Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2023 11:08
Static task
static1
Behavioral task
behavioral1
Sample
Synaptics.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Synaptics.exe
Resource
win10v2004-20231215-en
General
-
Target
Synaptics.exe
-
Size
2.5MB
-
MD5
996e9b4d835bc8127ac5a4f04a324993
-
SHA1
398f70664312de618d9e5a0758a5dc3429072897
-
SHA256
f7fb599851bd25c0d4bbadb129028ae0c9ff21d11b3a9dc5e29bbadb1a995f47
-
SHA512
521fa9bb50f59c7e65b2aad3824d305ac9216258125c0a09915b6a999e126e1c2b8c70944e8fb12073166f901ae40e70f0182e91e973f590376d8498e8841c7a
-
SSDEEP
12288:EMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9lo:EnsJ39LyjbJkQFMhmC+6GD9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 1 IoCs
pid Process 3808 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" Synaptics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2304 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2304 EXCEL.EXE 2304 EXCEL.EXE 2304 EXCEL.EXE 2304 EXCEL.EXE 2304 EXCEL.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3556 wrote to memory of 3808 3556 Synaptics.exe 91 PID 3556 wrote to memory of 3808 3556 Synaptics.exe 91 PID 3556 wrote to memory of 3808 3556 Synaptics.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\Synaptics.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
PID:3808
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD5d2a91cd13ceef8e2da971dfcfab3c034
SHA19ffce3484256fdad2f1a919766af22e482ae2c8a
SHA256a5213268cef2da1127fba1df3a46633032330607c7e9c9493bf872ddb72269cd
SHA512d3da872b6df9c42544c18bcc6c41f6be137362af9d55029df3bab1d3f1d8d484448828cdc190a79b55ffe2c4629f06289fab075fc7df511ab68501c277181d71
-
Filesize
1.6MB
MD594022d68c98e9125e28d6d488c41c9b3
SHA1dc47ea7501cb8fee9be9319dc3d278d784de7784
SHA256871ab55fff1ad7748a37be01223991fd66192981e8dd171ba4a0a7474363985d
SHA51234bd2da4bcd7d788959805194236f8f6171b7166ea6f91d2581fa3e9490f7daf026786773a80195cb0b795118cac0b592b42b9e13871a1ccde5110ec698afcb3
-
Filesize
1.1MB
MD5fcd57505f53155ab3c6249a5e4667a11
SHA19c9aa583cdf5fd8bb0cb9863fece63e1a0e6c285
SHA2566698fb55a55aa86d5509f53960a6472a026436a25b323c0b636580f93ae56fbd
SHA512cd62d04fa09537ea6330a56df3d9099f1809f57e41e9893856dfafb57aa5a46354efa88fbe4719d94b1c4b9ca3fdc8fd1298b55219d330a3894a53383f6fe5bd