Analysis

  • max time kernel
    47s
  • max time network
    49s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250128-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250128-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    01-02-2025 09:30

General

  • Target

    Synaptics.exe

  • Size

    753KB

  • MD5

    80421089b46d27ad31bba48f8946af3f

  • SHA1

    71f6418b3ad4310c579f0f50beeff472964d349a

  • SHA256

    11f931102f640ea8406d95c2eebeadd1462fd205bc651dac57ac1bcac922e8f5

  • SHA512

    d088ff505dc0d6e1f97e466b7e6459d5b8bfcf3ac7676f60851f2af935009a5b4297598725f799bb8d5900e876879d505a78898a7f6a14babe271b8cd134622e

  • SSDEEP

    12288:aMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9ICr:ansJ39LyjbJkQFMhmC+6GD9x

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 60 IoCs
  • Suspicious use of SendNotifyMessage 59 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Synaptics.exe
    "C:\Users\Admin\AppData\Local\Temp\Synaptics.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:5056
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3320
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:5116
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3860
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2000
    • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
      "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding
      1⤵
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1416
      • C:\Windows\SysWOW64\unregmp2.exe
        "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1980
        • C:\Windows\system32\unregmp2.exe
          "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
          3⤵
          • Enumerates connected drives
          • Suspicious use of AdjustPrivilegeToken
          PID:5012
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1416 -s 3096
        2⤵
        • Program crash
        PID:4460
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
      1⤵
      • Drops file in Windows directory
      PID:2992
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1416 -ip 1416
      1⤵
        PID:3984

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Synaptics\Synaptics.exe

        Filesize

        753KB

        MD5

        80421089b46d27ad31bba48f8946af3f

        SHA1

        71f6418b3ad4310c579f0f50beeff472964d349a

        SHA256

        11f931102f640ea8406d95c2eebeadd1462fd205bc651dac57ac1bcac922e8f5

        SHA512

        d088ff505dc0d6e1f97e466b7e6459d5b8bfcf3ac7676f60851f2af935009a5b4297598725f799bb8d5900e876879d505a78898a7f6a14babe271b8cd134622e

      • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

        Filesize

        1024KB

        MD5

        7f0d676dc2227d8ab6a427c69e37f5df

        SHA1

        3e7945a73fbdda420addea4fadc9a81078658594

        SHA256

        211ac81157659c9bd90043a80a3d1e0d03ef09e0b7600f0ec0a78aa668cc72a6

        SHA512

        7e267c71b2db4e530de718089105c87bdb80cbf308641a50256ea82011c12ea1344a1be5a74862470cc5fde1f71d973c7d8fe6c03da9189074cc6bb904b69fad

      • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

        Filesize

        384KB

        MD5

        f63420442b67dfd4d341e8db8dd5ec7f

        SHA1

        6472a539757ba7ccade29887f2d86eea95b36af0

        SHA256

        48ef6c07237ebb2772b4ace5a724b6fe081eb4dc3f596955ab0fbe8d0fc064d7

        SHA512

        d43f7f4dedaf56f2b54951ef05fc7168e9d0d3829d5a8678ed6df4c10509259a4a86b0bc6e017397aa981a3908c5b00688bb668f7bec32a2a73fd6333fa82c83

      • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.DTD

        Filesize

        498B

        MD5

        90be2701c8112bebc6bd58a7de19846e

        SHA1

        a95be407036982392e2e684fb9ff6602ecad6f1e

        SHA256

        644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf

        SHA512

        d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe

      • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

        Filesize

        9KB

        MD5

        5433eab10c6b5c6d55b7cbd302426a39

        SHA1

        c5b1604b3350dab290d081eecd5389a895c58de5

        SHA256

        23dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131

        SHA512

        207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34

      • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML.bak

        Filesize

        9KB

        MD5

        7050d5ae8acfbe560fa11073fef8185d

        SHA1

        5bc38e77ff06785fe0aec5a345c4ccd15752560e

        SHA256

        cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

        SHA512

        a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

      • C:\Users\Admin\AppData\Local\Temp\9BC75E00

        Filesize

        22KB

        MD5

        edc90e9ad5491dc890adfe92e0a34702

        SHA1

        b119073f39c7aab171937962203223913505572c

        SHA256

        a00580819038026d4f6d3885076c9adde5721ad3ab530ffd5e933629c08c05e5

        SHA512

        59f5523fe9b4e1f72ea90eebb0b7170f6dba387b072ccc26617aea21d4ceeb087a4fd26dc73ae44cbca0a4a8501d43bd46c4847e89878053a25cd81e9e1d78bd

