Analysis

  • max time kernel
    143s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    27/08/2023, 23:42

General

  • Target

    user.exe

  • Size

    1.2MB

  • MD5

    4d9fd21aa87a2eb1bcad4d9dff0c6362

  • SHA1

    9074fad1d75cb2612d16b3d6794fe97112cc8a82

  • SHA256

    02a7ad63210fdb04980ce442aadbad7c40086c063fc037eb7eddc72f09da7c43

  • SHA512

    a07683f97e46749dc2db66874b2daedd7e11fabf76e1a34998c1784fdaa229e1294cff7b12967afc8650af2cf3cbb86d37a9a1e8c254f8cbdc9092f46d4fc5be

  • SSDEEP

    24576:EnsJ39LyjbJkQFMhmC+6GD99bC1kzMc0z3:EnsHyjtk2MYC5GDzuizMcw3

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 35 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\user.exe
    "C:\Users\Admin\AppData\Local\Temp\user.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:748
    • C:\Users\Admin\AppData\Local\Temp\._cache_user.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_user.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:312
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    1.2MB

    MD5

    4d9fd21aa87a2eb1bcad4d9dff0c6362

    SHA1

    9074fad1d75cb2612d16b3d6794fe97112cc8a82

    SHA256

    02a7ad63210fdb04980ce442aadbad7c40086c063fc037eb7eddc72f09da7c43

    SHA512

    a07683f97e46749dc2db66874b2daedd7e11fabf76e1a34998c1784fdaa229e1294cff7b12967afc8650af2cf3cbb86d37a9a1e8c254f8cbdc9092f46d4fc5be

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    1.2MB

    MD5

    4d9fd21aa87a2eb1bcad4d9dff0c6362

    SHA1

    9074fad1d75cb2612d16b3d6794fe97112cc8a82

    SHA256

    02a7ad63210fdb04980ce442aadbad7c40086c063fc037eb7eddc72f09da7c43

    SHA512

    a07683f97e46749dc2db66874b2daedd7e11fabf76e1a34998c1784fdaa229e1294cff7b12967afc8650af2cf3cbb86d37a9a1e8c254f8cbdc9092f46d4fc5be

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    1.2MB

    MD5

    4d9fd21aa87a2eb1bcad4d9dff0c6362

    SHA1

    9074fad1d75cb2612d16b3d6794fe97112cc8a82

    SHA256

    02a7ad63210fdb04980ce442aadbad7c40086c063fc037eb7eddc72f09da7c43

    SHA512

    a07683f97e46749dc2db66874b2daedd7e11fabf76e1a34998c1784fdaa229e1294cff7b12967afc8650af2cf3cbb86d37a9a1e8c254f8cbdc9092f46d4fc5be

  • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

    Filesize

    435KB

    MD5

    94a415594e19333d35e93cb877973ad5

    SHA1

    7c09b0932caf621fc90fe269ceabf6b4fd2e55f2

    SHA256

    5e0fb6d1301c00001b3b3158c822ced6173548b0b85953577f6527431d5fc71f

    SHA512

    32d60355bbe3ea1a80ad84e054a07ae4ea9b3c8607dc435744fe1dfdebcc9dca83b6ce954d693fb2791044236c07a71f428f1fee2bf478f112c90bd2889038c3

  • C:\Users\Admin\AppData\Local\Temp\._cache_user.exe

    Filesize

    435KB

    MD5

    94a415594e19333d35e93cb877973ad5

    SHA1

    7c09b0932caf621fc90fe269ceabf6b4fd2e55f2

    SHA256

    5e0fb6d1301c00001b3b3158c822ced6173548b0b85953577f6527431d5fc71f

    SHA512

    32d60355bbe3ea1a80ad84e054a07ae4ea9b3c8607dc435744fe1dfdebcc9dca83b6ce954d693fb2791044236c07a71f428f1fee2bf478f112c90bd2889038c3

  • C:\Users\Admin\AppData\Local\Temp\._cache_user.exe

    Filesize

    435KB

    MD5

    94a415594e19333d35e93cb877973ad5

    SHA1

    7c09b0932caf621fc90fe269ceabf6b4fd2e55f2

    SHA256

    5e0fb6d1301c00001b3b3158c822ced6173548b0b85953577f6527431d5fc71f

    SHA512

    32d60355bbe3ea1a80ad84e054a07ae4ea9b3c8607dc435744fe1dfdebcc9dca83b6ce954d693fb2791044236c07a71f428f1fee2bf478f112c90bd2889038c3

  • C:\Users\Admin\AppData\Local\Temp\._cache_user.exe

    Filesize

    435KB

    MD5

    94a415594e19333d35e93cb877973ad5

    SHA1

    7c09b0932caf621fc90fe269ceabf6b4fd2e55f2

    SHA256

    5e0fb6d1301c00001b3b3158c822ced6173548b0b85953577f6527431d5fc71f

    SHA512

    32d60355bbe3ea1a80ad84e054a07ae4ea9b3c8607dc435744fe1dfdebcc9dca83b6ce954d693fb2791044236c07a71f428f1fee2bf478f112c90bd2889038c3

