Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
25-07-2023 20:11
Static task
static1
Behavioral task
behavioral1
Sample
Synapse Launcher.exe
Resource
win7-20230712-en
General
-
Target
Synapse Launcher.exe
-
Size
788KB
-
MD5
20e1eb6b9b733bbd26ac8be5be603de2
-
SHA1
36beefc2467d94b5ec9ae843b2bb099898581bed
-
SHA256
73af760ad2ffdd931210079ef4b719a1a8c41a864e7d0a39faa5c1783fb140d6
-
SHA512
d486fc560f0f6d94428b58ae041a17053659e78c49fe9154ca9e642d692da43aeb7dd3f03b1aeb428ea398bdbdfab743960c2f0fa885cd97bc31655be2e42e0b
-
SSDEEP
12288:GoK0iEH0u6YNNCObkXxHDc/n3jUOSpUMh:nipzXonoOSpUMh
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
rT4fQ.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rT4fQ.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
rT4fQ.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rT4fQ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rT4fQ.exe -
Executes dropped EXE 2 IoCs
Processes:
1hQQigytNJiXybaYP0.binrT4fQ.exepid Process 2012 1hQQigytNJiXybaYP0.bin 2792 rT4fQ.exe -
Loads dropped DLL 3 IoCs
Processes:
Synapse Launcher.exe1hQQigytNJiXybaYP0.binrT4fQ.exepid Process 540 Synapse Launcher.exe 2012 1hQQigytNJiXybaYP0.bin 2792 rT4fQ.exe -
Processes:
rT4fQ.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rT4fQ.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
rT4fQ.exedescription ioc Process Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rT4fQ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rT4fQ.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
Processes:
rT4fQ.exedescription ioc Process Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rT4fQ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVendor rT4fQ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSReleaseDate rT4fQ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer rT4fQ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rT4fQ.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Synapse Launcher.exe1hQQigytNJiXybaYP0.binrT4fQ.exepid Process 540 Synapse Launcher.exe 2012 1hQQigytNJiXybaYP0.bin 2792 rT4fQ.exe 2792 rT4fQ.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Synapse Launcher.exe1hQQigytNJiXybaYP0.binrT4fQ.exedescription pid Process Token: SeDebugPrivilege 540 Synapse Launcher.exe Token: SeDebugPrivilege 2012 1hQQigytNJiXybaYP0.bin Token: SeDebugPrivilege 2792 rT4fQ.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
Synapse Launcher.exe1hQQigytNJiXybaYP0.bindescription pid Process procid_target PID 540 wrote to memory of 2012 540 Synapse Launcher.exe 30 PID 540 wrote to memory of 2012 540 Synapse Launcher.exe 30 PID 540 wrote to memory of 2012 540 Synapse Launcher.exe 30 PID 540 wrote to memory of 2012 540 Synapse Launcher.exe 30 PID 540 wrote to memory of 2012 540 Synapse Launcher.exe 30 PID 540 wrote to memory of 2012 540 Synapse Launcher.exe 30 PID 540 wrote to memory of 2012 540 Synapse Launcher.exe 30 PID 2012 wrote to memory of 2792 2012 1hQQigytNJiXybaYP0.bin 31 PID 2012 wrote to memory of 2792 2012 1hQQigytNJiXybaYP0.bin 31 PID 2012 wrote to memory of 2792 2012 1hQQigytNJiXybaYP0.bin 31 PID 2012 wrote to memory of 2792 2012 1hQQigytNJiXybaYP0.bin 31 PID 2012 wrote to memory of 2792 2012 1hQQigytNJiXybaYP0.bin 31 PID 2012 wrote to memory of 2792 2012 1hQQigytNJiXybaYP0.bin 31 PID 2012 wrote to memory of 2792 2012 1hQQigytNJiXybaYP0.bin 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Synapse Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Synapse Launcher.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\bin\1hQQigytNJiXybaYP0.bin"bin\1hQQigytNJiXybaYP0.bin"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\bin\rT4fQ.exe"bin\rT4fQ.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD5027834b2ebc7f1b02143d8e7f8c17aab
