Analysis

  • max time kernel
    111s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-01-2025 01:35

General

  • Target

    56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe

  • Size

    1.1MB

  • MD5

    9f30f28a1c7046b8c571d1079b9d7ad0

  • SHA1

    7960f0def1260e15044bab06a2eb02cf91884259

  • SHA256

    56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96

  • SHA512

    261f031912a6f0759e57302447509962df9c2922496d5cd458fe74bb6518201f513e68e05210bcb3f904983c84b7783787806c4d3fdefbf184ced66918d4912d

  • SSDEEP

    12288:4MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9gB+FT+ucrj:4nsJ39LyjbJkQFMhmC+6GD96y0X

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 9 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 7 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe
    "C:\Users\Admin\AppData\Local\Temp\56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Users\Admin\AppData\Local\Temp\._cache_56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1136
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
        dw20.exe -x -s 836
        3⤵
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious use of AdjustPrivilegeToken
        PID:692
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4040
      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3640
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
          dw20.exe -x -s 824
          4⤵
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of AdjustPrivilegeToken
          PID:4252
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    1.1MB

    MD5

    9f30f28a1c7046b8c571d1079b9d7ad0

    SHA1

    7960f0def1260e15044bab06a2eb02cf91884259

    SHA256

    56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96

    SHA512

    261f031912a6f0759e57302447509962df9c2922496d5cd458fe74bb6518201f513e68e05210bcb3f904983c84b7783787806c4d3fdefbf184ced66918d4912d

  • C:\Users\Admin\AppData\Local\Temp\._cache_56fa3bc096b52f5cb37f2987c61ccbd7161c009e81a95c72ed196d87fd8f1e96N.exe

    Filesize

    390KB

    MD5

    fb01ddbb2526e00dd1eb1e8a9a1bcd42

    SHA1

    fc6205ba3c2cdf594fa96892028e409a4283c792

    SHA256

    960d09544cdc2e1f655afed211900c5beed12b23a0853f79a504fe5fc0653912

    SHA512

    7e31d6c032cbf75d68b30a4b73226f20f4ba48bf4184d90f17558e079641a77ed69a2c3d646ec0a211ae067691dd80787601e0f4a5d3a8abc49a2da8eabe3279

  • C:\Users\Admin\AppData\Local\Temp\4A875E00

    Filesize

    22KB

    MD5

    c0f9170a26666254cffb73c92ed52e7f

    SHA1

    bc2b2cbb0da5a22e1167ef1e8d409cdc50d66778

    SHA256

    138b871547647d9080569922afd73cee0b10e67173fad7795c9954682680f9e1

    SHA512

    f87ec3b18aadb908243dc55e661a1a8e1c402b8938c5fc2ab3d89e97a657dfc1dfc9a12669a00e968d896179a3217ee964838657d7138addd52d138826df13cd

  • C:\Users\Admin\AppData\Local\Temp\TM1RL2lA.xlsm

    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • memory/1136-209-0x0000000073330000-0x00000000738E1000-memory.dmp

    Filesize

    5.7MB

  • memory/1136-125-0x0000000073332000-0x0000000073333000-memory.dmp

    Filesize

    4KB

  • memory/1136-132-0x0000000073330000-0x00000000738E1000-memory.dmp

    Filesize

    5.7MB

  • memory/1136-133-0x0000000073330000-0x00000000738E1000-memory.dmp

    Filesize

    5.7MB

  • memory/1696-267-0x00007FFBA0D50000-0x00007FFBA0D60000-memory.dmp

    Filesize

    64KB

  • memory/1696-268-0x00007FFBA0D50000-0x00007FFBA0D60000-memory.dmp

    Filesize

    64KB

  • memory/1696-197-0x00007FFBA0D50000-0x00007FFBA0D60000-memory.dmp

    Filesize

    64KB

  • memory/1696-196-0x00007FFBA0D50000-0x00007FFBA0D60000-memory.dmp

    Filesize

    64KB

  • memory/1696-195-0x00007FFBA0D50000-0x00007FFBA0D60000-memory.dmp

    Filesize

    64KB

  • memory/1696-202-0x00007FFB9E3F0000-0x00007FFB9E400000-memory.dmp

    Filesize

    64KB

  • memory/1696-199-0x00007FFBA0D50000-0x00007FFBA0D60000-memory.dmp

    Filesize

    64KB

  • memory/1696-210-0x00007FFB9E3F0000-0x00007FFB9E400000-memory.dmp

    Filesize

    64KB

  • memory/1696-198-0x00007FFBA0D50000-0x00007FFBA0D60000-memory.dmp

    Filesize

    64KB

  • memory/1696-270-0x00007FFBA0D50000-0x00007FFBA0D60000-memory.dmp

    Filesize

    64KB

  • memory/1696-269-0x00007FFBA0D50000-0x00007FFBA0D60000-memory.dmp

    Filesize

    64KB

  • memory/2468-0-0x0000000000820000-0x0000000000821000-memory.dmp

    Filesize

    4KB

  • memory/2468-129-0x0000000000400000-0x0000000000524000-memory.dmp

    Filesize

    1.1MB

  • memory/4040-134-0x00000000006F0000-0x00000000006F1000-memory.dmp

    Filesize

    4KB

  • memory/4040-271-0x0000000000400000-0x0000000000524000-memory.dmp

    Filesize

    1.1MB

  • memory/4040-272-0x00000000006F0000-0x00000000006F1000-memory.dmp

    Filesize

    4KB

  • memory/4040-297-0x0000000000400000-0x0000000000524000-memory.dmp

    Filesize

    1.1MB