Analysis

  • max time kernel
    113s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-02-2025 03:18

General

  • Target

    beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe

  • Size

    3.0MB

  • MD5

    a1511316d3008b8c6c46a6876be6b500

  • SHA1

    de33c58f1149d14d3f389a0ba77d450d49a58bda

  • SHA256

    beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffc

  • SHA512

    7d32831973b753a14a91fb6a33685adfb71592e386feffe5f60aa2447c095e014403656d8d9bc9689e820f932899ed6dfebee3cd8c53a76f48b1d70bd0373bf2

  • SSDEEP

    49152:XnsHyjtk2MYC5GDYCqEv2nBNcZwZDpY8M5UthjfxEQuIs/JgBjCvC:Xnsmtk2a9CqUZ/OLxWIYJu

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Suspicious Office macro 2 IoCs

    Office document equipped with macros.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe
    "C:\Users\Admin\AppData\Local\Temp\beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2820
    • C:\Users\Admin\AppData\Local\Temp\._cache_beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe"
      2⤵
      • Executes dropped EXE
      PID:2080
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2092
      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        PID:2628
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    3.0MB

    MD5

    a1511316d3008b8c6c46a6876be6b500

    SHA1

    de33c58f1149d14d3f389a0ba77d450d49a58bda

    SHA256

    beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffc

    SHA512

    7d32831973b753a14a91fb6a33685adfb71592e386feffe5f60aa2447c095e014403656d8d9bc9689e820f932899ed6dfebee3cd8c53a76f48b1d70bd0373bf2

  • C:\Users\Admin\AppData\Local\Temp\Qli6HLXe.xlsm

    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Users\Admin\AppData\Local\Temp\Qli6HLXe.xlsm

    Filesize

    21KB

    MD5

    888b9fcfdf5f29e900cffa6b58177fa1

    SHA1

    6e8b68e32177dfbf1eb656c8548b9b4351a4a49e

    SHA256

    03f5cfe45a3cc89d5db2889391e01ff2b5b8d2a3b03f9c39bb667da71da957b3

    SHA512

    c0e7f46d17772ee66d84a97f63730eafd8988eacf73791829c2b896d6d0b5d1c3691917f018311da2e446af64e54adf1071dfc9b4dc06c17c32e777027d5304a

  • C:\Users\Admin\AppData\Local\Temp\Qli6HLXe.xlsm

    Filesize

    25KB

    MD5

    dde1f9a8cccdc15352cb4c149373f2d5

    SHA1

    85c829dc25da7e251df752d8d347378aa68e144c

    SHA256

    c916d848be21a02c1eef60e6f199e5006db9b1bd4e0d6384e5be55b7330f0667

    SHA512

    02974515235a2720e564f3650975d73fbcf5bcee3c63d6d886e80940614c47924a224edfee38bdb1315c92147538a184b5eb7be1865321cc3ee537fd4188bfba

  • C:\Users\Admin\AppData\Local\Temp\Qli6HLXe.xlsm

    Filesize

    25KB

    MD5

    048698e33b33166003d3c6663e89e2c4

    SHA1

    d783c64e5e4e977df72767231361b4d264b68a2b

    SHA256

    2cc54919189aabdde218533396fddf9ac434ac733ecb21c2dcc0f888a7552e2a

    SHA512

    74405f1fe9c46e4a7d059ea3e03a6aad052f25f651a1ebdd910dc590cd75fe7c04112f9499a1a1de59e9a86c31ccfa389b76c914a50b5afe4f479993862eb80a

  • C:\Users\Admin\AppData\Local\Temp\Qli6HLXe.xlsm

    Filesize

    27KB

    MD5

    a9e5fd85505771d9d3750167bffe3b73

    SHA1

    ca8bc381748ac9091c69c0ff2a9e70094f55197d

    SHA256

    74711a7942e91593cd58d4ac2d1f739dd207fad3600b03555d2b8d14dc1b3e72

    SHA512

    0d8980039a8423e24b8c1a9bc12e957208f67e170bbc375a316f67b392c3adafdd87840b289e6423c72f799e8f43125b1a68ebd34d7ab65f80479e4c1d715acd

  • C:\Users\Admin\AppData\Local\Temp\~$Qli6HLXe.xlsm

    Filesize

    165B

    MD5

    ff09371174f7c701e75f357a187c06e8

    SHA1

    57f9a638fd652922d7eb23236c80055a91724503

    SHA256

    e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8

    SHA512

    e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882

  • \Users\Admin\AppData\Local\Temp\._cache_beb0ee03bc506465ed066ac19fded5571f23f02b1ce9a91dba76e599338e5ffcN.exe

    Filesize

    2.2MB

    MD5

    df120835055502a2ce84d5a940c674df

    SHA1

    34d236ea317a34e0db73ce6368bebba4a44a8e8e

    SHA256

    2919bbf9a5c612d1fd4690e07802e4333cbd716740d9035c36dc23ec50f1dac6

    SHA512

    00af7184debd9ba43c6819bd559a02443353f303ab611cb1d28219b646f300d53a0654259002f6953a1d3df59c5c1fa1a45520fc48b2647d5570ace6fc1c8316

  • memory/2092-116-0x0000000000400000-0x00000000006FE000-memory.dmp

    Filesize

    3.0MB

  • memory/2092-123-0x0000000000400000-0x00000000006FE000-memory.dmp

    Filesize

    3.0MB

  • memory/2092-148-0x0000000000400000-0x00000000006FE000-memory.dmp

    Filesize

    3.0MB

  • memory/2092-153-0x0000000000400000-0x00000000006FE000-memory.dmp

    Filesize

    3.0MB

  • memory/2820-28-0x0000000000400000-0x00000000006FE000-memory.dmp

    Filesize

    3.0MB

  • memory/2820-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/3060-41-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/3060-115-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB