Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-09-2023 08:29

General

  • Target

    SynapseFromWish/release-v2.exe

  • Size

    6.1MB

  • MD5

    f7acd0852bb12402618146b0d16f354e

  • SHA1

    211e1174154435cf731ffd70c69cc9050f924174

  • SHA256

    02131c1bff27d6b1d89013f963095a425a32f8506e69799e7087554461bbbd9d

  • SHA512

    6dee8dcc59d0ac59728c7750cba5c570797e91cd39755c4b910c95ee0dfb3b0e1c69d954970a3638ded9ec411927226c2468adc39471671ea7f96ebe402298cc

  • SSDEEP

    196608:pNsMnreFZyDr0jUSCYKdY0ZVeQ+KMm6XOeRJpyrMS0kRkZ0YezmEse7IBWc7pH9K:pyc7/Zd31VC7WcVHdPa4c15D

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 32 IoCs
  • Modifies data under HKEY_USERS 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\lsass.exe
    C:\Windows\system32\lsass.exe
    1⤵
      PID:480
    • C:\Windows\system32\services.exe
      C:\Windows\system32\services.exe
      1⤵
        PID:464
      • C:\Windows\system32\winlogon.exe
        winlogon.exe
        1⤵
          PID:420
        • C:\Windows\system32\lsm.exe
          C:\Windows\system32\lsm.exe
          1⤵
            PID:488
          • C:\Windows\Explorer.EXE
            C:\Windows\Explorer.EXE
            1⤵
              PID:1268
              • C:\Users\Admin\AppData\Local\Temp\SynapseFromWish\release-v2.exe
                "C:\Users\Admin\AppData\Local\Temp\SynapseFromWish\release-v2.exe"
                2⤵
                • Suspicious use of NtCreateUserProcessOtherParentProcess
                • Drops file in Drivers directory
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:2928
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                2⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2348
              • C:\Windows\System32\cmd.exe
                C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:2940
                • C:\Windows\System32\powercfg.exe
                  powercfg /x -hibernate-timeout-ac 0
                  3⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2868
                • C:\Windows\System32\powercfg.exe
                  powercfg /x -hibernate-timeout-dc 0
                  3⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2052
                • C:\Windows\System32\powercfg.exe
                  powercfg /x -standby-timeout-ac 0
                  3⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3012
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#eszkltr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                2⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1900
                • C:\Windows\system32\schtasks.exe
                  "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"
                  3⤵
                  • Creates scheduled task(s)
                  PID:2840
              • C:\Windows\System32\dialer.exe
                C:\Windows\System32\dialer.exe
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2772
            • C:\Windows\system32\Dwm.exe
              "C:\Windows\system32\Dwm.exe"
              1⤵
                PID:3028
              • C:\Windows\system32\csrss.exe
                %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
                1⤵
                • Enumerates system info in registry
                • Suspicious use of WriteProcessMemory
                PID:2828
              • C:\Windows\system32\winlogon.exe
                winlogon.exe
                1⤵
                • Modifies data under HKEY_USERS
                • Suspicious use of WriteProcessMemory
                PID:2888
                • C:\Windows\system32\LogonUI.exe
                  "LogonUI.exe" /flags:0x0
                  2⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2884

              Network

              MITRE ATT&CK Matrix ATT&CK v13

              Execution

              Scheduled Task/Job

              1
              T1053

              Persistence

              Scheduled Task/Job

              1
              T1053

              Privilege Escalation

              Scheduled Task/Job

              1
              T1053

              Discovery

              Query Registry

              2
              T1012

              System Information Discovery

              1
              T1082

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
                Filesize

                7KB

                MD5

                903f5130e2a2dcee54994c201fcf5b62

                SHA1

                e2a9e0d806eef836d96840cc27f336558837d509

                SHA256

                9489c6adc998572945ac76f05c8e87140a656240316f851dbbfdc0669b6b76c4

                SHA512

                35b2bfb64500cd22d6bf0bb269665fed82c12e2c28019a6faeaf1d461599214670fb8a9fe41cbc96fb0d790abb698b0c88dbea591658b1cc54f8c106d7d04f24

              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\GACD2AQDNO4NNUNWMF57.temp
                Filesize

                7KB

                MD5

                903f5130e2a2dcee54994c201fcf5b62

                SHA1

                e2a9e0d806eef836d96840cc27f336558837d509

                SHA256

                9489c6adc998572945ac76f05c8e87140a656240316f851dbbfdc0669b6b76c4

                SHA512

                35b2bfb64500cd22d6bf0bb269665fed82c12e2c28019a6faeaf1d461599214670fb8a9fe41cbc96fb0d790abb698b0c88dbea591658b1cc54f8c106d7d04f24

              • memory/420-31-0x0000000000750000-0x0000000000777000-memory.dmp
                Filesize

                156KB

              • memory/420-24-0x0000000000720000-0x0000000000741000-memory.dmp
                Filesize

                132KB

              • memory/420-26-0x0000000000720000-0x0000000000741000-memory.dmp
                Filesize

