Analysis
-
max time kernel
58s -
max time network
58s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14-03-2023 04:03
Static task
static1
Behavioral task
behavioral1
Sample
synapse-v2-launcher-12-5-22.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
synapse-v2-launcher-12-5-22.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Synapse Launcher.exe
Resource
win7-20230220-en
General
-
Target
Synapse Launcher.exe
-
Size
788KB
-
MD5
20e1eb6b9b733bbd26ac8be5be603de2
-
SHA1
36beefc2467d94b5ec9ae843b2bb099898581bed
-
SHA256
73af760ad2ffdd931210079ef4b719a1a8c41a864e7d0a39faa5c1783fb140d6
-
SHA512
d486fc560f0f6d94428b58ae041a17053659e78c49fe9154ca9e642d692da43aeb7dd3f03b1aeb428ea398bdbdfab743960c2f0fa885cd97bc31655be2e42e0b
-
SSDEEP
12288:GoK0iEH0u6YNNCObkXxHDc/n3jUOSpUMh:nipzXonoOSpUMh
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
UgMDlwY6BUkd0Hj7Uu.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ UgMDlwY6BUkd0Hj7Uu.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
UgMDlwY6BUkd0Hj7Uu.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion UgMDlwY6BUkd0Hj7Uu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion UgMDlwY6BUkd0Hj7Uu.exe -
Executes dropped EXE 2 IoCs
Processes:
plu0jsqcE4EjBY.binUgMDlwY6BUkd0Hj7Uu.exepid Process 1856 plu0jsqcE4EjBY.bin 1944 UgMDlwY6BUkd0Hj7Uu.exe -
Loads dropped DLL 6 IoCs
Processes:
Synapse Launcher.exeplu0jsqcE4EjBY.binUgMDlwY6BUkd0Hj7Uu.exepid Process 2036 Synapse Launcher.exe 1856 plu0jsqcE4EjBY.bin 1944 UgMDlwY6BUkd0Hj7Uu.exe 1944 UgMDlwY6BUkd0Hj7Uu.exe 1944 UgMDlwY6BUkd0Hj7Uu.exe 1944 UgMDlwY6BUkd0Hj7Uu.exe -
Processes:
UgMDlwY6BUkd0Hj7Uu.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA UgMDlwY6BUkd0Hj7Uu.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
UgMDlwY6BUkd0Hj7Uu.exedescription ioc Process Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 UgMDlwY6BUkd0Hj7Uu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString UgMDlwY6BUkd0Hj7Uu.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
Processes:
UgMDlwY6BUkd0Hj7Uu.exedescription ioc Process Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS UgMDlwY6BUkd0Hj7Uu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVendor UgMDlwY6BUkd0Hj7Uu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSReleaseDate UgMDlwY6BUkd0Hj7Uu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer UgMDlwY6BUkd0Hj7Uu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName UgMDlwY6BUkd0Hj7Uu.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Synapse Launcher.exeplu0jsqcE4EjBY.binUgMDlwY6BUkd0Hj7Uu.exepid Process 2036 Synapse Launcher.exe 1856 plu0jsqcE4EjBY.bin 1944 UgMDlwY6BUkd0Hj7Uu.exe 1944 UgMDlwY6BUkd0Hj7Uu.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Synapse Launcher.exeplu0jsqcE4EjBY.binUgMDlwY6BUkd0Hj7Uu.exedescription pid Process Token: SeDebugPrivilege 2036 Synapse Launcher.exe Token: SeDebugPrivilege 1856 plu0jsqcE4EjBY.bin Token: SeDebugPrivilege 1944 UgMDlwY6BUkd0Hj7Uu.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
