Analysis
-
max time kernel
131s -
max time network
144s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
11-05-2021 17:12
Static task
static1
Behavioral task
behavioral1
Sample
8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exe
Resource
win10v20210408
General
-
Target
8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exe
-
Size
1.3MB
-
MD5
3a3559db7757ea0b902c221e89741319
-
SHA1
13b015396f281c059c2d8def984e75f81bc656fe
-
SHA256
8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61
-
SHA512
529ffc076c2a9a47e124fd1fcf82633539e860df2a347acbd358d6ad82319236d6b0107704ee0bd404b018774248c04d4140867c649adaddbf76419718e8644c
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
._cache_8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exeSynaptics.exepid process 1776 ._cache_8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exe 1408 Synaptics.exe -
Loads dropped DLL 4 IoCs
Processes:
8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exepid process 980 8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exe 980 8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exe 980 8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exe 980 8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
._cache_8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exepid process 1776 ._cache_8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exe 1776 ._cache_8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
._cache_8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exedescription pid process Token: SeDebugPrivilege 1776 ._cache_8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exedescription pid process target process PID 980 wrote to memory of 1776 980 8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exe ._cache_8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exe PID 980 wrote to memory of 1776 980 8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exe ._cache_8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exe PID 980 wrote to memory of 1776 980 8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exe ._cache_8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exe PID 980 wrote to memory of 1776 980 8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exe ._cache_8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exe PID 980 wrote to memory of 1408 980 8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exe Synaptics.exe PID 980 wrote to memory of 1408 980 8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exe Synaptics.exe PID 980 wrote to memory of 1408 980 8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exe Synaptics.exe PID 980 wrote to memory of 1408 980 8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exe Synaptics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exe"C:\Users\Admin\AppData\Local\Temp\8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\._cache_8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exe"C:\Users\Admin\AppData\Local\Temp\._cache_8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Synaptics\Synaptics.exeMD5
cf164330da0dde9201f74ebe2b580d3f
SHA12299e06512e6a849cc1765964e7c0cc26f6b188c
SHA2563235b73709f9eae9b2ea5044a0e11f64a4612a02efb9e618eaf390c2a3edecbc
SHA512ddd150ba9eb719fac7db15845b35686cff38b2f095fc20d0d48e74f67910ecaf5f36d6a89330efcf59b8e2e42c0c6abdf9b61baf7a52c3892e407baf189a7757
-
C:\Users\Admin\AppData\Local\Temp\._cache_8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exeMD5
123fb96f78d1c56b99821ecc9e7e8ad2
SHA183b3c4cdb302564b2c327da7ea03f1af749cc329
SHA256fb9dd1a4ead9f943cf09820c74a6919d0f405e3defe6500142cb7ab8a799e862
SHA5122d77fedb1fb41ebb2dbb3aead46742d59794521c54412923a80ad8dbacdde19dcda518c554f17c455f6db93bebeae707eb291169f48a051eb32b80d35ce86693
-
\ProgramData\Synaptics\Synaptics.exeMD5
cf164330da0dde9201f74ebe2b580d3f
SHA12299e06512e6a849cc1765964e7c0cc26f6b188c
SHA2563235b73709f9eae9b2ea5044a0e11f64a4612a02efb9e618eaf390c2a3edecbc
SHA512ddd150ba9eb719fac7db15845b35686cff38b2f095fc20d0d48e74f67910ecaf5f36d6a89330efcf59b8e2e42c0c6abdf9b61baf7a52c3892e407baf189a7757
-
\ProgramData\Synaptics\Synaptics.exeMD5
cf164330da0dde9201f74ebe2b580d3f
SHA12299e06512e6a849cc1765964e7c0cc26f6b188c
SHA2563235b73709f9eae9b2ea5044a0e11f64a4612a02efb9e618eaf390c2a3edecbc
SHA512ddd150ba9eb719fac7db15845b35686cff38b2f095fc20d0d48e74f67910ecaf5f36d6a89330efcf59b8e2e42c0c6abdf9b61baf7a52c3892e407baf189a7757
-
\Users\Admin\AppData\Local\Temp\._cache_8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exeMD5
123fb96f78d1c56b99821ecc9e7e8ad2
SHA183b3c4cdb302564b2c327da7ea03f1af749cc329
SHA256fb9dd1a4ead9f943cf09820c74a6919d0f405e3defe6500142cb7ab8a799e862
SHA5122d77fedb1fb41ebb2dbb3aead46742d59794521c54412923a80ad8dbacdde19dcda518c554f17c455f6db93bebeae707eb291169f48a051eb32b80d35ce86693
-
\Users\Admin\AppData\Local\Temp\._cache_8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61.exeMD5
123fb96f78d1c56b99821ecc9e7e8ad2
SHA183b3c4cdb302564b2c327da7ea03f1af749cc329
SHA256fb9dd1a4ead9f943cf09820c74a6919d0f405e3defe6500142cb7ab8a799e862
SHA5122d77fedb1fb41ebb2dbb3aead46742d59794521c54412923a80ad8dbacdde19dcda518c554f17c455f6db93bebeae707eb291169f48a051eb32b80d35ce86693
-
memory/980-61-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/980-60-0x0000000075FF1000-0x0000000075FF3000-memory.dmpFilesize
8KB
-
memory/1408-68-0x0000000000000000-mapping.dmp
-
memory/1408-71-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/1776-64-0x0000000000000000-mapping.dmp
-
memory/1776-72-0x0000000001F50000-0x0000000001FC0000-memory.dmpFilesize
448KB
-
memory/1776-75-0x0000000002182000-0x0000000002183000-memory.dmpFilesize
4KB
-
memory/1776-74-0x0000000002181000-0x0000000002182000-memory.dmpFilesize
4KB
-
memory/1776-76-0x0000000002184000-0x0000000002185000-memory.dmpFilesize
4KB