  • \ProgramData\Synaptics\Synaptics.exe

    Filesize

    1.2MB

    MD5

    4d9fd21aa87a2eb1bcad4d9dff0c6362

    SHA1

    9074fad1d75cb2612d16b3d6794fe97112cc8a82

    SHA256

    02a7ad63210fdb04980ce442aadbad7c40086c063fc037eb7eddc72f09da7c43

    SHA512

    a07683f97e46749dc2db66874b2daedd7e11fabf76e1a34998c1784fdaa229e1294cff7b12967afc8650af2cf3cbb86d37a9a1e8c254f8cbdc9092f46d4fc5be

  • \ProgramData\Synaptics\Synaptics.exe

    Filesize

    1.2MB

    MD5

    4d9fd21aa87a2eb1bcad4d9dff0c6362

    SHA1

    9074fad1d75cb2612d16b3d6794fe97112cc8a82

    SHA256

    02a7ad63210fdb04980ce442aadbad7c40086c063fc037eb7eddc72f09da7c43

    SHA512

    a07683f97e46749dc2db66874b2daedd7e11fabf76e1a34998c1784fdaa229e1294cff7b12967afc8650af2cf3cbb86d37a9a1e8c254f8cbdc9092f46d4fc5be

  • \ProgramData\Synaptics\Synaptics.exe

    Filesize

    1.2MB

    MD5

    4d9fd21aa87a2eb1bcad4d9dff0c6362

    SHA1

    9074fad1d75cb2612d16b3d6794fe97112cc8a82

    SHA256

    02a7ad63210fdb04980ce442aadbad7c40086c063fc037eb7eddc72f09da7c43

    SHA512

    a07683f97e46749dc2db66874b2daedd7e11fabf76e1a34998c1784fdaa229e1294cff7b12967afc8650af2cf3cbb86d37a9a1e8c254f8cbdc9092f46d4fc5be

  • \Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

    Filesize

    435KB

    MD5

    94a415594e19333d35e93cb877973ad5

    SHA1

    7c09b0932caf621fc90fe269ceabf6b4fd2e55f2

    SHA256

    5e0fb6d1301c00001b3b3158c822ced6173548b0b85953577f6527431d5fc71f

    SHA512

    32d60355bbe3ea1a80ad84e054a07ae4ea9b3c8607dc435744fe1dfdebcc9dca83b6ce954d693fb2791044236c07a71f428f1fee2bf478f112c90bd2889038c3

  • \Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

    Filesize

    435KB

    MD5

    94a415594e19333d35e93cb877973ad5

    SHA1

    7c09b0932caf621fc90fe269ceabf6b4fd2e55f2

    SHA256

    5e0fb6d1301c00001b3b3158c822ced6173548b0b85953577f6527431d5fc71f

    SHA512

    32d60355bbe3ea1a80ad84e054a07ae4ea9b3c8607dc435744fe1dfdebcc9dca83b6ce954d693fb2791044236c07a71f428f1fee2bf478f112c90bd2889038c3

  • \Users\Admin\AppData\Local\Temp\._cache_user.exe

    Filesize

    435KB

    MD5

    94a415594e19333d35e93cb877973ad5

    SHA1

    7c09b0932caf621fc90fe269ceabf6b4fd2e55f2

    SHA256

    5e0fb6d1301c00001b3b3158c822ced6173548b0b85953577f6527431d5fc71f

    SHA512

    32d60355bbe3ea1a80ad84e054a07ae4ea9b3c8607dc435744fe1dfdebcc9dca83b6ce954d693fb2791044236c07a71f428f1fee2bf478f112c90bd2889038c3

  • \Users\Admin\AppData\Local\Temp\._cache_user.exe

    Filesize

    435KB

    MD5

    94a415594e19333d35e93cb877973ad5

    SHA1

    7c09b0932caf621fc90fe269ceabf6b4fd2e55f2

    SHA256

    5e0fb6d1301c00001b3b3158c822ced6173548b0b85953577f6527431d5fc71f

    SHA512

    32d60355bbe3ea1a80ad84e054a07ae4ea9b3c8607dc435744fe1dfdebcc9dca83b6ce954d693fb2791044236c07a71f428f1fee2bf478f112c90bd2889038c3

  • memory/312-48-0x00000000004C0000-0x00000000004EA000-memory.dmp

    Filesize

    168KB

  • memory/312-57-0x0000000000730000-0x0000000000830000-memory.dmp

    Filesize

    1024KB

  • memory/312-55-0x00000000004C0000-0x00000000004EA000-memory.dmp

    Filesize

    168KB

  • memory/312-45-0x0000000000730000-0x0000000000830000-memory.dmp

    Filesize

    1024KB

  • memory/312-46-0x00000000004C0000-0x00000000004EA000-memory.dmp

    Filesize

    168KB

  • memory/748-28-0x0000000000400000-0x000000000052F000-memory.dmp

    Filesize

    1.2MB

  • memory/748-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2740-52-0x0000000000730000-0x0000000000830000-memory.dmp

    Filesize

    1024KB

  • memory/2740-53-0x00000000006E0000-0x000000000070A000-memory.dmp

    Filesize

    168KB

  • memory/2740-58-0x00000000006E0000-0x000000000070A000-memory.dmp

    Filesize

    168KB

  • memory/2932-54-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2932-29-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2932-56-0x0000000000400000-0x000000000052F000-memory.dmp

    Filesize

    1.2MB

  • memory/2932-59-0x0000000000400000-0x000000000052F000-memory.dmp

    Filesize

    1.2MB

  • memory/2932-89-0x0000000000400000-0x000000000052F000-memory.dmp

    Filesize

    1.2MB