Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
09-07-2022 02:03
Static task
static1
Behavioral task
behavioral1
Sample
2d2f0c7af61867cd84f2e419a62cef16.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
2d2f0c7af61867cd84f2e419a62cef16.exe
Resource
win10v2004-20220414-en
General
-
Target
2d2f0c7af61867cd84f2e419a62cef16.exe
-
Size
117KB
-
MD5
2d2f0c7af61867cd84f2e419a62cef16
-
SHA1
e734bb114c2f47dc900d3a5a526db94f0b752ba0
-
SHA256
5b3d4395b0f5acd40bc20f4bf3930cbd14da3d240ad67f7ab9a65de0681e8742
-
SHA512
82a56fd148157c9957daa001b2dc0a31720e5a452a800e38fff2fae3661abab11f3cef04bdf4575bfb29d3a925e0b57bf65d809f6c8421721bad763dfd8eebd9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
synic.exepid process 1716 synic.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 880 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
2d2f0c7af61867cd84f2e419a62cef16.exepid process 1048 2d2f0c7af61867cd84f2e419a62cef16.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
synic.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\Currentversion\Run synic.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\{8C10AF90-152A-D061-B84E-08DA70A7AFC9} = "C:\\Users\\Admin\\AppData\\Roaming\\Noetfo\\synic.exe" synic.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
2d2f0c7af61867cd84f2e419a62cef16.exedescription pid process target process PID 1048 set thread context of 880 1048 2d2f0c7af61867cd84f2e419a62cef16.exe cmd.exe -
Processes:
2d2f0c7af61867cd84f2e419a62cef16.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Privacy 2d2f0c7af61867cd84f2e419a62cef16.exe Set value (int) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 2d2f0c7af61867cd84f2e419a62cef16.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
synic.exepid process 1716 synic.exe 1716 synic.exe 1716 synic.exe 1716 synic.exe 1716 synic.exe 1716 synic.exe 1716 synic.exe 1716 synic.exe 1716 synic.exe 1716 synic.exe 1716 synic.exe 1716 synic.exe 1716 synic.exe 1716 synic.exe 1716 synic.exe 1716 synic.exe 1716 synic.exe 1716 synic.exe 1716 synic.exe 1716 synic.exe 1716 synic.exe 1716 synic.exe 1716 synic.exe 1716 synic.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
2d2f0c7af61867cd84f2e419a62cef16.exedescription pid process Token: SeSecurityPrivilege 1048 2d2f0c7af61867cd84f2e419a62cef16.exe Token: SeSecurityPrivilege 1048 2d2f0c7af61867cd84f2e419a62cef16.exe Token: SeSecurityPrivilege 1048 2d2f0c7af61867cd84f2e419a62cef16.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
2d2f0c7af61867cd84f2e419a62cef16.exesynic.exepid process 1048 2d2f0c7af61867cd84f2e419a62cef16.exe 1716 synic.exe -
Suspicious use of WriteProcessMemory 53 IoCs
Processes:
2d2f0c7af61867cd84f2e419a62cef16.exesynic.exedescription pid process target process PID 1048 wrote to memory of 1716 1048 2d2f0c7af61867cd84f2e419a62cef16.exe synic.exe PID 1048 wrote to memory of 1716 1048 2d2f0c7af61867cd84f2e419a62cef16.exe synic.exe PID 1048 wrote to memory of 1716 1048 2d2f0c7af61867cd84f2e419a62cef16.exe synic.exe PID 1048 wrote to memory of 1716 1048 2d2f0c7af61867cd84f2e419a62cef16.exe synic.exe PID 1716 wrote to memory of 1116 1716 synic.exe taskhost.exe PID 1716 wrote to memory of 1116 1716 synic.exe taskhost.exe PID 1716 wrote to memory of 1116 1716 synic.exe taskhost.exe PID 1716 wrote to memory of 1116 1716 synic.exe taskhost.exe PID 1716 wrote to memory of 1116 1716 synic.exe taskhost.exe PID 1716 wrote to memory of 1200 1716 synic.exe Dwm.exe PID 1716 wrote to memory of 1200 1716 synic.exe Dwm.exe PID 1716 wrote to memory of 1200 1716 synic.exe Dwm.exe PID 1716 wrote to memory of 1200 1716 synic.exe Dwm.exe PID 1716 wrote to memory of 1200 1716 synic.exe Dwm.exe PID 1716 wrote to memory of 1232 1716 synic.exe Explorer.EXE PID 1716 wrote to memory of 1232 1716 synic.exe Explorer.EXE PID 1716 wrote to memory of 1232 1716 synic.exe Explorer.EXE PID 1716 wrote to memory of 1232 1716 synic.exe Explorer.EXE PID 1716 wrote to memory of 1232 1716 synic.exe Explorer.EXE PID 1716 wrote to memory of 1048 1716 synic.exe 2d2f0c7af61867cd84f2e419a62cef16.exe PID 1716 wrote to memory of 1048 1716 synic.exe 2d2f0c7af61867cd84f2e419a62cef16.exe PID 1716 wrote to memory of 1048 1716 synic.exe 2d2f0c7af61867cd84f2e419a62cef16.exe PID 1716 wrote to memory of 1048 1716 synic.exe 2d2f0c7af61867cd84f2e419a62cef16.exe PID 1716 wrote to memory of 1048 1716 synic.exe 2d2f0c7af61867cd84f2e419a62cef16.exe PID 1048 wrote to memory of 880 1048 2d2f0c7af61867cd84f2e419a62cef16.exe cmd.exe PID 1048 wrote to memory of 880 1048 2d2f0c7af61867cd84f2e419a62cef16.exe cmd.exe PID 1048 wrote to memory of 880 1048 2d2f0c7af61867cd84f2e419a62cef16.exe cmd.exe PID 1048 wrote to memory of 880 1048 2d2f0c7af61867cd84f2e419a62cef16.exe cmd.exe PID 1048 wrote to memory of 880 1048 2d2f0c7af61867cd84f2e419a62cef16.exe cmd.exe PID 1048 wrote to memory of 880 1048 2d2f0c7af61867cd84f2e419a62cef16.exe cmd.exe PID 1048 wrote to memory of 880 1048 2d2f0c7af61867cd84f2e419a62cef16.exe cmd.exe PID 1048 wrote to memory of 880 1048 2d2f0c7af61867cd84f2e419a62cef16.exe cmd.exe PID 1048 wrote to memory of 880 1048 2d2f0c7af61867cd84f2e419a62cef16.exe cmd.exe PID 1716 wrote to memory of 568 1716 synic.exe DllHost.exe PID 1716 wrote to memory of 568 1716 synic.exe DllHost.exe PID 1716 wrote to memory of 568 1716 synic.exe DllHost.exe PID 1716 wrote to memory of 568 1716 synic.exe DllHost.exe PID 1716 wrote to memory of 568 1716 synic.exe DllHost.exe PID 1716 wrote to memory of 1528 1716 synic.exe DllHost.exe PID 1716 wrote to memory of 1528 1716 synic.exe DllHost.exe PID 1716 wrote to memory of 1528 1716 synic.exe DllHost.exe PID 1716 wrote to memory of 1528 1716 synic.exe DllHost.exe PID 1716 wrote to memory of 1528 1716 synic.exe DllHost.exe PID 1716 wrote to memory of 1588 1716 synic.exe DllHost.exe PID 1716 wrote to memory of 1588 1716 synic.exe DllHost.exe PID 1716 wrote to memory of 1588 1716 synic.exe DllHost.exe PID 1716 wrote to memory of 1588 1716 synic.exe DllHost.exe PID 1716 wrote to memory of 1588 1716 synic.exe DllHost.exe PID 1716 wrote to memory of 2032 1716 synic.exe DllHost.exe PID 1716 wrote to memory of 2032 1716 synic.exe DllHost.exe PID 1716 wrote to memory of 2032 1716 synic.exe DllHost.exe PID 1716 wrote to memory of 2032 1716 synic.exe DllHost.exe PID 1716 wrote to memory of 2032 1716 synic.exe DllHost.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\2d2f0c7af61867cd84f2e419a62cef16.exe"C:\Users\Admin\AppData\Local\Temp\2d2f0c7af61867cd84f2e419a62cef16.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Noetfo\synic.exe"C:\Users\Admin\AppData\Roaming\Noetfo\synic.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpbbaed002.bat"3⤵
