Analysis
-
max time kernel
448s -
max time network
438s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 02:46
Behavioral task
behavioral1
Sample
vpn.zip
Resource
win10v2004-20241007-en
General
-
Target
vpn.zip
-
Size
1.0MB
-
MD5
861aaa95eb83fc455ab27bc5f8fc5024
-
SHA1
0a479bf9b2ed08d0aae8acb7a583612abc65c470
-
SHA256
8f19550d0f9777c8ee13b290291787fc2c5b0b83255cb561cebc1f175dc83509
-
SHA512
70945f088ac6188bc0358dd2fa1c561ac9f2f6cbafc5194de0a87a4ef3d07b98ebed278e48364a34f4e013e124f3908c6e4e2900abdca367c1256e384fc5b5af
-
SSDEEP
24576:TXeBQ9uVPUsour8JkwW55RqiNGZtYOMdwfOt2aJv+A8myV:7eB/U1QYk53qz/Y3dwla5+PV
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation VPNPlus1.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation ._cache_VPNPlus1.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe -
Executes dropped EXE 8 IoCs
pid Process 4688 VPNPlus1.exe 2468 ._cache_VPNPlus1.exe 5116 Synaptics.exe 4760 Windows.exe 2340 VPNPlus.exe 324 ._cache_Synaptics.exe 3224 Windows.exe 2700 VPNPlus.exe -
Loads dropped DLL 2 IoCs
pid Process 5116 Synaptics.exe 5116 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" VPNPlus1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VPNPlus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VPNPlus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VPNPlus1.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ 7zFM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ VPNPlus1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4484 EXCEL.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2000 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 2000 7zFM.exe Token: 35 2000 7zFM.exe Token: SeSecurityPrivilege 2000 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2000 7zFM.exe 2000 7zFM.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4484 EXCEL.EXE 4484 EXCEL.EXE 4484 EXCEL.EXE 4484 EXCEL.EXE 4484 EXCEL.EXE 4484 EXCEL.EXE 4484 EXCEL.EXE 4484 EXCEL.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4688 wrote to memory of 2468 4688 VPNPlus1.exe 100 PID 4688 wrote to memory of 2468 4688 VPNPlus1.exe 100 PID 4688 wrote to memory of 5116 4688 VPNPlus1.exe 102 PID 4688 wrote to memory of 5116 4688 VPNPlus1.exe 102 PID 4688 wrote to memory of 5116 4688 VPNPlus1.exe 102 PID 2468 wrote to memory of 4760 2468 ._cache_VPNPlus1.exe 103 PID 2468 wrote to memory of 4760 2468 ._cache_VPNPlus1.exe 103 PID 2468 wrote to memory of 2340 2468 ._cache_VPNPlus1.exe 104 PID 2468 wrote to memory of 2340 2468 ._cache_VPNPlus1.exe 104 PID 2468 wrote to memory of 2340 2468 ._cache_VPNPlus1.exe 104 PID 5116 wrote to memory of 324 5116 Synaptics.exe 105 PID 5116 wrote to memory of 324 5116 Synaptics.exe 105 PID 324 wrote to memory of 3224 324 ._cache_Synaptics.exe 107 PID 324 wrote to memory of 3224 324 ._cache_Synaptics.exe 107 PID 324 wrote to memory of 2700 324 ._cache_Synaptics.exe 108 PID 324 wrote to memory of 2700 324 ._cache_Synaptics.exe 108 PID 324 wrote to memory of 2700 324 ._cache_Synaptics.exe 108
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\vpn.zip"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2000
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4148
