Edit tour
Windows
Analysis Report
file.exe
Overview
General Information
Detection
XRed
Score: | 88 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected XRed
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to implement multi-threaded time evasion
Contains functionality to inject threads in other processes
Document contains an embedded VBA macro with suspicious strings
Document contains an embedded VBA with functions possibly related to ADO stream file operations
Document contains an embedded VBA with functions possibly related to HTTP operations
Document contains an embedded VBA with functions possibly related to WSH operations (process, registry, environment, or keystrokes)
Drops PE files to the document folder of the user
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Uses dynamic DNS services
Uses shutdown.exe to shutdown or reboot the system
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Detected potential crypto function
Document contains an embedded VBA macro which executes code when the document is opened / closed
Downloads executable code via HTTP
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops PE files to the program root directory (C:\Program Files)
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Extensive use of GetProcAddress (often used to hide API calls)
File is packed with WinRar
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May infect USB drives
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries the installation date of Windows
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Startup Folder File Write
Sigma detected: Suspicious Execution of Shutdown
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match
Classification
- System is w10x64
- file.exe (PID: 2828 cmdline:
"C:\Users\ user\Deskt op\file.ex e" MD5: 06303600A3A44EB2FBCE248EB0FE9FC1) - 1.exe (PID: 1344 cmdline:
"C:\Progra m Files (x 86)\1.exe" 0 MD5: D026CFE00B08DA14B0A8B7F8860887D7) - ._cache_1.exe (PID: 3236 cmdline:
"C:\Users\ user\Deskt op\._cache _1.exe" 0 MD5: AED710082D6986C6DCEED09D3A5EDCC6) - Synaptics.exe (PID: 5236 cmdline:
"C:\Progra mData\Syna ptics\Syna ptics.exe" InjUpdate MD5: 00367A9FAA8069389A97267D772563E8) - 2.exe (PID: 980 cmdline:
"C:\Progra m Files (x 86)\2.exe" 0 MD5: 85A57509DB3E9DFA7B4E451B8243220D) - ._cache_2.exe (PID: 7308 cmdline:
"C:\Users\ user\Deskt op\._cache _2.exe" 0 MD5: B7176450AEBB9572B34E875984456AC1) - 3.exe (PID: 7288 cmdline:
"C:\Progra m Files (x 86)\3.exe" 0 MD5: 1EDB88F9EE745EAAEE2CBD8219318EB0) - 4.exe (PID: 7320 cmdline:
"C:\Progra m Files (x 86)\4.exe" 0 MD5: 39E7BE73C7531AC895F75834FDC1BCD6) - wic.exe (PID: 7568 cmdline:
"C:\Window s\wic.exe" 0 MD5: 6AD65B03E75BC5509BA3104510178EE6) - cmd.exe (PID: 7732 cmdline:
C:\Windows \system32\ cmd.exe /c "shutdown /r /t 0" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7740 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - shutdown.exe (PID: 7792 cmdline:
shutdown / r /t 0 MD5: FCDE5AF99B82AE6137FB90C7571D40C3)
- EXCEL.EXE (PID: 5296 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \Root\Offi ce16\EXCEL .EXE" /aut omation -E mbedding MD5: 4A871771235598812032C822E6F68F19) - splwow64.exe (PID: 7812 cmdline:
C:\Windows \splwow64. exe 12288 MD5: 77DE7761B037061C7C112FD3C5B91E73)
- cbas.exe (PID: 8072 cmdline:
"C:\Window s\cbas.exe " MD5: 9FD7C0ACC95C7F1311BDE279D0B6A03A)
- cleanup
{"C2 url": "xred.mooo.com", "Email": "xredline1@gmail.com", "Payload urls": ["http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978", "https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download", "https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1", "http://xred.site50.net/syn/SUpdate.ini", "https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download", "https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1", "http://xred.site50.net/syn/Synaptics.rar", "https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download", "https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1", "http://xred.site50.net/syn/SSLLibrary.dll"]}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
MALWARE_Win_Meteorite | Detects Meteorite downloader | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XRed | Yara detected XRed | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XRed | Yara detected XRed | Joe Security | ||
JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security | ||
MALWARE_Win_Meteorite | Detects Meteorite downloader | ditekSHen |
| |
JoeSecurity_XRed | Yara detected XRed | Joe Security | ||
JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security | ||
