Analysis
-
max time kernel
150s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2023, 01:49
Static task
static1
Behavioral task
behavioral1
Sample
8afc905c264a7e00b89e1f29d2e30d44.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
8afc905c264a7e00b89e1f29d2e30d44.exe
Resource
win10v2004-20230703-en
General
-
Target
8afc905c264a7e00b89e1f29d2e30d44.exe
-
Size
17.1MB
-
MD5
8afc905c264a7e00b89e1f29d2e30d44
-
SHA1
70b57a174fd6210c3a5241f20af43cf079e2e245
-
SHA256
ea087c479b0f47c8ec7026eb3ff2b6d1cf939f63715b3a7519ddc403bf6b513b
-
SHA512
279b399fa98691f560621abf975d8846e948fd780ea5e1ac53bc5e5faa13b193d24f0ed08775c5c58ea89a8c0ddb4658b768e9921ce96269b4ba893c696075a1
-
SSDEEP
393216:0V0Q4oIqRsl/c38/EV7w7GQTExdsjbqfnkgzObnzRb6:QSEq/q8cGK6EPNnlzOb0
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4836 ._cache_8afc905c264a7e00b89e1f29d2e30d44.exe 1524 Synaptics.exe 4688 ._cache_Synaptics.exe -
resource yara_rule behavioral2/files/0x000700000002320b-138.dat vmprotect behavioral2/files/0x000700000002320b-192.dat vmprotect behavioral2/files/0x000700000002320b-193.dat vmprotect behavioral2/files/0x0009000000023211-323.dat vmprotect behavioral2/files/0x0009000000023211-324.dat vmprotect behavioral2/memory/4836-331-0x0000000000400000-0x00000000025B8000-memory.dmp vmprotect behavioral2/memory/4836-333-0x0000000000400000-0x00000000025B8000-memory.dmp vmprotect behavioral2/memory/4688-344-0x0000000000400000-0x00000000025B8000-memory.dmp vmprotect behavioral2/memory/4836-357-0x0000000000400000-0x00000000025B8000-memory.dmp vmprotect behavioral2/memory/4688-359-0x0000000000400000-0x00000000025B8000-memory.dmp vmprotect behavioral2/memory/4836-360-0x0000000000400000-0x00000000025B8000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 8afc905c264a7e00b89e1f29d2e30d44.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 ._cache_8afc905c264a7e00b89e1f29d2e30d44.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 8afc905c264a7e00b89e1f29d2e30d44.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 4836 ._cache_8afc905c264a7e00b89e1f29d2e30d44.exe 4836 ._cache_8afc905c264a7e00b89e1f29d2e30d44.exe 4836 ._cache_8afc905c264a7e00b89e1f29d2e30d44.exe 4836 ._cache_8afc905c264a7e00b89e1f29d2e30d44.exe 4688 ._cache_Synaptics.exe 4688 ._cache_Synaptics.exe 4836 ._cache_8afc905c264a7e00b89e1f29d2e30d44.exe 4836 ._cache_8afc905c264a7e00b89e1f29d2e30d44.exe 4836 ._cache_8afc905c264a7e00b89e1f29d2e30d44.exe 4836 ._cache_8afc905c264a7e00b89e1f29d2e30d44.exe 4688 ._cache_Synaptics.exe 4688 ._cache_Synaptics.exe 4836 ._cache_8afc905c264a7e00b89e1f29d2e30d44.exe 4836 ._cache_8afc905c264a7e00b89e1f29d2e30d44.exe 4836 ._cache_8afc905c264a7e00b89e1f29d2e30d44.exe 4836 ._cache_8afc905c264a7e00b89e1f29d2e30d44.exe 4688 ._cache_Synaptics.exe 4688 ._cache_Synaptics.exe 4688 ._cache_Synaptics.exe 4688 ._cache_Synaptics.exe 4688 ._cache_Synaptics.exe 4688 ._cache_Synaptics.exe 4688 ._cache_Synaptics.exe 4688 ._cache_Synaptics.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4836 ._cache_8afc905c264a7e00b89e1f29d2e30d44.exe 4688 ._cache_Synaptics.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4836 ._cache_8afc905c264a7e00b89e1f29d2e30d44.exe 4688 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4836 ._cache_8afc905c264a7e00b89e1f29d2e30d44.exe 4836 ._cache_8afc905c264a7e00b89e1f29d2e30d44.exe 4688 ._cache_Synaptics.exe 4688 ._cache_Synaptics.