Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
80s -
max time network
70s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2022, 04:40
Static task
static1
Behavioral task
behavioral1
Sample
Synapse Launcher.exe
Resource
win10-20220901-en
General
-
Target
Synapse Launcher.exe
-
Size
787KB
-
MD5
154e1239c1bb0e04b18f27aabffcd6e7
-
SHA1
0c72c4db91b8ae7e10271aece8db7efb5271f8ec
-
SHA256
93fc4441b3648a74d3bc72cc5f34ced564ceca74a5e560961178b42a6c8416b0
-
SHA512
52d4b91f4610a53ad41e0c73d129b218551ebb70e2162e1c268d84030dc77bc5411926a15fa44ba62f1a93e1c757287c842a217ea25602fac0db157742ee2a05
-
SSDEEP
6144:ARv5ZcPe5q67ue+MNhH0X4wz2HA/z0OqysLAilL2hJO5Hp2y9z89S49htWZ1BXtx:ARv5OIbhH0IwzyE8LyspL9z89x+zHFi
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ kbhRA41Nczhx.exe -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 1508 A5wh9eC.bin 3100 kbhRA41Nczhx.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion kbhRA41Nczhx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion kbhRA41Nczhx.exe -
Loads dropped DLL 1 IoCs
pid Process 3100 kbhRA41Nczhx.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA kbhRA41Nczhx.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 kbhRA41Nczhx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString kbhRA41Nczhx.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 kbhRA41Nczhx.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSReleaseDate kbhRA41Nczhx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer kbhRA41Nczhx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName kbhRA41Nczhx.exe Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS kbhRA41Nczhx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVendor kbhRA41Nczhx.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 880 Synapse Launcher.exe 1508 A5wh9eC.bin 3100 kbhRA41Nczhx.exe 3100 kbhRA41Nczhx.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 880 Synapse Launcher.exe Token: SeDebugPrivilege 1508 A5wh9eC.bin Token: SeDebugPrivilege 3100 kbhRA41Nczhx.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 880 wrote to memory of 1508 880 Synapse Launcher.exe 82 PID 880 wrote to memory of 1508 880 Synapse Launcher.exe 82 PID 880 wrote to memory of 1508 880 Synapse Launcher.exe 82 PID 1508 wrote to memory of 3100 1508 A5wh9eC.bin 84 PID 1508 wrote to memory of 3100 1508 A5wh9eC.bin 84 PID 1508 wrote to memory of 3100 1508 A5wh9eC.bin 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Synapse Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Synapse Launcher.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\bin\A5wh9eC.bin"bin\A5wh9eC.bin"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\bin\kbhRA41Nczhx.exe"bin\kbhRA41Nczhx.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3100
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5ab7ab99485c5fc2bceaae1050613761b
SHA10a28b44687d71f4d1caaf430b6b31b6f799d21c8
SHA256e82f550c965fdbb7429804008461311b53baf9b0bf2436c0b391665ea2bc4ad4
SHA5124061996c11e22fafa4d4be7b47aedc28f38fc410c84c274b24d5170f42a99240043ee4aa58d12ac4894ed1ef72a4f5eea539aac3e0875170de01b51b09ba4972
-
Filesize
2.1MB
MD5ab7ab99485c5fc2bceaae1050613761b
SHA10a28b44687d71f4d1caaf430b6b31b6f799d21c8
SHA256e82f550c965fdbb7429804008461311b53baf9b0bf2436c0b391665ea2bc4ad4
SHA5124061996c11e22fafa4d4be7b47aedc28f38fc410c84c274b24d5170f42a99240043ee4aa58d12ac4894ed1ef72a4f5eea539aac3e0875170de01b51b09ba4972
-
Filesize
6.0MB
MD59b248dfff1d2b73fd639324741fe2e08
SHA1e82684cd6858a6712eff69ace1707b3bcd464105
SHA25639943c30732988289ca346902f007a72124bd98b82e08b0b9739241cdab4018e
SHA51256784a895f113088e3c92ccd96f354473e5d849fb9d0798868ff5e9477f60854e8bc7c9759c63417c9298f8702abab266722439b445977c6e940da393b8b696c
-
Filesize
6.0MB
MD59b248dfff1d2b73fd639324741fe2e08
SHA1e82684cd6858a6712eff69ace1707b3bcd464105
SHA25639943c30732988289ca346902f007a72124bd98b82e08b0b9739241cdab4018e
SHA51256784a895f113088e3c92ccd96f354473e5d849fb9d0798868ff5e9477f60854e8bc7c9759c63417c9298f8702abab266722439b445977c6e940da393b8b696c
-
Filesize
6.0MB
MD59b248dfff1d2b73fd639324741fe2e08
SHA1e82684cd6858a6712eff69ace1707b3bcd464105
SHA25639943c30732988289ca346902f007a72124bd98b82e08b0b9739241cdab4018e
SHA51256784a895f113088e3c92ccd96f354473e5d849fb9d0798868ff5e9477f60854e8bc7c9759c63417c9298f8702abab266722439b445977c6e940da393b8b696c
-
Filesize
2.1MB
MD5ab7ab99485c5fc2bceaae1050613761b
SHA10a28b44687d71f4d1caaf430b6b31b6f799d21c8
SHA256e82f550c965fdbb7429804008461311b53baf9b0bf2436c0b391665ea2bc4ad4
SHA5124061996c11e22fafa4d4be7b47aedc28f38fc410c84c274b24d5170f42a99240043ee4aa58d12ac4894ed1ef72a4f5eea539aac3e0875170de01b51b09ba4972
-
Filesize
2.1MB
MD5ab7ab99485c5fc2bceaae1050613761b
SHA10a28b44687d71f4d1caaf430b6b31b6f799d21c8
SHA256e82f550c965fdbb7429804008461311b53baf9b0bf2436c0b391665ea2bc4ad4
SHA5124061996c11e22fafa4d4be7b47aedc28f38fc410c84c274b24d5170f42a99240043ee4aa58d12ac4894ed1ef72a4f5eea539aac3e0875170de01b51b09ba4972