Click to see the 17 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security | ||
MALWARE_Win_Meteorite | Detects Meteorite downloader | ditekSHen |
| |
JoeSecurity_XRed | Yara detected XRed | Joe Security | ||
JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security | ||
JoeSecurity_XRed | Yara detected XRed | Joe Security | ||
Click to see the 1 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
MALWARE_Win_Meteorite | Detects Meteorite downloader | ditekSHen |
| |
MALWARE_Win_Meteorite | Detects Meteorite downloader | ditekSHen |
| |
MALWARE_Win_Meteorite | Detects Meteorite downloader | ditekSHen |
| |
JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security | ||
MALWARE_Win_Meteorite | Detects Meteorite downloader | ditekSHen |
| |
Click to see the 3 entries |
System Summary |
---|
Source: | Author: Jonathan Cheong, oscd.community: |
Source: | Author: Jonathan Cheong, oscd.community: |
Source: | Author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): |
Source: | Author: frack113: |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: Nasreddine Bencherchali (Nextron Systems): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-02T20:34:49.438746+0100 | 2021245 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 47.254.187.72 | 80 | TCP |
2025-01-02T20:34:50.703531+0100 | 2021245 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 47.254.187.72 | 80 | TCP |
2025-01-02T20:34:54.702088+0100 | 2021245 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 47.254.187.72 | 80 | TCP |
2025-01-02T20:34:55.222987+0100 | 2021245 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 47.254.187.72 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-02T20:34:49.438746+0100 | 2022550 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 47.254.187.72 | 80 | TCP |
2025-01-02T20:34:50.703531+0100 | 2022550 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 47.254.187.72 | 80 | TCP |
2025-01-02T20:34:54.702088+0100 | 2022550 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 47.254.187.72 | 80 | TCP |
2025-01-02T20:34:55.222987+0100 | 2022550 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 47.254.187.72 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-02T20:34:49.438746+0100 | 2018581 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 47.254.187.72 | 80 | TCP |
2025-01-02T20:34:50.703531+0100 | 2018581 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 47.254.187.72 | 80 | TCP |
2025-01-02T20:34:54.702088+0100 | 2018581 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 47.254.187.72 | 80 | TCP |
2025-01-02T20:34:55.222987+0100 | 2018581 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 47.254.187.72 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-02T20:35:58.898119+0100 | 2044887 | 1 | A Network Trojan was detected | 192.168.2.4 | 49845 | 142.250.186.142 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-02T20:34:56.526033+0100 | 2019714 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49730 | 47.254.187.72 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-02T20:36:02.093228+0100 | 2800781 | 1 | Attempted User Privilege Gain | 47.254.187.72 | 80 | 192.168.2.4 | 49740 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-02T20:34:50.154331+0100 | 2800029 | 1 | Attempted User Privilege Gain | 47.254.187.72 | 80 | 192.168.2.4 | 49730 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-02T20:35:00.259871+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49740 | 47.254.187.72 | 80 | TCP |
2025-01-02T20:35:01.530652+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49740 | 47.254.187.72 | 80 | TCP |
2025-01-02T20:35:02.093483+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49740 | 47.254.187.72 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-02T20:34:59.703337+0100 | 2832617 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49738 | 69.42.215.252 | 80 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Window detected: | ||
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: | 2_2_0040A2B0 | |
Source: | Code function: | 2_2_00407D50 | |
Source: | Code function: | 8_2_00DCF9B3 | |
Source: | Code function: | 8_2_00DDDB70 | |
Source: | Code function: | 9_2_00D2BA94 | |
Source: | Code function: | 9_2_00D3D420 | |
Source: | Code function: | 11_2_00F3E027 | |
Source: | Code function: | 18_2_00BC940B |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Memory has grown: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: |
Source: | DNS query: |
Source: | HTTP traffic detected: |