- Deletes itself
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpbbaed002.batFilesize
243B
MD5dc09c0d7848216a4df2f4ec579e72422
SHA185809704932824573247217845c01c6d164603e5
SHA256516f8b1a962d0e7c935c0eb511957dbdf53b871af8ac967ffb239c8345ed73af
SHA51238ca7006100bb9815de740b2b55cecf31649a6b50c17ea06ccbea4be86e0398894b70400d424152c005bed538af3d43a41ca05e4fb8c3d8737adfac9e48bd644
-
C:\Users\Admin\AppData\Roaming\Ecrala\leun.iglFilesize
366B
MD5e0981eba8eaadc172735324cf732d2cd
SHA15fb80ef71db2889766b66339506a6b4b6224e6c5
SHA2566f82d0866ba97d723cd9b8501fd8954ead59f6d6b1d5b050993a6cad1357fd90
SHA512cd9de9c51a8e0ba7cec6fe982faea112c7e5b4157b34ff48c17e25f25392a454bfa85b955633aec991fe2a46c50c7b174613ee6beb98673d74e4099cee0da48e
-
C:\Users\Admin\AppData\Roaming\Noetfo\synic.exeFilesize
117KB
MD544ccaaff09eed1ff3de6c1debab07ab5
SHA1bba3b3205f3ea6c76913a1dda4ab2127a829d51b
SHA256365432f33823fc40f4066825613a0569b6d802225e22b6ef9260618cbb6bd7f6
SHA5127ad66d1412d05965f7d1b99e945876f9c7ca22faf2b25c7184ee0bec11f56ae951c32a82bdb7e0c18b4581ab340cac3cc314a00da01749b6692c8774307bd0af
-
C:\Users\Admin\AppData\Roaming\Noetfo\synic.exeFilesize
117KB
MD544ccaaff09eed1ff3de6c1debab07ab5
SHA1bba3b3205f3ea6c76913a1dda4ab2127a829d51b
SHA256365432f33823fc40f4066825613a0569b6d802225e22b6ef9260618cbb6bd7f6
SHA5127ad66d1412d05965f7d1b99e945876f9c7ca22faf2b25c7184ee0bec11f56ae951c32a82bdb7e0c18b4581ab340cac3cc314a00da01749b6692c8774307bd0af
-
\Users\Admin\AppData\Roaming\Noetfo\synic.exeFilesize
117KB
MD544ccaaff09eed1ff3de6c1debab07ab5
SHA1bba3b3205f3ea6c76913a1dda4ab2127a829d51b
SHA256365432f33823fc40f4066825613a0569b6d802225e22b6ef9260618cbb6bd7f6
SHA5127ad66d1412d05965f7d1b99e945876f9c7ca22faf2b25c7184ee0bec11f56ae951c32a82bdb7e0c18b4581ab340cac3cc314a00da01749b6692c8774307bd0af
-
memory/568-108-0x0000000000230000-0x0000000000255000-memory.dmpFilesize
148KB
-
memory/568-107-0x0000000000230000-0x0000000000255000-memory.dmpFilesize
148KB
-
memory/568-109-0x0000000000230000-0x0000000000255000-memory.dmpFilesize
148KB
-
memory/568-110-0x0000000000230000-0x0000000000255000-memory.dmpFilesize
148KB
-
memory/880-93-0x0000000000050000-0x0000000000075000-memory.dmpFilesize
148KB
-
memory/880-104-0x0000000000050000-0x0000000000075000-memory.dmpFilesize
148KB
-
memory/880-99-0x000000000006A5AD-mapping.dmp
-
memory/880-95-0x0000000000050000-0x0000000000075000-memory.dmpFilesize
148KB
-
memory/880-96-0x0000000000050000-0x0000000000075000-memory.dmpFilesize
148KB
-
memory/880-97-0x0000000000050000-0x0000000000075000-memory.dmpFilesize
148KB
-
memory/1048-90-0x0000000000530000-0x0000000000556000-memory.dmpFilesize
152KB
-
