Analysis

  • max time kernel
    111s
  • max time network
    113s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    05-02-2025 12:51

General

  • Target

    95ff7790203d51a5317e3f019184027f1aee0925717a2aabf52a54f6731dceb0.exe

  • Size

    744KB

  • MD5

    161774e39f665b008d47b1288317f6b0

  • SHA1

    94f37d0789878a1de3d29fd7573f0038a33fcc33

  • SHA256

    95ff7790203d51a5317e3f019184027f1aee0925717a2aabf52a54f6731dceb0

  • SHA512

    b4b153a2eb52331a7ca5025a2d65851c9a4d42088802676f088bb7a1e0e6cda0ffd8f16e7a93dbbcf773ad2177326464f2935ef7ed04c309b41cb091eea93223

  • SSDEEP

    12288:fMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9hjI:fnsJ39LyjbJkQFMhmC+6GD9hc

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\95ff7790203d51a5317e3f019184027f1aee0925717a2aabf52a54f6731dceb0.exe
    "C:\Users\Admin\AppData\Local\Temp\95ff7790203d51a5317e3f019184027f1aee0925717a2aabf52a54f6731dceb0.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2952
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2024
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    744KB

    MD5

    161774e39f665b008d47b1288317f6b0

    SHA1

    94f37d0789878a1de3d29fd7573f0038a33fcc33

    SHA256

    95ff7790203d51a5317e3f019184027f1aee0925717a2aabf52a54f6731dceb0

    SHA512

    b4b153a2eb52331a7ca5025a2d65851c9a4d42088802676f088bb7a1e0e6cda0ffd8f16e7a93dbbcf773ad2177326464f2935ef7ed04c309b41cb091eea93223

  • C:\Users\Admin\AppData\Local\Temp\PJzjYIRS.xlsm

    Filesize

    21KB

    MD5

    6c32aeb4744959dabb253dfd0c01bda2

    SHA1

    d46df80c52a1ce783b1259c6c3377c2da65c33ee

    SHA256

    5d38aab9f88b33c09b4fd7115881402abb92135058630b854edd8f20de175011

    SHA512

    0dde98ffae0759ec43952aa8d2ce6b6e43b06b12223e118bb12146b04cc231c01118a88d96fe21cb6fecfbea584aa02ef98d0ebb8f46043732fb2bf8eef2d4fe

  • C:\Users\Admin\AppData\Local\Temp\PJzjYIRS.xlsm

    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Users\Admin\AppData\Local\Temp\PJzjYIRS.xlsm

    Filesize

    25KB

    MD5

    74d6ded21c26b2c0bc6508a8749617d4

    SHA1

    382dfcce40acb2fbc73e836c413e0d16d69bc8db

    SHA256

    357b44f7b42d9b22307224a3b776fd819604ac450d614c1aa26f16f21e6df1de

    SHA512

    a4bd91b4ce8363e874c4120b85153d5a6451c748a84cd2ac80cea54f468bfd68b6b57d5454e67970e565c3faf1126912053647ad926498327a5c64ac35396748

  • C:\Users\Admin\AppData\Local\Temp\PJzjYIRS.xlsm

    Filesize

    25KB

    MD5

    7f8faa56b3c02ceabb20867a19f7b071

    SHA1

    cf0b0aa14789f41c846fc06989925ea367088c43

    SHA256

    7c3ec89a23418c40c4c73980d7510f440ca1c0ff3aeb71cdfb3a933567350ad1

    SHA512

    cce5d3ea3c0527159d0d5e80af4269e2b0004d96e2eb0678581e1eb596c3c96827d6c0c8bcca3c46dad100e13db6ebb38b69cecf8925a5ac61f619e23b0d68f1

  • memory/2024-85-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2024-15-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2024-84-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2024-83-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2024-86-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2024-116-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2024-119-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2712-16-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2712-82-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2952-14-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2952-0-0x00000000003B0000-0x00000000003B1000-memory.dmp

    Filesize

    4KB