Analysis

  • max time kernel
    30s
  • max time network
    31s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250217-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    19-02-2025 15:00

General

  • Target

    FullOption_2.1 By SlAMZACKBOY.exe

  • Size

    3.3MB

  • MD5

    b8d61439167c6b4191076302c4031bd9

  • SHA1

    ada3f220fb7afed2d0b6924d2ba74797fe2709ff

  • SHA256

    8a02f905bf2492220ec49c482545f2b240eca365399ce1fafad3f38596f0bcf2

  • SHA512

    72d4e864883f810507c7e41083030bdb1fa6d1eb1b53fbd97d9d2328ee3efba76777d91a3d753226af1e731a89f8639e1a28694863038447b85ae0f7003a52ac

  • SSDEEP

    49152:SpIWTCQLm2xM6ft7+pFj8Fr6/MEcgy9QF6IN5h7Re2+sKgmjjsdHFUUYt:2HCQL/ftkVCm/RcZe645Re2+sTvU1

Malware Config

Extracted

Family

xworm

Version

5.0

C2

45.141.27.119:5000

185.84.161.66:5000

Mutex

1NDADZHs1pBvdGGn

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

aes.plain
aes.plain

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Detect Xworm Payload 4 IoCs
  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FullOption_2.1 By SlAMZACKBOY.exe
    "C:\Users\Admin\AppData\Local\Temp\FullOption_2.1 By SlAMZACKBOY.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4996
    • C:\Users\Admin\AppData\Local\Temp\SIAMWHITE.exe
      "C:\Users\Admin\AppData\Local\Temp\SIAMWHITE.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4352
    • C:\Users\Admin\AppData\Local\Temp\FullOption_2.1 By Slumzackboy.exe
      "C:\Users\Admin\AppData\Local\Temp\FullOption_2.1 By Slumzackboy.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Users\Admin\AppData\Local\Temp\._cache_FullOption_2.1 By Slumzackboy.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_FullOption_2.1 By Slumzackboy.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3476
        • C:\Users\Admin\AppData\Local\Temp\SUPER X GODDOM.exe
          "C:\Users\Admin\AppData\Local\Temp\SUPER X GODDOM.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2124
        • C:\Users\Admin\AppData\Local\Temp\FullOption_2.1.exe
          "C:\Users\Admin\AppData\Local\Temp\FullOption_2.1.exe"
          4⤵
          • Executes dropped EXE
          PID:4512
      • C:\ProgramData\Synaptics\Synaptics.exe
        "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1276
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:5052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    744KB

    MD5

    e1e65597b27eb04ff9cf797ba76c9a47

    SHA1

    a2bdebf1891b668f87d5e7683ac01347fb0ea708

    SHA256

    2bfe34a23028bcac1bc9d6506ff4cbd1d501c24731306aa710d09552015f9f1b

    SHA512

    61ec3731a0b2bba95569a23c80858a98009c0b8e6c17c2c67e44deb04e9216ed86cb1791247a5b40b35ade0dc09a5a0bc58b1b185e3ea78c5a1d262a2e2e2484

  • C:\Users\Admin\AppData\Local\Temp\._cache_FullOption_2.1 By Slumzackboy.exe

    Filesize

    2.9MB

    MD5

    75c585f5bd4795d9f17dfb5f03a38ebb

    SHA1

    d85e92e5ce01588a8553366f9be5b68d31d7e3dd

    SHA256

    ee1637f5c619610872b9175009c4d045c1f3078a21990ce2e289a724ec01b77f

    SHA512

    86ddccc098d2a3042e875626b9a8e54512308d8f8c90c2f398d9a36fa2f0cd62cd6a97825f6b8ceb2c485ffe2fcd651450d9e10051de19745f896fd617df6a37

  • C:\Users\Admin\AppData\Local\Temp\9C975E00

    Filesize

    21KB

    MD5

    9ab0012b8dee468184a9d3e868dfc932

    SHA1

    e9f06bef6ba3ecf0515f2f07d3e962587e9aca3d

    SHA256

    8ea2a1c2acb56a720e1dff8b6e4ba6f5ca2e259b2717770a66cb67037ac050ad

    SHA512

    1faa300a4fddbcbade3fbb60ea861ab6e976b553ffbadc5d3dbc7c338c7a575347f98670e47fc8250087a225cf47810ac94430682199434493e3de93d968af8f

  • C:\Users\Admin\AppData\Local\Temp\FullOption_2.1 By Slumzackboy.exe

    Filesize

    3.6MB

    MD5

    8a2d70208f47671c91aac5d1e50c9333

    SHA1

    fb3188b88eca5f858280eff3a4ce31942b3d730e

    SHA256

    3cfd8487432927bbf6491b24c43fc70fccf18a6428de17805008f973d98051fc

    SHA512

    165620b8fbe544365d2c3ad3dc0eda3d3905d7912c4f143de563e63fb2d711c889efb68ffb3f308f903ba5496951ddeae45ba3f451410a9e1692855746fccd46

