dd4

    SHA256

    7c0b05b33d7fdc83fb72b7fc9685666e24c7a3846cf33dabd83ab579a296fd40

    SHA512

    98faccdd90d5c9f5ef09ee1184e92d98e89585f7aec0a764af9e23dec0d8aba22bf8071fead54f4a68c60d82de77ff095782f33364cbaf0dddce5a94ce2740c1

  • C:\Users\Admin\AppData\Roaming\mrsys.exe

    Filesize

    206KB

    MD5

    f7c8de8f41e4ef1dd8e0df12497feada

    SHA1

    4272fdbe659cf53f7051c2fb5a588d746bd00dca

    SHA256

    903d2642ba462a0a665bb9e4a58b13f5b48ba61f92629f343b3ff5f2bd57b994

    SHA512

    8590d689f43ab9764e74641fc6f439fe5cffbe0a36300da6493515c59470a6057482efe1e83e765408777e4da256b53fe7dc95535dede8317651e0b6cbea78cc

  • C:\Windows\System\explorer.exe

    Filesize

    206KB

    MD5

    ce2b169f380ca1f0ce5b4f6b88403ac8

    SHA1

    55d1881fe5d1ccdcc8517e229bb7ca0e4f01ca77

    SHA256

    ed01d9052095d5856be99453e9dd2d5e29f78d658cf413d938d13c592c101bb6

    SHA512

    681ea78bd4c49367a25b852deea576efa32172e35789ef70bc6b6561a651a6881a2440f671a710e5ed997048ae8d65edb89b1a7eec8706b4b6574164ffb169f0

  • C:\Windows\System\svchost.exe

    Filesize

    206KB

    MD5

    68f5314be20128ea9839f1b423ccb317

    SHA1

    05c88c214431c4a52d563d132ed365dbd2ba44a1

    SHA256

    276afb77f794284b6ffc3daea299e1ae7d5a46443a51546a126b46a8d27b76ec

    SHA512

    a53e767a10776e6f0c9da602aff444fdd0ccb4f426059622c52a7e7cb1e71541aaddee0e42276691a40ef0a8ec65727778e503a67d8f5103630db13bbecfd2ae

  • \??\c:\users\admin\appdata\local\temp\._cache_4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe 

    Filesize

    1.7MB

    MD5

    408e9726f1a063874b9b841f1a066e7a

    SHA1

    a7bde856807a58ff4278974b28aba0e0b475c6fd

    SHA256

    bc9f40641b7b1652a42939695a79f4b2b2cf109f0c6f7ebeae4a060915fea311

    SHA512

    0efa1d8bfdd881df71d68934898eb76c7e7672d80688aae4b9029c450900490e7fd3a5a801033edb919e05188b222246d1c418907b1b7f8624c3f909c400532b

  • \??\c:\windows\system\spoolsv.exe

    Filesize

    206KB

    MD5

    61a8ed0d8e6dcf0609a3e08b4c516df8

    SHA1

    c5ba8e2d7e50b3c0298c8e8c78c01541b5e2cf96

    SHA256

    96e11bf0b23212d34ce65b28c3dd80ed93e0d61f4fbe393ad485ff02eb7023c8

    SHA512

    65dc43b9ef42ee467fde4328df244fc955fbf14cc02688bb17da8467c52be66040f32f7517a9795f28f026844d90eac01938c94e5432f7a8703c56b03fe6cf75

  • memory/832-214-0x00007FFF9DD30000-0x00007FFF9DD40000-memory.dmp

    Filesize

    64KB

  • memory/832-209-0x00007FFFA0550000-0x00007FFFA0560000-memory.dmp

    Filesize

    64KB

  • memory/832-206-0x00007FFFA0550000-0x00007FFFA0560000-memory.dmp

    Filesize

    64KB

  • memory/832-205-0x00007FFFA0550000-0x00007FFFA0560000-memory.dmp

    Filesize

    64KB

  • memory/832-207-0x00007FFFA0550000-0x00007FFFA0560000-memory.dmp

    Filesize

    64KB

  • memory/832-208-0x00007FFFA0550000-0x00007FFFA0560000-memory.dmp

    Filesize

    64KB

  • memory/832-216-0x00007FFF9DD30000-0x00007FFF9DD40000-memory.dmp

    Filesize

    64KB

  • memory/964-347-0x0000000000400000-0x00000000006A2000-memory.dmp

    Filesize

    2.6MB

  • memory/964-316-0x0000000000400000-0x00000000006A2000-memory.dmp

    Filesize

    2.6MB

  • memory/964-134-0x0000000002400000-0x0000000002401000-memory.dmp

    Filesize

    4KB

  • memory/1488-133-0x0000000000400000-0x00000000006A2000-memory.dmp

    Filesize

    2.6MB

  • memory/1488-0-0x0000000002550000-0x0000000002551000-memory.dmp

    Filesize

    4KB

  • memory/1832-263-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2004-269-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2028-348-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2180-259-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2708-60-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2708-270-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/3756-266-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/3756-244-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/4528-350-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/4604-271-0x000000001E200000-0x000000001E2A2000-memory.dmp

    Filesize

    648KB

  • memory/4816-250-0x000000001B4B0000-0x000000001B4B8000-memory.dmp

    Filesize

    32KB

  • memory/4816-227-0x000000001CBA0000-0x000000001CC3C000-memory.dmp

    Filesize

    624KB

  • memory/4816-224-0x000000001C6D0000-0x000000001CB9E000-memory.dmp

    Filesize

    4.8MB

  • memory/4816-215-0x000000001B560000-0x000000001B561000-memory.dmp

    Filesize

    4KB

  • memory/5080-264-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/5080-199-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB