Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
27/08/2023, 23:42
Static task
static1
Behavioral task
behavioral1
Sample
user.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
user.exe
Resource
win10v2004-20230824-en
General
-
Target
user.exe
-
Size
1.2MB
-
MD5
4d9fd21aa87a2eb1bcad4d9dff0c6362
-
SHA1
9074fad1d75cb2612d16b3d6794fe97112cc8a82
-
SHA256
02a7ad63210fdb04980ce442aadbad7c40086c063fc037eb7eddc72f09da7c43
-
SHA512
a07683f97e46749dc2db66874b2daedd7e11fabf76e1a34998c1784fdaa229e1294cff7b12967afc8650af2cf3cbb86d37a9a1e8c254f8cbdc9092f46d4fc5be
-
SSDEEP
24576:EnsJ39LyjbJkQFMhmC+6GD99bC1kzMc0z3:EnsHyjtk2MYC5GDzuizMcw3
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 312 ._cache_user.exe 2932 Synaptics.exe 2740 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 748 user.exe 748 user.exe 748 user.exe 748 user.exe 2932 Synaptics.exe 2932 Synaptics.exe 2932 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" user.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 312 ._cache_user.exe 312 ._cache_user.exe 312 ._cache_user.exe 2740 ._cache_Synaptics.exe 2740 ._cache_Synaptics.exe 2740 ._cache_Synaptics.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 748 wrote to memory of 312 748 user.exe 28 PID 748 wrote to memory of 312 748 user.exe 28 PID 748 wrote to memory of 312 748 user.exe 28 PID 748 wrote to memory of 312 748 user.exe 28 PID 748 wrote to memory of 2932 748 user.exe 29 PID 748 wrote to memory of 2932 748 user.exe 29 PID 748 wrote to memory of 2932 748 user.exe 29 PID 748 wrote to memory of 2932 748 user.exe 29 PID 2932 wrote to memory of 2740 2932 Synaptics.exe 30 PID 2932 wrote to memory of 2740 2932 Synaptics.exe 30 PID 2932 wrote to memory of 2740 2932 Synaptics.exe 30 PID 2932 wrote to memory of 2740 2932 Synaptics.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\user.exe"C:\Users\Admin\AppData\Local\Temp\user.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Local\Temp\._cache_user.exe"C:\Users\Admin\AppData\Local\Temp\._cache_user.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:312
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD54d9fd21aa87a2eb1bcad4d9dff0c6362
SHA19074fad1d75cb2612d16b3d6794fe97112cc8a82
SHA25602a7ad63210fdb04980ce442aadbad7c40086c063fc037eb7eddc72f09da7c43
SHA512a07683f97e46749dc2db66874b2daedd7e11fabf76e1a34998c1784fdaa229e1294cff7b12967afc8650af2cf3cbb86d37a9a1e8c254f8cbdc9092f46d4fc5be
-
Filesize
1.2MB
MD54d9fd21aa87a2eb1bcad4d9dff0c6362
SHA19074fad1d75cb2612d16b3d6794fe97112cc8a82
SHA25602a7ad63210fdb04980ce442aadbad7c40086c063fc037eb7eddc72f09da7c43
SHA512a07683f97e46749dc2db66874b2daedd7e11fabf76e1a34998c1784fdaa229e1294cff7b12967afc8650af2cf3cbb86d37a9a1e8c254f8cbdc9092f46d4fc5be
-
Filesize
1.2MB
MD54d9fd21aa87a2eb1bcad4d9dff0c6362
SHA19074fad1d75cb2612d16b3d6794fe97112cc8a82
SHA25602a7ad63210fdb04980ce442aadbad7c40086c063fc037eb7eddc72f09da7c43
SHA512a07683f97e46749dc2db66874b2daedd7e11fabf76e1a34998c1784fdaa229e1294cff7b12967afc8650af2cf3cbb86d37a9a1e8c254f8cbdc9092f46d4fc5be
-
Filesize
435KB
MD594a415594e19333d35e93cb877973ad5
SHA17c09b0932caf621fc90fe269ceabf6b4fd2e55f2
SHA2565e0fb6d1301c00001b3b3158c822ced6173548b0b85953577f6527431d5fc71f
SHA51232d60355bbe3ea1a80ad84e054a07ae4ea9b3c8607dc435744fe1dfdebcc9dca83b6ce954d693fb2791044236c07a71f428f1fee2bf478f112c90bd2889038c3
-
Filesize
435KB
MD594a415594e19333d35e93cb877973ad5
SHA17c09b0932caf621fc90fe269ceabf6b4fd2e55f2
SHA2565e0fb6d1301c00001b3b3158c822ced6173548b0b85953577f6527431d5fc71f
SHA51232d60355bbe3ea1a80ad84e054a07ae4ea9b3c8607dc435744fe1dfdebcc9dca83b6ce954d693fb2791044236c07a71f428f1fee2bf478f112c90bd2889038c3
-
Filesize
435KB
MD594a415594e19333d35e93cb877973ad5
SHA17c09b0932caf621fc90fe269ceabf6b4fd2e55f2
SHA2565e0fb6d1301c00001b3b3158c822ced6173548b0b85953577f6527431d5fc71f
SHA51232d60355bbe3ea1a80ad84e054a07ae4ea9b3c8607dc435744fe1dfdebcc9dca83b6ce954d693fb2791044236c07a71f428f1fee2bf478f112c90bd2889038c3
-
Filesize
435KB
MD594a415594e19333d35e93cb877973ad5
SHA17c09b0932caf621fc90fe269ceabf6b4fd2e55f2
SHA2565e0fb6d1301c00001b3b3158c822ced6173548b0b85953577f6527431d5fc71f
SHA51232d60355bbe3ea1a80ad84e054a07ae4ea9b3c8607dc435744fe1dfdebcc9dca83b6ce954d693fb2791044236c07a71f428f1fee2bf478f112c90bd2889038c3
-
Filesize
1.2MB
MD54d9fd21aa87a2eb1bcad4d9dff0c6362
SHA19074fad1d75cb2612d16b3d6794fe97112cc8a82
SHA25602a7ad63210fdb04980ce442aadbad7c40086c063fc037eb7eddc72f09da7c43
SHA512a07683f97e46749dc2db66874b2daedd7e11fabf76e1a34998c1784fdaa229e1294cff7b12967afc8650af2cf3cbb86d37a9a1e8c254f8cbdc9092f46d4fc5be
-
Filesize
1.2MB
MD54d9fd21aa87a2eb1bcad4d9dff0c6362
SHA19074fad1d75cb2612d16b3d6794fe97112cc8a82
SHA25602a7ad63210fdb04980ce442aadbad7c40086c063fc037eb7eddc72f09da7c43
SHA512a07683f97e46749dc2db66874b2daedd7e11fabf76e1a34998c1784fdaa229e1294cff7b12967afc8650af2cf3cbb86d37a9a1e8c254f8cbdc9092f46d4fc5be
-
Filesize
1.2MB
MD54d9fd21aa87a2eb1bcad4d9dff0c6362
SHA19074fad1d75cb2612d16b3d6794fe97112cc8a82
SHA25602a7ad63210fdb04980ce442aadbad7c40086c063fc037eb7eddc72f09da7c43
SHA512a07683f97e46749dc2db66874b2daedd7e11fabf76e1a34998c1784fdaa229e1294cff7b12967afc8650af2cf3cbb86d37a9a1e8c254f8cbdc9092f46d4fc5be
-
Filesize
435KB
MD594a415594e19333d35e93cb877973ad5
SHA17c09b0932caf621fc90fe269ceabf6b4fd2e55f2
SHA2565e0fb6d1301c00001b3b3158c822ced6173548b0b85953577f6527431d5fc71f
SHA51232d60355bbe3ea1a80ad84e054a07ae4ea9b3c8607dc435744fe1dfdebcc9dca83b6ce954d693fb2791044236c07a71f428f1fee2bf478f112c90bd2889038c3
-
Filesize
435KB
MD594a415594e19333d35e93cb877973ad5
SHA17c09b0932caf621fc90fe269ceabf6b4fd2e55f2
SHA2565e0fb6d1301c00001b3b3158c822ced6173548b0b85953577f6527431d5fc71f
SHA51232d60355bbe3ea1a80ad84e054a07ae4ea9b3c8607dc435744fe1dfdebcc9dca83b6ce954d693fb2791044236c07a71f428f1fee2bf478f112c90bd2889038c3
-
Filesize
435KB
MD594a415594e19333d35e93cb877973ad5
SHA17c09b0932caf621fc90fe269ceabf6b4fd2e55f2
SHA2565e0fb6d1301c00001b3b3158c822ced6173548b0b85953577f6527431d5fc71f
SHA51232d60355bbe3ea1a80ad84e054a07ae4ea9b3c8607dc435744fe1dfdebcc9dca83b6ce954d693fb2791044236c07a71f428f1fee2bf478f112c90bd2889038c3
-
Filesize
435KB
MD594a415594e19333d35e93cb877973ad5
SHA17c09b0932caf621fc90fe269ceabf6b4fd2e55f2
SHA2565e0fb6d1301c00001b3b3158c822ced6173548b0b85953577f6527431d5fc71f
SHA51232d60355bbe3ea1a80ad84e054a07ae4ea9b3c8607dc435744fe1dfdebcc9dca83b6ce954d693fb2791044236c07a71f428f1fee2bf478f112c90bd2889038c3