Resubmissions

26-08-2022 19:38

220826-ycff3shgb3 10

26-08-2022 19:35

220826-yam35shfh8 7

Analysis

  • max time kernel
    119s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-08-2022 19:35

General

  • Target

    SYNAPSE X CRACKED/SYNAPSE X CRACKED/RobloxSynapse.exe

  • Size

    700.0MB

  • MD5

    99709192d1df7d5f7d8e583472818007

  • SHA1

    2914457c90f0a89c1ccbbdd96157907214e4b1fb

  • SHA256

    e6120b4444738b23157d1476615c68a719cb22017e3e48ee794003d162a4ed20

  • SHA512

    a416d828c81726a0842f85410c4bc3e0d516671c2284a30c82dc68fbe9375fab7d23cca6efcb4cd4077af910ae3843fe0b08ad31b0a87e0e6c9753fb1903257b

  • SSDEEP

    49152:C7G9SRPCkd/OJLDPXissDMRT6FacYKfQWNpGW78O+siqTDpQ:C7G0Nt42DCT6HYKSZqTG

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SYNAPSE X CRACKED\SYNAPSE X CRACKED\RobloxSynapse.exe
    "C:\Users\Admin\AppData\Local\Temp\SYNAPSE X CRACKED\SYNAPSE X CRACKED\RobloxSynapse.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3328
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4928
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
      2⤵
        PID:4284
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {c82192ee-6cb5-4bc0-9ef0-fb818773790a} -Embedding
      1⤵
        PID:3112
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:1384

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3328-142-0x000000001B490000-0x000000001B522000-memory.dmp

          Filesize

          584KB

        • memory/3328-133-0x0000000005800000-0x0000000005822000-memory.dmp

          Filesize

          136KB

        • memory/3328-132-0x0000000000180000-0x0000000000396000-memory.dmp

          Filesize

          2.1MB

        • memory/3328-143-0x000000001BAE0000-0x000000001C084000-memory.dmp

          Filesize

          5.6MB

        • memory/4284-149-0x0000000000400000-0x000000000045B000-memory.dmp

          Filesize

          364KB

        • memory/4284-148-0x0000000000400000-0x000000000045B000-memory.dmp

          Filesize

          364KB

        • memory/4284-147-0x0000000000400000-0x000000000045B000-memory.dmp

          Filesize

          364KB

        • memory/4284-146-0x0000000000400000-0x000000000045B000-memory.dmp

          Filesize

          364KB

        • memory/4284-145-0x0000000000400000-0x000000000045B000-memory.dmp

          Filesize

          364KB

        • memory/4284-144-0x0000000000000000-mapping.dmp

        • memory/4928-136-0x0000000004CA0000-0x00000000052C8000-memory.dmp

          Filesize

          6.2MB

        • memory/4928-141-0x00000000060D0000-0x00000000060EA000-memory.dmp

          Filesize

          104KB

        • memory/4928-140-0x00000000071F0000-0x000000000786A000-memory.dmp

          Filesize

          6.5MB

        • memory/4928-139-0x0000000005BC0000-0x0000000005BDE000-memory.dmp

          Filesize

          120KB

        • memory/4928-137-0x00000000053D0000-0x0000000005436000-memory.dmp

          Filesize

          408KB

        • memory/4928-138-0x0000000005440000-0x00000000054A6000-memory.dmp

          Filesize

          408KB

        • memory/4928-135-0x0000000004630000-0x0000000004666000-memory.dmp

          Filesize

          216KB

        • memory/4928-134-0x0000000000000000-mapping.dmp