-
C:\Users\Admin\Desktop\vpn\VPNPlus1.exe"C:\Users\Admin\Desktop\vpn\VPNPlus1.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\Desktop\vpn\._cache_VPNPlus1.exe"C:\Users\Admin\Desktop\vpn\._cache_VPNPlus1.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Roaming\Windows.exe"C:\Users\Admin\AppData\Roaming\Windows.exe"3⤵
- Executes dropped EXE
PID:4760
-
-
C:\Users\Admin\AppData\Roaming\VPNPlus.exe"C:\Users\Admin\AppData\Roaming\VPNPlus.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2340
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\Desktop\vpn\._cache_Synaptics.exe"C:\Users\Admin\Desktop\vpn\._cache_Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Users\Admin\AppData\Roaming\Windows.exe"C:\Users\Admin\AppData\Roaming\Windows.exe"4⤵
- Executes dropped EXE
PID:3224
-
-
C:\Users\Admin\AppData\Roaming\VPNPlus.exe"C:\Users\Admin\AppData\Roaming\VPNPlus.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2700
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
871B
MD5386677f585908a33791517dfc2317f88
SHA12e6853b4560a9ac8a74cdd5c3124a777bc0d874e
SHA2567caf8779608c167ab6fa570df00c973aff6dee850bb63439770889a68c7cdae0
SHA512876d2269e25a4b2754bdf2c7e3c410050f885d7e6bd8abce41c5fc74ae1f8c549b2266dd1588c750f614063f36c8a8e5008cea610505897d04e4ef5c3adc52d9
-
Filesize
1KB
MD5c81c2ec1b8be0ab444eedaf2893390ed
SHA1444566609a28efbfed1c21a9a787812945ab04d3
SHA25666e7acc21981c89e9d363178d606d4bed94e9f15e861903c6b94c23b4dc0f876
SHA512ac593a805d22bcbd59ed922f1efd87343f7c03fb9d7b95a5e4a62f35898cd08747a6bade4dae948ee4118a8205ea33d3754a30408d51f642fa1fe847d91469fe
-
Filesize
22KB
MD559d1fff86a8fe59a11fe4d5ff822507a
SHA1fc4f4f7d8ce8b6d71e606b5b4d4c342dd4820636
SHA256db4092d02f34b154fd45e4d40e3bca8a3573fd47c420c00f228f48a7d0ca2b68
SHA5123da157b19d47ef528025d6844c819abe5ce11b46833b1befedeb705b571a586747dc86856041554294951efb92fc2472c3b2c399f2d8ee6a99925f4326f7b762
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
50KB
MD5738b8a48cda63b6ce8ebb759ab09110c
SHA19e9eeb213de04edd8c0bf0b831a5e0f7d725bdf0
SHA256c1cc42e870c6a2cd205d87c09ba343592c13c681dc79f0c09b932e5e3382b11c
SHA512c83687c2d4ce0e10dc54bde33c231c55d328b27317be1797350715308626d95228f0d491cfa4a5efec9c6ecd9a088c784351492217a82f637421263062252969
-
Filesize
302KB
MD5e2edcc5e47b2058a8468f1af0ef3b3bd
SHA17a2ab665d601d5c6871ed8a258ac6adfe1a86cc3
SHA256a4c8c11ca98b742889391e872e63eae423b3e59d4651620d3bd3dc6b6e4d050a
SHA5128cdca934d0f05e24eb88946f108f8ff47c82bf36594e76cddcd450f09912200a3bf74e2de0459ad1120b23ec4bd001fb52485e1c2a4b81e6f8fb8203e7bec777
-
Filesize
362KB
MD556361bb37da25fe1327dede87d6f8b11
SHA1263ee9b9e62edf5b7da20f71f8bc994d959b0677
SHA256a5dafb58cd3bb7693a9dcdcc8b0a693034d145b9c6de31853ff755e41f6d1d11
SHA512b34b58d7d3a8db3ed337a4fb5fe294018ec996489bb05cda384d1a416c4bb60fdbe8de569951532ae0c89d83ab4ffdc8cd866c9b8cf39c85eb6e34884ae10663
-
Filesize
1.1MB
MD5b48992447902ff38b5eaab55173bbb83
SHA1f98274c39580c93db9a6336ebebb466f24dab59d
SHA256f8648b6786e2da21207d0ee88975affadefca655b9e011e053a914384bcd96cb
SHA5127f61fdcf1832fbde968086e27a2e797cd66e35fa39e8957e46376ff3392a225616f2f1b209004a7e6d92f8709a618b5ecf9168d398aa4327d6e7ddc3b31ef17b