Analysis
-
max time kernel
132s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2023 16:35
Static task
static1
Behavioral task
behavioral1
Sample
synapse-v2-launcher-12-5-22.zip
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
synapse-v2-launcher-12-5-22.zip
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
README.txt
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
README.txt
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
Synapse Launcher.exe
Resource
win7-20220901-en
General
-
Target
Synapse Launcher.exe
-
Size
788KB
-
MD5
20e1eb6b9b733bbd26ac8be5be603de2
-
SHA1
36beefc2467d94b5ec9ae843b2bb099898581bed
-
SHA256
73af760ad2ffdd931210079ef4b719a1a8c41a864e7d0a39faa5c1783fb140d6
-
SHA512
d486fc560f0f6d94428b58ae041a17053659e78c49fe9154ca9e642d692da43aeb7dd3f03b1aeb428ea398bdbdfab743960c2f0fa885cd97bc31655be2e42e0b
-
SSDEEP
12288:GoK0iEH0u6YNNCObkXxHDc/n3jUOSpUMh:nipzXonoOSpUMh
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
KvQn0sgbFI7NGTf.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ KvQn0sgbFI7NGTf.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
KvQn0sgbFI7NGTf.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion KvQn0sgbFI7NGTf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion KvQn0sgbFI7NGTf.exe -
Executes dropped EXE 2 IoCs
Processes:
36SQZVBvc79FeeH.binKvQn0sgbFI7NGTf.exepid Process 4340 36SQZVBvc79FeeH.bin 1672 KvQn0sgbFI7NGTf.exe -
Loads dropped DLL 1 IoCs
Processes:
KvQn0sgbFI7NGTf.exepid Process 1672 KvQn0sgbFI7NGTf.exe -
Processes:
KvQn0sgbFI7NGTf.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA KvQn0sgbFI7NGTf.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2684 1120 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
Synapse Launcher.exe36SQZVBvc79FeeH.binKvQn0sgbFI7NGTf.exechrome.exepid Process 916 Synapse Launcher.exe 4340 36SQZVBvc79FeeH.bin 1672 KvQn0sgbFI7NGTf.exe 4136 chrome.exe 4136 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid Process 5072 chrome.exe 5072 chrome.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Synapse Launcher.exe36SQZVBvc79FeeH.binKvQn0sgbFI7NGTf.exedescription pid Process Token: SeDebugPrivilege 916 Synapse Launcher.exe Token: SeDebugPrivilege 4340 36SQZVBvc79FeeH.bin Token: SeDebugPrivilege 1672 KvQn0sgbFI7NGTf.exe -
Suspicious use of FindShellTrayWindow 17 IoCs
Processes:
chrome.exepid Process 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe -
Suspicious use of SendNotifyMessage 16 IoCs
Processes:
chrome.exepid Process 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Synapse Launcher.exe36SQZVBvc79FeeH.binchrome.exedescription pid Process procid_target PID 916 wrote to memory of 4340 916 Synapse Launcher.exe 86 PID 916 wrote to memory of 4340 916 Synapse Launcher.exe 86 PID 916 wrote to memory of 4340 916 Synapse Launcher.exe 86 PID 4340 wrote to memory of 1672 4340 36SQZVBvc79FeeH.bin 87 PID 4340 wrote to memory of 1672 4340 36SQZVBvc79FeeH.bin 87 PID 4340 wrote to memory of 1672 4340 36SQZVBvc79FeeH.bin 87 PID 5072 wrote to memory of 2728 5072 chrome.exe 95 PID 5072 wrote to memory of 2728 5072 chrome.exe 95 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 5012 5072 chrome.exe 99 PID 5072 wrote to memory of 4136 5072 chrome.exe 98 PID 5072 wrote to memory of 4136 5072 chrome.exe 98 PID 5072 wrote to memory of 1444 5072 chrome.exe 100 PID 5072 wrote to memory of 1444 5072 chrome.exe 100 PID 5072 wrote to memory of 1444 5072 chrome.exe 100 PID 5072 wrote to memory of 1444 5072 chrome.exe 100 PID 5072 wrote to memory of 1444 5072 chrome.exe 100 PID 5072 wrote to memory of 1444 5072 chrome.exe 100 PID 5072 wrote to memory of 1444 5072 chrome.exe 100 PID 5072 wrote to memory of 1444 5072 chrome.exe 100 PID 5072 wrote to memory of 1444 5072 chrome.exe 100 PID 5072 wrote to memory of 1444 5072 chrome.exe 100 PID 5072 wrote to memory of 1444 5072 chrome.exe 100 PID 5072 wrote to memory of 1444 5072 chrome.exe 100 PID 5072 wrote to memory of 1444 5072 chrome.exe 100 PID 5072 wrote to memory of 1444 5072 chrome.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\Synapse Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Synapse Launcher.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Local\Temp\bin\36SQZVBvc79FeeH.bin"bin\36SQZVBvc79FeeH.bin"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\bin\KvQn0sgbFI7NGTf.exe"bin\KvQn0sgbFI7NGTf.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 452 -p 1120 -ip 11201⤵PID:4488
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1120 -s 17561⤵
- Program crash
PID:2684
