Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
27/08/2023, 23:42
Static task
static1
Behavioral task
behavioral1
Sample
user.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
user.exe
Resource
win10v2004-20230824-en
General
-
Target
user.exe
-
Size
1.2MB
-
MD5
4d9fd21aa87a2eb1bcad4d9dff0c6362
-
SHA1
9074fad1d75cb2612d16b3d6794fe97112cc8a82
-
SHA256
02a7ad63210fdb04980ce442aadbad7c40086c063fc037eb7eddc72f09da7c43
-
SHA512
a07683f97e46749dc2db66874b2daedd7e11fabf76e1a34998c1784fdaa229e1294cff7b12967afc8650af2cf3cbb86d37a9a1e8c254f8cbdc9092f46d4fc5be
-
SSDEEP
24576:EnsJ39LyjbJkQFMhmC+6GD99bC1kzMc0z3:EnsHyjtk2MYC5GDzuizMcw3
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1480 ._cache_user.exe 4636 Synaptics.exe 2244 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" user.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{AC09A6E6-D39F-4EBC-B169-A5BA4A4C885D}.catalogItem svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ user.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4152 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 1480 ._cache_user.exe 1480 ._cache_user.exe 1480 ._cache_user.exe 2244 ._cache_Synaptics.exe 2244 ._cache_Synaptics.exe 2244 ._cache_Synaptics.exe 4152 EXCEL.EXE 4152 EXCEL.EXE 4152 EXCEL.EXE 4152 EXCEL.EXE 4152 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2144 wrote to memory of 1480 2144 user.exe 87 PID 2144 wrote to memory of 1480 2144 user.exe 87 PID 2144 wrote to memory of 1480 2144 user.exe 87 PID 2144 wrote to memory of 4636 2144 user.exe 88 PID 2144 wrote to memory of 4636 2144 user.exe 88 PID 2144 wrote to memory of 4636 2144 user.exe 88 PID 4636 wrote to memory of 2244 4636 Synaptics.exe 89 PID 4636 wrote to memory of 2244 4636 Synaptics.exe 89 PID 4636 wrote to memory of 2244 4636 Synaptics.exe 89
Processes
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
PID:3044
-
C:\Users\Admin\AppData\Local\Temp\user.exe"C:\Users\Admin\AppData\Local\Temp\user.exe"1⤵
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\._cache_user.exe"C:\Users\Admin\AppData\Local\Temp\._cache_user.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1480
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2244
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD54d9fd21aa87a2eb1bcad4d9dff0c6362
SHA19074fad1d75cb2612d16b3d6794fe97112cc8a82
SHA25602a7ad63210fdb04980ce442aadbad7c40086c063fc037eb7eddc72f09da7c43
SHA512a07683f97e46749dc2db66874b2daedd7e11fabf76e1a34998c1784fdaa229e1294cff7b12967afc8650af2cf3cbb86d37a9a1e8c254f8cbdc9092f46d4fc5be
-
Filesize
1.2MB
MD54d9fd21aa87a2eb1bcad4d9dff0c6362
SHA19074fad1d75cb2612d16b3d6794fe97112cc8a82
SHA25602a7ad63210fdb04980ce442aadbad7c40086c063fc037eb7eddc72f09da7c43
SHA512a07683f97e46749dc2db66874b2daedd7e11fabf76e1a34998c1784fdaa229e1294cff7b12967afc8650af2cf3cbb86d37a9a1e8c254f8cbdc9092f46d4fc5be
-
Filesize
1.2MB
MD54d9fd21aa87a2eb1bcad4d9dff0c6362
SHA19074fad1d75cb2612d16b3d6794fe97112cc8a82
SHA25602a7ad63210fdb04980ce442aadbad7c40086c063fc037eb7eddc72f09da7c43
SHA512a07683f97e46749dc2db66874b2daedd7e11fabf76e1a34998c1784fdaa229e1294cff7b12967afc8650af2cf3cbb86d37a9a1e8c254f8cbdc9092f46d4fc5be
-
Filesize
435KB
MD594a415594e19333d35e93cb877973ad5
SHA17c09b0932caf621fc90fe269ceabf6b4fd2e55f2
SHA2565e0fb6d1301c00001b3b3158c822ced6173548b0b85953577f6527431d5fc71f
SHA51232d60355bbe3ea1a80ad84e054a07ae4ea9b3c8607dc435744fe1dfdebcc9dca83b6ce954d693fb2791044236c07a71f428f1fee2bf478f112c90bd2889038c3
-
Filesize
435KB
MD594a415594e19333d35e93cb877973ad5
SHA17c09b0932caf621fc90fe269ceabf6b4fd2e55f2
SHA2565e0fb6d1301c00001b3b3158c822ced6173548b0b85953577f6527431d5fc71f
SHA51232d60355bbe3ea1a80ad84e054a07ae4ea9b3c8607dc435744fe1dfdebcc9dca83b6ce954d693fb2791044236c07a71f428f1fee2bf478f112c90bd2889038c3
-
Filesize
435KB
MD594a415594e19333d35e93cb877973ad5
SHA17c09b0932caf621fc90fe269ceabf6b4fd2e55f2
SHA2565e0fb6d1301c00001b3b3158c822ced6173548b0b85953577f6527431d5fc71f
SHA51232d60355bbe3ea1a80ad84e054a07ae4ea9b3c8607dc435744fe1dfdebcc9dca83b6ce954d693fb2791044236c07a71f428f1fee2bf478f112c90bd2889038c3
-
Filesize
435KB
MD594a415594e19333d35e93cb877973ad5
SHA17c09b0932caf621fc90fe269ceabf6b4fd2e55f2
SHA2565e0fb6d1301c00001b3b3158c822ced6173548b0b85953577f6527431d5fc71f
SHA51232d60355bbe3ea1a80ad84e054a07ae4ea9b3c8607dc435744fe1dfdebcc9dca83b6ce954d693fb2791044236c07a71f428f1fee2bf478f112c90bd2889038c3
-
Filesize
435KB
MD594a415594e19333d35e93cb877973ad5
SHA17c09b0932caf621fc90fe269ceabf6b4fd2e55f2
SHA2565e0fb6d1301c00001b3b3158c822ced6173548b0b85953577f6527431d5fc71f
SHA51232d60355bbe3ea1a80ad84e054a07ae4ea9b3c8607dc435744fe1dfdebcc9dca83b6ce954d693fb2791044236c07a71f428f1fee2bf478f112c90bd2889038c3
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04