      • C:\Users\Admin\AppData\Local\Temp\iOlaaVUI.xlsm

        Filesize

        17KB

        MD5

        e566fc53051035e1e6fd0ed1823de0f9

        SHA1

        00bc96c48b98676ecd67e81a6f1d7754e4156044

        SHA256

        8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

        SHA512

        a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

      • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

        Filesize

        1KB

        MD5

        6c3ab532c0b07ed8778bf5060d21061a

        SHA1

        7a817e611e7af3e6141abaa5fc53614f2528b6e7

        SHA256

        173d6e5805c30aa1ee13acc86244bf0c23a9dc9bd5657aaa5493f81157d6c51c

        SHA512

        06600f35eaa0c647be5491369aec735240b311e30fc58f90e40ca321b5d1ef49c09e3688c41dfd20b129801ae60350138b85c59c39491b11d95f6e46f91bc3ac

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms

        Filesize

        1KB

        MD5

        651efae522443eefa285483b8063d20f

        SHA1

        261a3c03659aac00d9c0f264fd019a7b17805fc9

        SHA256

        9c420d6d4dd9866525a3b92f84ecb22c2e3362b53109e12d608c71398e508177

        SHA512

        5223d04f0b796142197458c80a98fdfcd648555d6e89a34154c59ba17ae3273f74522ea0a7deacdd01710722e46b9c4dc874650fc14b6ac5b5b1f91453826fa4

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms

        Filesize

        3KB

        MD5

        594e25e097f691e09070888b6dd764e1

        SHA1

        b80ca00e8cbbf046dc52064fbb90859b597acfd0

        SHA256

        56ee127b973f9a27765940660a64a15053a0757cd89f73401f7af48fd897d60f

        SHA512

        355939cc482abcb3581f824f2734aae407651b3cc7cbda625a6aff8b9759cf192175d49b9a90a9354647ea3b7591a23b281ca3462f326fe0413a74fe5872af85