  • C:\Users\Admin\AppData\Local\Temp\FullOption_2.1.exe

    Filesize

    3.9MB

    MD5

    2f6e9c0dd1c6859a9d6e7acea1db9ac0

    SHA1

    b0dcd2be62b6a559e479de7745ab0988b8b30522

    SHA256

    122e3cb0f2ad233d1a364911d433667e7778f00d9a7d10b954c994f4e8093d1f

    SHA512

    fe3634f46afd5b45f0ffc721a18b5ef1b1344b548f90b8c54ea6995e3d64b7394b56c681b1a0522b67e862fce9d8333b621612a2f03708e7dbc917a28c58c15d

  • C:\Users\Admin\AppData\Local\Temp\SIAMWHITE.exe

    Filesize

    41KB

    MD5

    ee87a98df6e7b599f71cb5b93f61dc90

    SHA1

    b7655df36a1751b1dd21d1efcfad1dd86ca26c0e

    SHA256

    25e4456d6c6da27ab1dc2fa8a40d5eff8e5c6bdb93e5b948b88db587e3e4f2ab

    SHA512

    2fe9aed036bd2fcfe4e4d1ea9e8cbf78a9946418679fe8ecd3228ab04246170d46df51ab90561aeb2ec2c81184d558c5fd2dd0bf82f75c836188b82b2a39b8a8

  • C:\Users\Admin\AppData\Local\Temp\SUPER X GODDOM.exe

    Filesize

    41KB

    MD5

    4be26d7b2fb360ed06f60a8647b4d325

    SHA1

    d299e479fbe8ad1728c29cde76874faae2703614

    SHA256

    73b481b5434247dac0c9c20bccd12ecaedbd2403cf81946f4893b4557a137af6

    SHA512

    795463af1483c2b9abf3157220a9c9ad542c342172af5ce16a8ca485ad324410d0ba59864121b797afed21c82033200b4936502c75a4cfdfd54fcf43e4eba5e9

  • C:\Users\Admin\AppData\Local\Temp\wbvESmg4.xlsm

    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • memory/1276-241-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2124-235-0x00000000008A0000-0x00000000008B0000-memory.dmp

    Filesize

    64KB

  • memory/2760-35-0x0000000002530000-0x0000000002531000-memory.dmp

    Filesize

    4KB

  • memory/2760-164-0x0000000000400000-0x00000000007A1000-memory.dmp

    Filesize

    3.6MB

  • memory/3476-102-0x0000000000DA0000-0x0000000001088000-memory.dmp

    Filesize

    2.9MB

  • memory/4352-28-0x0000000000750000-0x0000000000760000-memory.dmp

    Filesize

    64KB

  • memory/4352-29-0x00007FFC580B0000-0x00007FFC58B72000-memory.dmp

    Filesize

    10.8MB

  • memory/4352-240-0x00007FFC580B0000-0x00007FFC58B72000-memory.dmp

    Filesize

    10.8MB

  • memory/4352-196-0x000000001B370000-0x000000001B380000-memory.dmp

    Filesize

    64KB

  • memory/4996-33-0x00007FFC580B0000-0x00007FFC58B72000-memory.dmp

    Filesize

    10.8MB

  • memory/4996-0-0x00007FFC580B3000-0x00007FFC580B5000-memory.dmp

    Filesize

    8KB

  • memory/4996-13-0x00007FFC580B0000-0x00007FFC58B72000-memory.dmp

    Filesize

    10.8MB

  • memory/4996-1-0x00000000002D0000-0x0000000000628000-memory.dmp

    Filesize

    3.3MB

  • memory/5052-170-0x00007FFC34530000-0x00007FFC34540000-memory.dmp

    Filesize

    64KB

  • memory/5052-171-0x00007FFC34530000-0x00007FFC34540000-memory.dmp

    Filesize

    64KB

  • memory/5052-168-0x00007FFC367F0000-0x00007FFC36800000-memory.dmp

    Filesize

    64KB

  • memory/5052-169-0x00007FFC367F0000-0x00007FFC36800000-memory.dmp

    Filesize

    64KB

  • memory/5052-167-0x00007FFC367F0000-0x00007FFC36800000-memory.dmp

    Filesize

    64KB

  • memory/5052-166-0x00007FFC367F0000-0x00007FFC36800000-memory.dmp

    Filesize

    64KB

  • memory/5052-165-0x00007FFC367F0000-0x00007FFC36800000-memory.dmp

    Filesize

    64KB