                132KB

              • memory/420-32-0x0000000000750000-0x0000000000777000-memory.dmp
                Filesize

                156KB

              • memory/464-44-0x000007FEBEA40000-0x000007FEBEA50000-memory.dmp
                Filesize

                64KB

              • memory/464-71-0x0000000000980000-0x00000000009A7000-memory.dmp
                Filesize

                156KB

              • memory/464-40-0x0000000000980000-0x00000000009A7000-memory.dmp
                Filesize

                156KB

              • memory/464-63-0x0000000076DC1000-0x0000000076DC2000-memory.dmp
                Filesize

                4KB

              • memory/464-50-0x0000000036DB0000-0x0000000036DC0000-memory.dmp
                Filesize

                64KB

              • memory/480-53-0x0000000036DB0000-0x0000000036DC0000-memory.dmp
                Filesize

                64KB

              • memory/480-48-0x000007FEBEA40000-0x000007FEBEA50000-memory.dmp
                Filesize

                64KB

              • memory/480-43-0x0000000000B10000-0x0000000000B37000-memory.dmp
                Filesize

                156KB

              • memory/480-61-0x0000000000B10000-0x0000000000B37000-memory.dmp
                Filesize

                156KB

              • memory/488-65-0x0000000036DB0000-0x0000000036DC0000-memory.dmp
                Filesize

                64KB

              • memory/488-64-0x000007FEBEA40000-0x000007FEBEA50000-memory.dmp
                Filesize

                64KB

              • memory/488-60-0x00000000003C0000-0x00000000003E7000-memory.dmp
                Filesize

                156KB

              • memory/488-68-0x00000000003C0000-0x00000000003E7000-memory.dmp
                Filesize

                156KB

              • memory/1900-38-0x0000000002720000-0x00000000027A0000-memory.dmp
                Filesize

                512KB

              • memory/1900-69-0x000007FEF4A60000-0x000007FEF53FD000-memory.dmp
                Filesize

                9.6MB

              • memory/1900-29-0x0000000002720000-0x00000000027A0000-memory.dmp
                Filesize

                512KB

              • memory/1900-66-0x0000000002720000-0x00000000027A0000-memory.dmp
                Filesize

                512KB

              • memory/1900-37-0x000007FEF4A60000-0x000007FEF53FD000-memory.dmp
                Filesize

                9.6MB

              • memory/1900-27-0x000007FEF4A60000-0x000007FEF53FD000-memory.dmp
                Filesize

                9.6MB

              • memory/1900-39-0x0000000002720000-0x00000000027A0000-memory.dmp
                Filesize

                512KB

              • memory/1900-28-0x0000000002250000-0x0000000002258000-memory.dmp
                Filesize

                32KB

              • memory/1900-25-0x000000001B270000-0x000000001B552000-memory.dmp
                Filesize

                2.9MB

              • memory/2348-9-0x0000000002360000-0x00000000023E0000-memory.dmp
                Filesize

                512KB

              • memory/2348-8-0x0000000001DA0000-0x0000000001DA8000-memory.dmp
                Filesize

                32KB

              • memory/2348-6-0x000007FEF5400000-0x000007FEF5D9D000-memory.dmp
                Filesize

                9.6MB

              • memory/2348-13-0x000007FEF5400000-0x000007FEF5D9D000-memory.dmp
                Filesize

                9.6MB

              • memory/2348-12-0x0000000002360000-0x00000000023E0000-memory.dmp
                Filesize

                512KB

              • memory/2348-11-0x000007FEF5400000-0x000007FEF5D9D000-memory.dmp
                Filesize

                9.6MB

              • memory/2348-7-0x0000000002360000-0x00000000023E0000-memory.dmp
                Filesize

                512KB

              • memory/2348-5-0x000000001B220000-0x000000001B502000-memory.dmp
                Filesize

                2.9MB

              • memory/2348-10-0x0000000002360000-0x00000000023E0000-memory.dmp
                Filesize

                512KB

              • memory/2772-62-0x0000000076D70000-0x0000000076F19000-memory.dmp
                Filesize

                1.7MB

              • memory/2772-16-0x0000000076D70000-0x0000000076F19000-memory.dmp
                Filesize

                1.7MB

              • memory/2772-47-0x0000000140000000-0x0000000140029000-memory.dmp
                Filesize

                164KB

              • memory/2772-18-0x0000000076C50000-0x0000000076D6F000-memory.dmp
                Filesize

                1.1MB

              • memory/2884-70-0x00000000026E0000-0x00000000026E1000-memory.dmp
                Filesize

                4KB

              • memory/2884-72-0x00000000026E0000-0x00000000026E1000-memory.dmp
                Filesize

                4KB

              • memory/2928-35-0x000000013F640000-0x000000013FC57000-memory.dmp
                Filesize

                6.1MB

              • memory/2928-0-0x000000013F640000-0x000000013FC57000-memory.dmp
                Filesize

                6.1MB