Synapse Launcher.exeplu0jsqcE4EjBY.bindescription pid Process procid_target PID 2036 wrote to memory of 1856 2036 Synapse Launcher.exe 27 PID 2036 wrote to memory of 1856 2036 Synapse Launcher.exe 27 PID 2036 wrote to memory of 1856 2036 Synapse Launcher.exe 27 PID 2036 wrote to memory of 1856 2036 Synapse Launcher.exe 27 PID 2036 wrote to memory of 1856 2036 Synapse Launcher.exe 27 PID 2036 wrote to memory of 1856 2036 Synapse Launcher.exe 27 PID 2036 wrote to memory of 1856 2036 Synapse Launcher.exe 27 PID 1856 wrote to memory of 1944 1856 plu0jsqcE4EjBY.bin 28 PID 1856 wrote to memory of 1944 1856 plu0jsqcE4EjBY.bin 28 PID 1856 wrote to memory of 1944 1856 plu0jsqcE4EjBY.bin 28 PID 1856 wrote to memory of 1944 1856 plu0jsqcE4EjBY.bin 28 PID 1856 wrote to memory of 1944 1856 plu0jsqcE4EjBY.bin 28 PID 1856 wrote to memory of 1944 1856 plu0jsqcE4EjBY.bin 28 PID 1856 wrote to memory of 1944 1856 plu0jsqcE4EjBY.bin 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Synapse Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Synapse Launcher.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\bin\plu0jsqcE4EjBY.bin"bin\plu0jsqcE4EjBY.bin"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\bin\UgMDlwY6BUkd0Hj7Uu.exe"bin\UgMDlwY6BUkd0Hj7Uu.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5a44554d38b7a25a7ab2320fe731c5298
SHA1c287a88fd3a064b387888f4bbc37a0630c877253
SHA25635980974bdba6d5dd6a4dc1072e33aab77f72f56c46779cb0216e4801dcc36ab
SHA512bd8956b7e8ca6d1129fbbb950dd913183b3e92601c2c900aed26d695782e4663654ac57074e1f0f2efcf9cced969487162910dc9bb52b42572d61994b07f2aad
-
Filesize
6.0MB
MD59b248dfff1d2b73fd639324741fe2e08
SHA1e82684cd6858a6712eff69ace1707b3bcd464105
SHA25639943c30732988289ca346902f007a72124bd98b82e08b0b9739241cdab4018e
SHA51256784a895f113088e3c92ccd96f354473e5d849fb9d0798868ff5e9477f60854e8bc7c9759c63417c9298f8702abab266722439b445977c6e940da393b8b696c
-
Filesize
6.0MB
MD59b248dfff1d2b73fd639324741fe2e08
SHA1e82684cd6858a6712eff69ace1707b3bcd464105
SHA25639943c30732988289ca346902f007a72124bd98b82e08b0b9739241cdab4018e
SHA51256784a895f113088e3c92ccd96f354473e5d849fb9d0798868ff5e9477f60854e8bc7c9759c63417c9298f8702abab266722439b445977c6e940da393b8b696c
-
Filesize
2.4MB
MD589c1ed9b8f26601e87e78e9bef226f6b
SHA1b7a9f82784e067eee0b9649ff756a8f209f153f6
SHA2566cc9a31f3b52a785f27b0ac6dfc2cecfbb39b2a71ce1a19247524f81095a4df2
SHA51231a3d2c4da8d1a12780f1baf6d2302b616ff4cb0db61126d815cb1d114387c6ae58f63305ed08cba097eeab288f282b5d5cd1c1de6e80873bb061ca8ebc9c802
-
Filesize
2.4MB
MD589c1ed9b8f26601e87e78e9bef226f6b
SHA1b7a9f82784e067eee0b9649ff756a8f209f153f6
SHA2566cc9a31f3b52a785f27b0ac6dfc2cecfbb39b2a71ce1a19247524f81095a4df2
