Analysis
-
max time kernel
119s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2022 19:35
Static task
static1
Behavioral task
behavioral1
Sample
SYNAPSE X CRACKED/SYNAPSE X CRACKED/RobloxSynapse.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral2
Sample
SYNAPSE X CRACKED/SYNAPSE X CRACKED/php5ts.dll
Resource
win10v2004-20220812-en
General
-
Target
SYNAPSE X CRACKED/SYNAPSE X CRACKED/RobloxSynapse.exe
-
Size
700.0MB
-
MD5
99709192d1df7d5f7d8e583472818007
-
SHA1
2914457c90f0a89c1ccbbdd96157907214e4b1fb
-
SHA256
e6120b4444738b23157d1476615c68a719cb22017e3e48ee794003d162a4ed20
-
SHA512
a416d828c81726a0842f85410c4bc3e0d516671c2284a30c82dc68fbe9375fab7d23cca6efcb4cd4077af910ae3843fe0b08ad31b0a87e0e6c9753fb1903257b
-
SSDEEP
49152:C7G9SRPCkd/OJLDPXissDMRT6FacYKfQWNpGW78O+siqTDpQ:C7G0Nt42DCT6HYKSZqTG
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
RobloxSynapse.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation RobloxSynapse.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
RobloxSynapse.exedescription pid process target process PID 3328 set thread context of 4284 3328 RobloxSynapse.exe aspnet_compiler.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exeRobloxSynapse.exepid process 4928 powershell.exe 4928 powershell.exe 3328 RobloxSynapse.exe 3328 RobloxSynapse.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
RobloxSynapse.exepowershell.exedescription pid process Token: SeDebugPrivilege 3328 RobloxSynapse.exe Token: SeDebugPrivilege 4928 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
RobloxSynapse.exedescription pid process target process PID 3328 wrote to memory of 4928 3328 RobloxSynapse.exe powershell.exe PID 3328 wrote to memory of 4928 3328 RobloxSynapse.exe powershell.exe PID 3328 wrote to memory of 4928 3328 RobloxSynapse.exe powershell.exe PID 3328 wrote to memory of 4284 3328 RobloxSynapse.exe aspnet_compiler.exe PID 3328 wrote to memory of 4284 3328 RobloxSynapse.exe aspnet_compiler.exe PID 3328 wrote to memory of 4284 3328 RobloxSynapse.exe aspnet_compiler.exe PID 3328 wrote to memory of 4284 3328 RobloxSynapse.exe aspnet_compiler.exe PID 3328 wrote to memory of 4284 3328 RobloxSynapse.exe aspnet_compiler.exe PID 3328 wrote to memory of 4284 3328 RobloxSynapse.exe aspnet_compiler.exe PID 3328 wrote to memory of 4284 3328 RobloxSynapse.exe aspnet_compiler.exe PID 3328 wrote to memory of 4284 3328 RobloxSynapse.exe aspnet_compiler.exe PID 3328 wrote to memory of 4284 3328 RobloxSynapse.exe aspnet_compiler.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SYNAPSE X CRACKED\SYNAPSE X CRACKED\RobloxSynapse.exe"C:\Users\Admin\AppData\Local\Temp\SYNAPSE X CRACKED\SYNAPSE X CRACKED\RobloxSynapse.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4928 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe2⤵PID:4284
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {c82192ee-6cb5-4bc0-9ef0-fb818773790a} -Embedding1⤵PID:3112
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1384