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5028 wrote to memory of 4836 5028 8afc905c264a7e00b89e1f29d2e30d44.exe 85 PID 5028 wrote to memory of 4836 5028 8afc905c264a7e00b89e1f29d2e30d44.exe 85 PID 5028 wrote to memory of 4836 5028 8afc905c264a7e00b89e1f29d2e30d44.exe 85 PID 5028 wrote to memory of 1524 5028 8afc905c264a7e00b89e1f29d2e30d44.exe 86 PID 5028 wrote to memory of 1524 5028 8afc905c264a7e00b89e1f29d2e30d44.exe 86 PID 5028 wrote to memory of 1524 5028 8afc905c264a7e00b89e1f29d2e30d44.exe 86 PID 1524 wrote to memory of 4688 1524 Synaptics.exe 88 PID 1524 wrote to memory of 4688 1524 Synaptics.exe 88 PID 1524 wrote to memory of 4688 1524 Synaptics.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\8afc905c264a7e00b89e1f29d2e30d44.exe"C:\Users\Admin\AppData\Local\Temp\8afc905c264a7e00b89e1f29d2e30d44.exe"1⤵
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\._cache_8afc905c264a7e00b89e1f29d2e30d44.exe"C:\Users\Admin\AppData\Local\Temp\._cache_8afc905c264a7e00b89e1f29d2e30d44.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4836
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17.1MB
MD58afc905c264a7e00b89e1f29d2e30d44
SHA170b57a174fd6210c3a5241f20af43cf079e2e245
SHA256ea087c479b0f47c8ec7026eb3ff2b6d1cf939f63715b3a7519ddc403bf6b513b
SHA512279b399fa98691f560621abf975d8846e948fd780ea5e1ac53bc5e5faa13b193d24f0ed08775c5c58ea89a8c0ddb4658b768e9921ce96269b4ba893c696075a1
-
Filesize
17.1MB
MD58afc905c264a7e00b89e1f29d2e30d44
SHA170b57a174fd6210c3a5241f20af43cf079e2e245
SHA256ea087c479b0f47c8ec7026eb3ff2b6d1cf939f63715b3a7519ddc403bf6b513b
SHA512279b399fa98691f560621abf975d8846e948fd780ea5e1ac53bc5e5faa13b193d24f0ed08775c5c58ea89a8c0ddb4658b768e9921ce96269b4ba893c696075a1
-
Filesize
17.1MB
MD58afc905c264a7e00b89e1f29d2e30d44
SHA170b57a174fd6210c3a5241f20af43cf079e2e245
SHA256ea087c479b0f47c8ec7026eb3ff2b6d1cf939f63715b3a7519ddc403bf6b513b
SHA512279b399fa98691f560621abf975d8846e948fd780ea5e1ac53bc5e5faa13b193d24f0ed08775c5c58ea89a8c0ddb4658b768e9921ce96269b4ba893c696075a1
-
Filesize
16.3MB
MD50ea6a399a2e431b805a03c4b5f2d338c
SHA1558eb8d58f1b287dff7dff4177f7ee128539dbb8
SHA256dce7ed370cbb4c6010d317d7fd99209f66a27f026673316beac0326e4fd4c10f
SHA51274112698d910527d4b8a71cb7baea515c919689f7303e27e7aeb42c89800132749b83c99d548c289c6d5af97cccee52415cf5b8d6e9beaa23009c562a8f5b7fe
-
Filesize
16.3MB
MD50ea6a399a2e431b805a03c4b5f2d338c
SHA1558eb8d58f1b287dff7dff4177f7ee128539dbb8
SHA256dce7ed370cbb4c6010d317d7fd99209f66a27f026673316beac0326e4fd4c10f
SHA51274112698d910527d4b8a71cb7baea515c919689f7303e27e7aeb42c89800132749b83c99d548c289c6d5af97cccee52415cf5b8d6e9beaa23009c562a8f5b7fe
-
Filesize
16.3MB
MD50ea6a399a2e431b805a03c4b5f2d338c
SHA1558eb8d58f1b287dff7dff4177f7ee128539dbb8
SHA256dce7ed370cbb4c6010d317d7fd99209f66a27f026673316beac0326e4fd4c10f
SHA51274112698d910527d4b8a71cb7baea515c919689f7303e27e7aeb42c89800132749b83c99d548c289c6d5af97cccee52415cf5b8d6e9beaa23009c562a8f5b7fe
-
Filesize
16.3MB
MD50ea6a399a2e431b805a03c4b5f2d338c
SHA1558eb8d58f1b287dff7dff4177f7ee128539dbb8
SHA256dce7ed370cbb4c6010d317d7fd99209f66a27f026673316beac0326e4fd4c10f
SHA51274112698d910527d4b8a71cb7baea515c919689f7303e27e7aeb42c89800132749b83c99d548c289c6d5af97cccee52415cf5b8d6e9beaa23009c562a8f5b7fe
-
Filesize
16.3MB
MD50ea6a399a2e431b805a03c4b5f2d338c
SHA1558eb8d58f1b287dff7dff4177f7ee128539dbb8
SHA256dce7ed370cbb4c6010d317d7fd99209f66a27f026673316beac0326e4fd4c10f
SHA51274112698d910527d4b8a71cb7baea515c919689f7303e27e7aeb42c89800132749b83c99d548c289c6d5af97cccee52415cf5b8d6e9beaa23009c562a8f5b7fe
-
Filesize
1KB
MD5f4f53a0f1a2d01d6452199517276991f
SHA17308bb8206a4cb18bc924c084e126417a8c6d3a8
SHA2563024ab0d24acd49ad05672c906ba1944d96a8237b3f1e9b8aa15a50fb74c2776
SHA512255588a478d95a27325f158970f9f9407c51c6306a047e28fb76a01307427c4477c8506733095c0dd85de944721bff632801d06139e5defebddda3681ce19fb0