Analysis

  • max time kernel
    132s
  • max time network
    193s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-02-2023 16:35

General

  • Target

    Synapse Launcher.exe

  • Size

    788KB

  • MD5

    20e1eb6b9b733bbd26ac8be5be603de2

  • SHA1

    36beefc2467d94b5ec9ae843b2bb099898581bed

  • SHA256

    73af760ad2ffdd931210079ef4b719a1a8c41a864e7d0a39faa5c1783fb140d6

  • SHA512

    d486fc560f0f6d94428b58ae041a17053659e78c49fe9154ca9e642d692da43aeb7dd3f03b1aeb428ea398bdbdfab743960c2f0fa885cd97bc31655be2e42e0b

  • SSDEEP

    12288:GoK0iEH0u6YNNCObkXxHDc/n3jUOSpUMh:nipzXonoOSpUMh

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 17 IoCs
  • Suspicious use of SendNotifyMessage 16 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Synapse Launcher.exe
    "C:\Users\Admin\AppData\Local\Temp\Synapse Launcher.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:916
    • C:\Users\Admin\AppData\Local\Temp\bin\36SQZVBvc79FeeH.bin
      "bin\36SQZVBvc79FeeH.bin"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4340
      • C:\Users\Admin\AppData\Local\Temp\bin\KvQn0sgbFI7NGTf.exe
        "bin\KvQn0sgbFI7NGTf.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1672
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 452 -p 1120 -ip 1120
    1⤵
      PID:4488
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1120 -s 1756
      1⤵
      • Program crash
      PID:2684
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:5072
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff99b6f4f50,0x7ff99b6f4f60,0x7ff99b6f4f70
        2⤵
          PID:2728
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1732,12971139668257561132,5299767860047949161,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1964 /prefetch:8
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4136
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1732,12971139668257561132,5299767860047949161,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1752 /prefetch:2
          2⤵
            PID:5012
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1732,12971139668257561132,5299767860047949161,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2260 /prefetch:8
            2⤵
              PID:1444
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1732,12971139668257561132,5299767860047949161,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3056 /prefetch:1
              2⤵
                PID:4492
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1732,12971139668257561132,5299767860047949161,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2936 /prefetch:1
                2⤵
                  PID:3556
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1732,12971139668257561132,5299767860047949161,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3560 /prefetch:1
                  2⤵
                    PID:4440
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1732,12971139668257561132,5299767860047949161,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4396 /prefetch:8
                    2⤵
                      PID:32
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1732,12971139668257561132,5299767860047949161,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4660 /prefetch:8
                      2⤵
                        PID:1016
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1732,12971139668257561132,5299767860047949161,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4636 /prefetch:8
                        2⤵
                          PID:4320
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1732,12971139668257561132,5299767860047949161,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 /prefetch:8
                          2⤵
                            PID:4596
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1732,12971139668257561132,5299767860047949161,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5344 /prefetch:8
                            2⤵
                              PID:4252
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1732,12971139668257561132,5299767860047949161,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5332 /prefetch:8
                              2⤵
                                PID:4700
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1732,12971139668257561132,5299767860047949161,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5320 /prefetch:8
                                2⤵
                                  PID:1004
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1732,12971139668257561132,5299767860047949161,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5308 /prefetch:8
                                  2⤵
                                    PID:664
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1732,12971139668257561132,5299767860047949161,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5296 /prefetch:8
                                    2⤵
                                      PID:4868
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1732,12971139668257561132,5299767860047949161,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5280 /prefetch:8
                                      2⤵
                                        PID:876
                                    • C:\Windows\System32\CompPkgSrv.exe
                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                      1⤵
                                        PID:3552

                                      Network

                                      MITRE ATT&CK Enterprise v6

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Temp\bin\36SQZVBvc79FeeH.bin

                                        Filesize

                                        2.4MB

                                        MD5

                                        89c1ed9b8f26601e87e78e9bef226f6b

                                        SHA1

                                        b7a9f82784e067eee0b9649ff756a8f209f153f6

                                        SHA256

                                        6cc9a31f3b52a785f27b0ac6dfc2cecfbb39b2a71ce1a19247524f81095a4df2

                                        SHA512

                                        31a3d2c4da8d1a12780f1baf6d2302b616ff4cb0db61126d815cb1d114387c6ae58f63305ed08cba097eeab288f282b5d5cd1c1de6e80873bb061ca8ebc9c802