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff99b6f4f50,0x7ff99b6f4f60,0x7ff99b6f4f702⤵PID:2728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1732,12971139668257561132,5299767860047949161,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1964 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1732,12971139668257561132,5299767860047949161,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1752 /prefetch:22⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1732,12971139668257561132,5299767860047949161,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2260 /prefetch:82⤵PID:1444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1732,12971139668257561132,5299767860047949161,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3056 /prefetch:12⤵PID:4492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1732,12971139668257561132,5299767860047949161,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2936 /prefetch:12⤵PID:3556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1732,12971139668257561132,5299767860047949161,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3560 /prefetch:12⤵PID:4440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1732,12971139668257561132,5299767860047949161,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4396 /prefetch:82⤵PID:32
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1732,12971139668257561132,5299767860047949161,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4660 /prefetch:82⤵PID:1016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1732,12971139668257561132,5299767860047949161,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4636 /prefetch:82⤵PID:4320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1732,12971139668257561132,5299767860047949161,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 /prefetch:82⤵PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1732,12971139668257561132,5299767860047949161,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5344 /prefetch:82⤵PID:4252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1732,12971139668257561132,5299767860047949161,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5332 /prefetch:82⤵PID:4700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1732,12971139668257561132,5299767860047949161,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5320 /prefetch:82⤵PID:1004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1732,12971139668257561132,5299767860047949161,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5308 /prefetch:82⤵PID:664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1732,12971139668257561132,5299767860047949161,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5296 /prefetch:82⤵PID:4868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1732,12971139668257561132,5299767860047949161,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5280 /prefetch:82⤵PID:876
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3552
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD589c1ed9b8f26601e87e78e9bef226f6b
SHA1b7a9f82784e067eee0b9649ff756a8f209f153f6
SHA2566cc9a31f3b52a785f27b0ac6dfc2cecfbb39b2a71ce1a19247524f81095a4df2
SHA51231a3d2c4da8d1a12780f1baf6d2302b616ff4cb0db61126d815cb1d114387c6ae58f63305ed08cba097eeab288f282b5d5cd1c1de6e80873bb061ca8ebc9c802
-
Filesize
2.4MB
MD589c1ed9b8f26601e87e78e9bef226f6b
SHA1b7a9f82784e067eee0b9649ff756a8f209f153f6
SHA2566cc9a31f3b52a785f27b0ac6dfc2cecfbb39b2a71ce1a19247524f81095a4df2
SHA51231a3d2c4da8d1a12780f1baf6d2302b616ff4cb0db61126d815cb1d114387c6ae58f63305ed08cba097eeab288f282b5d5cd1c1de6e80873bb061ca8ebc9c802
-
Filesize
2.4MB
MD589c1ed9b8f26601e87e78e9bef226f6b
SHA1b7a9f82784e067eee0b9649ff756a8f209f153f6
SHA2566cc9a31f3b52a785f27b0ac6dfc2cecfbb39b2a71ce1a19247524f81095a4df2
SHA51231a3d2c4da8d1a12780f1baf6d2302b616ff4cb0db61126d815cb1d114387c6ae58f63305ed08cba097eeab288f282b5d5cd1c1de6e80873bb061ca8ebc9c802
-
Filesize
2.4MB
MD589c1ed9b8f26601e87e78e9bef226f6b
SHA1b7a9f82784e067eee0b9649ff756a8f209f153f6
SHA2566cc9a31f3b52a785f27b0ac6dfc2cecfbb39b2a71ce1a19247524f81095a4df2
SHA51231a3d2c4da8d1a12780f1baf6d2302b616ff4cb0db61126d815cb1d114387c6ae58f63305ed08cba097eeab288f282b5d5cd1c1de6e80873bb061ca8ebc9c802
-
Filesize
6.0MB
MD59b248dfff1d2b73fd639324741fe2e08
SHA1e82684cd6858a6712eff69ace1707b3bcd464105
SHA25639943c30732988289ca346902f007a72124bd98b82e08b0b9739241cdab4018e
SHA51256784a895f113088e3c92ccd96f354473e5d849fb9d0798868ff5e9477f60854e8bc7c9759c63417c9298f8702abab266722439b445977c6e940da393b8b696c
-
Filesize
6.0MB
MD59b248dfff1d2b73fd639324741fe2e08
SHA1e82684cd6858a6712eff69ace1707b3bcd464105
SHA25639943c30732988289ca346902f007a72124bd98b82e08b0b9739241cdab4018e
SHA51256784a895f113088e3c92ccd96f354473e5d849fb9d0798868ff5e9477f60854e8bc7c9759c63417c9298f8702abab266722439b445977c6e940da393b8b696c
-
Filesize
6.0MB
MD59b248dfff1d2b73fd639324741fe2e08
SHA1e82684cd6858a6712eff69ace1707b3bcd464105
SHA25639943c30732988289ca346902f007a72124bd98b82e08b0b9739241cdab4018e
SHA51256784a895f113088e3c92ccd96f354473e5d849fb9d0798868ff5e9477f60854e8bc7c9759c63417c9298f8702abab266722439b445977c6e940da393b8b696c
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e