memory/1048-54-0x0000000075DF1000-0x0000000075DF3000-memory.dmpFilesize
8KB
-
memory/1048-55-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/1048-101-0x0000000000530000-0x0000000000555000-memory.dmpFilesize
148KB
-
memory/1048-100-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/1048-57-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/1048-83-0x0000000000530000-0x0000000000555000-memory.dmpFilesize
148KB
-
memory/1048-84-0x0000000000530000-0x0000000000555000-memory.dmpFilesize
148KB
-
memory/1048-85-0x0000000000530000-0x0000000000555000-memory.dmpFilesize
148KB
-
memory/1048-86-0x0000000000530000-0x0000000000555000-memory.dmpFilesize
148KB
-
memory/1048-87-0x0000000000530000-0x0000000000556000-memory.dmpFilesize
152KB
-
memory/1048-56-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/1116-68-0x0000000001BC0000-0x0000000001BE5000-memory.dmpFilesize
148KB
-
memory/1116-63-0x0000000001BC0000-0x0000000001BE5000-memory.dmpFilesize
148KB
-
memory/1116-65-0x0000000001BC0000-0x0000000001BE5000-memory.dmpFilesize
148KB
-
memory/1116-66-0x0000000001BC0000-0x0000000001BE5000-memory.dmpFilesize
148KB
-
memory/1116-67-0x0000000001BC0000-0x0000000001BE5000-memory.dmpFilesize
148KB
-
memory/1200-72-0x00000000001A0000-0x00000000001C5000-memory.dmpFilesize
148KB
-
memory/1200-71-0x00000000001A0000-0x00000000001C5000-memory.dmpFilesize
148KB
-
memory/1200-74-0x00000000001A0000-0x00000000001C5000-memory.dmpFilesize
148KB
-
memory/1200-73-0x00000000001A0000-0x00000000001C5000-memory.dmpFilesize
148KB
-
memory/1232-79-0x00000000029D0000-0x00000000029F5000-memory.dmpFilesize
148KB
-
memory/1232-78-0x00000000029D0000-0x00000000029F5000-memory.dmpFilesize
148KB
-
memory/1232-80-0x00000000029D0000-0x00000000029F5000-memory.dmpFilesize
148KB
-
memory/1232-77-0x00000000029D0000-0x00000000029F5000-memory.dmpFilesize
148KB
-
memory/1528-116-0x0000000003A50000-0x0000000003A75000-memory.dmpFilesize
148KB
-
memory/1528-115-0x0000000003A50000-0x0000000003A75000-memory.dmpFilesize
148KB
-
memory/1528-118-0x0000000003A50000-0x0000000003A75000-memory.dmpFilesize
148KB
-
memory/1528-117-0x0000000003A50000-0x0000000003A75000-memory.dmpFilesize
148KB
-
memory/1588-121-0x0000000000210000-0x0000000000235000-memory.dmpFilesize
148KB
-
memory/1588-122-0x0000000000210000-0x0000000000235000-memory.dmpFilesize
148KB
-
memory/1588-123-0x0000000000210000-0x0000000000235000-memory.dmpFilesize
148KB
-
memory/1588-124-0x0000000000210000-0x0000000000235000-memory.dmpFilesize
148KB
-
memory/1716-113-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/1716-88-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/1716-111-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/1716-89-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/1716-59-0x0000000000000000-mapping.dmp
-
memory/2032-127-0x0000000000310000-0x0000000000335000-memory.dmpFilesize
148KB
-
memory/2032-128-0x0000000000310000-0x0000000000335000-memory.dmpFilesize
148KB
-
memory/2032-129-0x0000000000310000-0x0000000000335000-memory.dmpFilesize
148KB
-
memory/2032-130-0x0000000000310000-0x0000000000335000-memory.dmpFilesize
148KB