                                      • C:\Users\Admin\AppData\Local\Temp\bin\36SQZVBvc79FeeH.bin

                                        Filesize

                                        2.4MB

                                        MD5

                                        89c1ed9b8f26601e87e78e9bef226f6b

                                        SHA1

                                        b7a9f82784e067eee0b9649ff756a8f209f153f6

                                        SHA256

                                        6cc9a31f3b52a785f27b0ac6dfc2cecfbb39b2a71ce1a19247524f81095a4df2

                                        SHA512

                                        31a3d2c4da8d1a12780f1baf6d2302b616ff4cb0db61126d815cb1d114387c6ae58f63305ed08cba097eeab288f282b5d5cd1c1de6e80873bb061ca8ebc9c802

                                      • C:\Users\Admin\AppData\Local\Temp\bin\KvQn0sgbFI7NGTf.exe

                                        Filesize

                                        2.4MB

                                        MD5

                                        89c1ed9b8f26601e87e78e9bef226f6b

                                        SHA1

                                        b7a9f82784e067eee0b9649ff756a8f209f153f6

                                        SHA256

                                        6cc9a31f3b52a785f27b0ac6dfc2cecfbb39b2a71ce1a19247524f81095a4df2

                                        SHA512

                                        31a3d2c4da8d1a12780f1baf6d2302b616ff4cb0db61126d815cb1d114387c6ae58f63305ed08cba097eeab288f282b5d5cd1c1de6e80873bb061ca8ebc9c802

                                      • C:\Users\Admin\AppData\Local\Temp\bin\KvQn0sgbFI7NGTf.exe

                                        Filesize

                                        2.4MB

                                        MD5

                                        89c1ed9b8f26601e87e78e9bef226f6b

                                        SHA1

                                        b7a9f82784e067eee0b9649ff756a8f209f153f6

                                        SHA256

                                        6cc9a31f3b52a785f27b0ac6dfc2cecfbb39b2a71ce1a19247524f81095a4df2

                                        SHA512

                                        31a3d2c4da8d1a12780f1baf6d2302b616ff4cb0db61126d815cb1d114387c6ae58f63305ed08cba097eeab288f282b5d5cd1c1de6e80873bb061ca8ebc9c802

                                      • C:\Users\Admin\AppData\Local\Temp\bin\SLAgent.dll

                                        Filesize

                                        6.0MB

                                        MD5

                                        9b248dfff1d2b73fd639324741fe2e08

                                        SHA1

                                        e82684cd6858a6712eff69ace1707b3bcd464105

                                        SHA256

                                        39943c30732988289ca346902f007a72124bd98b82e08b0b9739241cdab4018e

                                        SHA512

                                        56784a895f113088e3c92ccd96f354473e5d849fb9d0798868ff5e9477f60854e8bc7c9759c63417c9298f8702abab266722439b445977c6e940da393b8b696c

                                      • C:\Users\Admin\AppData\Local\Temp\bin\SLAgent.dll

                                        Filesize

                                        6.0MB

                                        MD5

                                        9b248dfff1d2b73fd639324741fe2e08

                                        SHA1

                                        e82684cd6858a6712eff69ace1707b3bcd464105

                                        SHA256

                                        39943c30732988289ca346902f007a72124bd98b82e08b0b9739241cdab4018e

                                        SHA512

                                        56784a895f113088e3c92ccd96f354473e5d849fb9d0798868ff5e9477f60854e8bc7c9759c63417c9298f8702abab266722439b445977c6e940da393b8b696c

                                      • C:\Users\Admin\AppData\Local\Temp\bin\SynapseInjector.dll

                                        Filesize

                                        6.0MB

                                        MD5

                                        9b248dfff1d2b73fd639324741fe2e08

                                        SHA1

                                        e82684cd6858a6712eff69ace1707b3bcd464105

                                        SHA256

                                        39943c30732988289ca346902f007a72124bd98b82e08b0b9739241cdab4018e

                                        SHA512

                                        56784a895f113088e3c92ccd96f354473e5d849fb9d0798868ff5e9477f60854e8bc7c9759c63417c9298f8702abab266722439b445977c6e940da393b8b696c

                                      • \??\pipe\crashpad_5072_YZDAGFWRECDLONJK

                                        MD5

                                        d41d8cd98f00b204e9800998ecf8427e

                                        SHA1

                                        da39a3ee5e6b4b0d3255bfef95601890afd80709

                                        SHA256

                                        e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                        SHA512