SHA1c4d19cab893e0fcb19d5de25e26e441faceb88ee
SHA2565b740dd5064d571eb065d94e252b11dd2c5ff0f82e7932c06c4acfd55e5a0cb1
SHA5120c87b7ddc9ec8b32ed9a787cb633d232cca78cb58d0b42fe2ffc7206498d2121c608b45b6f5cc696cf96d2b771385036abfb2b19b6d1a6d6d133dc7a867af353
-
Filesize
2.4MB
MD5027834b2ebc7f1b02143d8e7f8c17aab
SHA1c4d19cab893e0fcb19d5de25e26e441faceb88ee
SHA2565b740dd5064d571eb065d94e252b11dd2c5ff0f82e7932c06c4acfd55e5a0cb1
SHA5120c87b7ddc9ec8b32ed9a787cb633d232cca78cb58d0b42fe2ffc7206498d2121c608b45b6f5cc696cf96d2b771385036abfb2b19b6d1a6d6d133dc7a867af353
-
Filesize
6.0MB
MD59b248dfff1d2b73fd639324741fe2e08
SHA1e82684cd6858a6712eff69ace1707b3bcd464105
SHA25639943c30732988289ca346902f007a72124bd98b82e08b0b9739241cdab4018e
SHA51256784a895f113088e3c92ccd96f354473e5d849fb9d0798868ff5e9477f60854e8bc7c9759c63417c9298f8702abab266722439b445977c6e940da393b8b696c
-
Filesize
6.0MB
MD59b248dfff1d2b73fd639324741fe2e08
SHA1e82684cd6858a6712eff69ace1707b3bcd464105
SHA25639943c30732988289ca346902f007a72124bd98b82e08b0b9739241cdab4018e
SHA51256784a895f113088e3c92ccd96f354473e5d849fb9d0798868ff5e9477f60854e8bc7c9759c63417c9298f8702abab266722439b445977c6e940da393b8b696c
-
Filesize
2.4MB
MD5027834b2ebc7f1b02143d8e7f8c17aab
SHA1c4d19cab893e0fcb19d5de25e26e441faceb88ee
SHA2565b740dd5064d571eb065d94e252b11dd2c5ff0f82e7932c06c4acfd55e5a0cb1
SHA5120c87b7ddc9ec8b32ed9a787cb633d232cca78cb58d0b42fe2ffc7206498d2121c608b45b6f5cc696cf96d2b771385036abfb2b19b6d1a6d6d133dc7a867af353
-
Filesize
2.4MB
MD5027834b2ebc7f1b02143d8e7f8c17aab
SHA1c4d19cab893e0fcb19d5de25e26e441faceb88ee
SHA2565b740dd5064d571eb065d94e252b11dd2c5ff0f82e7932c06c4acfd55e5a0cb1
SHA5120c87b7ddc9ec8b32ed9a787cb633d232cca78cb58d0b42fe2ffc7206498d2121c608b45b6f5cc696cf96d2b771385036abfb2b19b6d1a6d6d133dc7a867af353
-
Filesize
2.4MB
MD5027834b2ebc7f1b02143d8e7f8c17aab
SHA1c4d19cab893e0fcb19d5de25e26e441faceb88ee
SHA2565b740dd5064d571eb065d94e252b11dd2c5ff0f82e7932c06c4acfd55e5a0cb1
SHA5120c87b7ddc9ec8b32ed9a787cb633d232cca78cb58d0b42fe2ffc7206498d2121c608b45b6f5cc696cf96d2b771385036abfb2b19b6d1a6d6d133dc7a867af353
-
Filesize
2.4MB
MD5027834b2ebc7f1b02143d8e7f8c17aab
SHA1c4d19cab893e0fcb19d5de25e26e441faceb88ee
SHA2565b740dd5064d571eb065d94e252b11dd2c5ff0f82e7932c06c4acfd55e5a0cb1
SHA5120c87b7ddc9ec8b32ed9a787cb633d232cca78cb58d0b42fe2ffc7206498d2121c608b45b6f5cc696cf96d2b771385036abfb2b19b6d1a6d6d133dc7a867af353
-
Filesize
6.0MB
MD59b248dfff1d2b73fd639324741fe2e08
SHA1e82684cd6858a6712eff69ace1707b3bcd464105
SHA25639943c30732988289ca346902f007a72124bd98b82e08b0b9739241cdab4018e
SHA51256784a895f113088e3c92ccd96f354473e5d849fb9d0798868ff5e9477f60854e8bc7c9759c63417c9298f8702abab266722439b445977c6e940da393b8b696c
-
Filesize
2.4MB
MD5027834b2ebc7f1b02143d8e7f8c17aab
SHA1c4d19cab893e0fcb19d5de25e26e441faceb88ee
SHA2565b740dd5064d571eb065d94e252b11dd2c5ff0f82e7932c06c4acfd55e5a0cb1
SHA5120c87b7ddc9ec8b32ed9a787cb633d232cca78cb58d0b42fe2ffc7206498d2121c608b45b6f5cc696cf96d2b771385036abfb2b19b6d1a6d6d133dc7a867af353