      • memory/1416-123-0x000000000A730000-0x000000000A740000-memory.dmp

        Filesize

        64KB

      • memory/1416-117-0x000000000A730000-0x000000000A740000-memory.dmp

        Filesize

        64KB

      • memory/1416-118-0x000000000A730000-0x000000000A740000-memory.dmp

        Filesize

        64KB

      • memory/1416-114-0x0000000007070000-0x0000000007080000-memory.dmp

        Filesize

        64KB

      • memory/1416-121-0x000000000A730000-0x000000000A740000-memory.dmp

        Filesize

        64KB

      • memory/1416-120-0x000000000A730000-0x000000000A740000-memory.dmp

        Filesize

        64KB

      • memory/1416-119-0x000000000A730000-0x000000000A740000-memory.dmp

        Filesize

        64KB

      • memory/1416-116-0x000000000A730000-0x000000000A740000-memory.dmp

        Filesize

        64KB

      • memory/1416-122-0x000000000A730000-0x000000000A740000-memory.dmp

        Filesize

        64KB

      • memory/3320-84-0x0000000000400000-0x00000000004C2000-memory.dmp

        Filesize

        776KB

      • memory/3320-83-0x0000000000400000-0x00000000004C2000-memory.dmp

        Filesize

        776KB

      • memory/3320-77-0x0000000000400000-0x00000000004C2000-memory.dmp

        Filesize

        776KB

      • memory/3320-73-0x0000000002110000-0x0000000002111000-memory.dmp

        Filesize

        4KB

      • memory/3320-3-0x0000000002110000-0x0000000002111000-memory.dmp

        Filesize

        4KB

      • memory/3860-60-0x000001B73E1E0000-0x000001B73E1E1000-memory.dmp

        Filesize

        4KB

      • memory/3860-59-0x000001B73E1E0000-0x000001B73E1E1000-memory.dmp

        Filesize

        4KB

      • memory/3860-61-0x000001B73E1E0000-0x000001B73E1E1000-memory.dmp

        Filesize

        4KB

      • memory/3860-68-0x000001B73E1E0000-0x000001B73E1E1000-memory.dmp

        Filesize

        4KB

      • memory/3860-71-0x000001B73E1E0000-0x000001B73E1E1000-memory.dmp

        Filesize

        4KB

      • memory/3860-70-0x000001B73E1E0000-0x000001B73E1E1000-memory.dmp

        Filesize

        4KB

      • memory/3860-67-0x000001B73E1E0000-0x000001B73E1E1000-memory.dmp

        Filesize

        4KB

      • memory/3860-66-0x000001B73E1E0000-0x000001B73E1E1000-memory.dmp

        Filesize

        4KB

      • memory/3860-65-0x000001B73E1E0000-0x000001B73E1E1000-memory.dmp

        Filesize

        4KB

      • memory/3860-69-0x000001B73E1E0000-0x000001B73E1E1000-memory.dmp

        Filesize

        4KB

      • memory/5056-2-0x0000000000400000-0x00000000004C2000-memory.dmp

        Filesize

        776KB

      • memory/5056-0-0x00000000007B0000-0x00000000007B1000-memory.dmp

        Filesize

        4KB

      • memory/5116-21-0x00007FFE70EB0000-0x00007FFE710A8000-memory.dmp

        Filesize

        2.0MB

      • memory/5116-18-0x00007FFE70EB0000-0x00007FFE710A8000-memory.dmp

        Filesize

        2.0MB

      • memory/5116-75-0x00007FFE70F4D000-0x00007FFE70F4E000-memory.dmp

        Filesize

        4KB

      • memory/5116-76-0x00007FFE70EB0000-0x00007FFE710A8000-memory.dmp

        Filesize

        2.0MB

      • memory/5116-15-0x00007FFE70EB0000-0x00007FFE710A8000-memory.dmp

        Filesize

        2.0MB

      • memory/5116-20-0x00007FFE70EB0000-0x00007FFE710A8000-memory.dmp

        Filesize

        2.0MB

      • memory/5116-25-0x00007FFE2E8F0000-0x00007FFE2E900000-memory.dmp

        Filesize

        64KB

      • memory/5116-13-0x00007FFE70EB0000-0x00007FFE710A8000-memory.dmp

        Filesize

        2.0MB

      • memory/5116-24-0x00007FFE70EB0000-0x00007FFE710A8000-memory.dmp

        Filesize

        2.0MB

      • memory/5116-22-0x00007FFE70EB0000-0x00007FFE710A8000-memory.dmp

        Filesize

        2.0MB

      • memory/5116-23-0x00007FFE70EB0000-0x00007FFE710A8000-memory.dmp

        Filesize

        2.0MB

      • memory/5116-19-0x00007FFE2E8F0000-0x00007FFE2E900000-memory.dmp

        Filesize

        64KB

      • memory/5116-17-0x00007FFE70EB0000-0x00007FFE710A8000-memory.dmp

        Filesize

        2.0MB

      • memory/5116-74-0x00007FFE70EB0000-0x00007FFE710A8000-memory.dmp

        Filesize

        2.0MB

      • memory/5116-16-0x00007FFE70EB0000-0x00007FFE710A8000-memory.dmp

        Filesize

        2.0MB

      • memory/5116-12-0x00007FFE70EB0000-0x00007FFE710A8000-memory.dmp

        Filesize

        2.0MB

      • memory/5116-11-0x00007FFE70EB0000-0x00007FFE710A8000-memory.dmp

        Filesize

        2.0MB

      • memory/5116-10-0x00007FFE70EB0000-0x00007FFE710A8000-memory.dmp

        Filesize

        2.0MB

      • memory/5116-9-0x00007FFE30F30000-0x00007FFE30F40000-memory.dmp

        Filesize

        64KB

      • memory/5116-8-0x00007FFE30F30000-0x00007FFE30F40000-memory.dmp

        Filesize

        64KB

      • memory/5116-7-0x00007FFE30F30000-0x00007FFE30F40000-memory.dmp

        Filesize

        64KB

      • memory/5116-6-0x00007FFE30F30000-0x00007FFE30F40000-memory.dmp

        Filesize

        64KB

      • memory/5116-4-0x00007FFE30F30000-0x00007FFE30F40000-memory.dmp

        Filesize

        64KB

      • memory/5116-5-0x00007FFE70F4D000-0x00007FFE70F4E000-memory.dmp

        Filesize

        4KB

      • memory/5116-14-0x00007FFE70EB0000-0x00007FFE710A8000-memory.dmp

        Filesize

        2.0MB