SHA51231a3d2c4da8d1a12780f1baf6d2302b616ff4cb0db61126d815cb1d114387c6ae58f63305ed08cba097eeab288f282b5d5cd1c1de6e80873bb061ca8ebc9c802
-
Filesize
2.4MB
MD589c1ed9b8f26601e87e78e9bef226f6b
SHA1b7a9f82784e067eee0b9649ff756a8f209f153f6
SHA2566cc9a31f3b52a785f27b0ac6dfc2cecfbb39b2a71ce1a19247524f81095a4df2
SHA51231a3d2c4da8d1a12780f1baf6d2302b616ff4cb0db61126d815cb1d114387c6ae58f63305ed08cba097eeab288f282b5d5cd1c1de6e80873bb061ca8ebc9c802
-
Filesize
2.4MB
MD589c1ed9b8f26601e87e78e9bef226f6b
SHA1b7a9f82784e067eee0b9649ff756a8f209f153f6
SHA2566cc9a31f3b52a785f27b0ac6dfc2cecfbb39b2a71ce1a19247524f81095a4df2
SHA51231a3d2c4da8d1a12780f1baf6d2302b616ff4cb0db61126d815cb1d114387c6ae58f63305ed08cba097eeab288f282b5d5cd1c1de6e80873bb061ca8ebc9c802
-
Filesize
2.4MB
MD589c1ed9b8f26601e87e78e9bef226f6b
SHA1b7a9f82784e067eee0b9649ff756a8f209f153f6
SHA2566cc9a31f3b52a785f27b0ac6dfc2cecfbb39b2a71ce1a19247524f81095a4df2
SHA51231a3d2c4da8d1a12780f1baf6d2302b616ff4cb0db61126d815cb1d114387c6ae58f63305ed08cba097eeab288f282b5d5cd1c1de6e80873bb061ca8ebc9c802
-
Filesize
1.3MB
MD5a44554d38b7a25a7ab2320fe731c5298
SHA1c287a88fd3a064b387888f4bbc37a0630c877253
SHA25635980974bdba6d5dd6a4dc1072e33aab77f72f56c46779cb0216e4801dcc36ab
SHA512bd8956b7e8ca6d1129fbbb950dd913183b3e92601c2c900aed26d695782e4663654ac57074e1f0f2efcf9cced969487162910dc9bb52b42572d61994b07f2aad
-
Filesize
1.3MB
MD5a44554d38b7a25a7ab2320fe731c5298
SHA1c287a88fd3a064b387888f4bbc37a0630c877253
SHA25635980974bdba6d5dd6a4dc1072e33aab77f72f56c46779cb0216e4801dcc36ab
SHA512bd8956b7e8ca6d1129fbbb950dd913183b3e92601c2c900aed26d695782e4663654ac57074e1f0f2efcf9cced969487162910dc9bb52b42572d61994b07f2aad
-
Filesize
1.3MB
MD5a44554d38b7a25a7ab2320fe731c5298
SHA1c287a88fd3a064b387888f4bbc37a0630c877253
SHA25635980974bdba6d5dd6a4dc1072e33aab77f72f56c46779cb0216e4801dcc36ab
SHA512bd8956b7e8ca6d1129fbbb950dd913183b3e92601c2c900aed26d695782e4663654ac57074e1f0f2efcf9cced969487162910dc9bb52b42572d61994b07f2aad
-
Filesize
6.0MB
MD59b248dfff1d2b73fd639324741fe2e08
SHA1e82684cd6858a6712eff69ace1707b3bcd464105
SHA25639943c30732988289ca346902f007a72124bd98b82e08b0b9739241cdab4018e
SHA51256784a895f113088e3c92ccd96f354473e5d849fb9d0798868ff5e9477f60854e8bc7c9759c63417c9298f8702abab266722439b445977c6e940da393b8b696c
-
Filesize
2.4MB
MD589c1ed9b8f26601e87e78e9bef226f6b
SHA1b7a9f82784e067eee0b9649ff756a8f209f153f6
SHA2566cc9a31f3b52a785f27b0ac6dfc2cecfbb39b2a71ce1a19247524f81095a4df2
SHA51231a3d2c4da8d1a12780f1baf6d2302b616ff4cb0db61126d815cb1d114387c6ae58f63305ed08cba097eeab288f282b5d5cd1c1de6e80873bb061ca8ebc9c802
-
Filesize
2.4MB
MD589c1ed9b8f26601e87e78e9bef226f6b
SHA1b7a9f82784e067eee0b9649ff756a8f209f153f6
SHA2566cc9a31f3b52a785f27b0ac6dfc2cecfbb39b2a71ce1a19247524f81095a4df2
SHA51231a3d2c4da8d1a12780f1baf6d2302b616ff4cb0db61126d815cb1d114387c6ae58f63305ed08cba097eeab288f282b5d5cd1c1de6e80873bb061ca8ebc9c802