                                        cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                      • memory/916-133-0x0000000005880000-0x0000000005E24000-memory.dmp

                                        Filesize

                                        5.6MB

                                      • memory/916-134-0x0000000005370000-0x0000000005402000-memory.dmp

                                        Filesize

                                        584KB

                                      • memory/916-135-0x0000000008960000-0x0000000008982000-memory.dmp

                                        Filesize

                                        136KB

                                      • memory/916-132-0x00000000009F0000-0x0000000000ABA000-memory.dmp

                                        Filesize

                                        808KB

                                      • memory/1672-152-0x000000006D510000-0x000000006E436000-memory.dmp

                                        Filesize

                                        15.1MB

                                      • memory/1672-167-0x0000000009650000-0x000000000965E000-memory.dmp

                                        Filesize

                                        56KB

                                      • memory/1672-146-0x000000006D510000-0x000000006E436000-memory.dmp

                                        Filesize

                                        15.1MB

                                      • memory/1672-147-0x000000006D510000-0x000000006E436000-memory.dmp

                                        Filesize

                                        15.1MB

                                      • memory/1672-148-0x000000006D510000-0x000000006E436000-memory.dmp

                                        Filesize

                                        15.1MB

                                      • memory/1672-149-0x000000006D510000-0x000000006E436000-memory.dmp

                                        Filesize

                                        15.1MB

                                      • memory/1672-150-0x000000006D510000-0x000000006E436000-memory.dmp

                                        Filesize

                                        15.1MB

                                      • memory/1672-151-0x000000006D510000-0x000000006E436000-memory.dmp

                                        Filesize

                                        15.1MB

                                      • memory/1672-176-0x000000006D510000-0x000000006E436000-memory.dmp

                                        Filesize

                                        15.1MB

                                      • memory/1672-153-0x000000006D510000-0x000000006E436000-memory.dmp

                                        Filesize

                                        15.1MB

                                      • memory/1672-154-0x000000006D510000-0x000000006E436000-memory.dmp

                                        Filesize

                                        15.1MB

                                      • memory/1672-155-0x000000006D510000-0x000000006E436000-memory.dmp

                                        Filesize

                                        15.1MB

                                      • memory/1672-175-0x000000006D510000-0x000000006E436000-memory.dmp

                                        Filesize

                                        15.1MB

                                      • memory/1672-156-0x000000006D510000-0x000000006E436000-memory.dmp

                                        Filesize

                                        15.1MB

                                      • memory/1672-158-0x000000006D510000-0x000000006E436000-memory.dmp

                                        Filesize

                                        15.1MB

                                      • memory/1672-160-0x000000006D510000-0x000000006E436000-memory.dmp

                                        Filesize

                                        15.1MB

                                      • memory/1672-161-0x000000006D510000-0x000000006E436000-memory.dmp

                                        Filesize

                                        15.1MB

                                      • memory/1672-162-0x000000006D510000-0x000000006E436000-memory.dmp

                                        Filesize

                                        15.1MB

                                      • memory/1672-163-0x000000006D510000-0x000000006E436000-memory.dmp

                                        Filesize

                                        15.1MB

                                      • memory/1672-165-0x0000000007B40000-0x0000000007B48000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/1672-164-0x000000006D510000-0x000000006E436000-memory.dmp

                                        Filesize

                                        15.1MB

                                      • memory/1672-166-0x0000000009790000-0x00000000097C8000-memory.dmp

                                        Filesize

                                        224KB

                                      • memory/1672-141-0x0000000000000000-mapping.dmp

                                      • memory/1672-169-0x000000006D510000-0x000000006E436000-memory.dmp

                                        Filesize

                                        15.1MB

                                      • memory/1672-171-0x000000006D510000-0x000000006E436000-memory.dmp

                                        Filesize

                                        15.1MB

                                      • memory/1672-172-0x000000006D510000-0x000000006E436000-memory.dmp

                                        Filesize

                                        15.1MB

                                      • memory/1672-173-0x000000006D510000-0x000000006E436000-memory.dmp

                                        Filesize

                                        15.1MB

                                      • memory/1672-174-0x000000006D510000-0x000000006E436000-memory.dmp

                                        Filesize

                                        15.1MB

                                      • memory/4340-136-0x0000000000000000-mapping.dmp

                                      • memory/4340-139-0x0000000000190000-0x0000000000404000-memory.dmp

                                        Filesize

                                        2.5MB