Resubmissions

29-11-2024 09:17

241129-k84a5asnem 10

28-12-2023 11:08

231228-m8mdqahgd5 7

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-12-2023 11:08

General

  • Target

    Synaptics.exe

  • Size

    2.5MB

  • MD5

    996e9b4d835bc8127ac5a4f04a324993

  • SHA1

    398f70664312de618d9e5a0758a5dc3429072897

  • SHA256

    f7fb599851bd25c0d4bbadb129028ae0c9ff21d11b3a9dc5e29bbadb1a995f47

  • SHA512

    521fa9bb50f59c7e65b2aad3824d305ac9216258125c0a09915b6a999e126e1c2b8c70944e8fb12073166f901ae40e70f0182e91e973f590376d8498e8841c7a

  • SSDEEP

    12288:EMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9lo:EnsJ39LyjbJkQFMhmC+6GD9

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Synaptics.exe
    "C:\Users\Admin\AppData\Local\Temp\Synaptics.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3556
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Executes dropped EXE
      PID:3808
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    288KB

    MD5

    d2a91cd13ceef8e2da971dfcfab3c034

    SHA1

    9ffce3484256fdad2f1a919766af22e482ae2c8a

    SHA256

    a5213268cef2da1127fba1df3a46633032330607c7e9c9493bf872ddb72269cd

    SHA512

    d3da872b6df9c42544c18bcc6c41f6be137362af9d55029df3bab1d3f1d8d484448828cdc190a79b55ffe2c4629f06289fab075fc7df511ab68501c277181d71

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    1.6MB

    MD5

    94022d68c98e9125e28d6d488c41c9b3

    SHA1

    dc47ea7501cb8fee9be9319dc3d278d784de7784

    SHA256

    871ab55fff1ad7748a37be01223991fd66192981e8dd171ba4a0a7474363985d

    SHA512

    34bd2da4bcd7d788959805194236f8f6171b7166ea6f91d2581fa3e9490f7daf026786773a80195cb0b795118cac0b592b42b9e13871a1ccde5110ec698afcb3

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    1.1MB

    MD5

    fcd57505f53155ab3c6249a5e4667a11

    SHA1

    9c9aa583cdf5fd8bb0cb9863fece63e1a0e6c285

    SHA256

    6698fb55a55aa86d5509f53960a6472a026436a25b323c0b636580f93ae56fbd

    SHA512

    cd62d04fa09537ea6330a56df3d9099f1809f57e41e9893856dfafb57aa5a46354efa88fbe4719d94b1c4b9ca3fdc8fd1298b55219d330a3894a53383f6fe5bd

  • memory/2304-79-0x00007FFE77E90000-0x00007FFE78085000-memory.dmp

    Filesize

    2.0MB

  • memory/2304-76-0x00007FFE358C0000-0x00007FFE358D0000-memory.dmp

    Filesize

    64KB

  • memory/2304-72-0x00007FFE77E90000-0x00007FFE78085000-memory.dmp

    Filesize

    2.0MB

  • memory/2304-74-0x00007FFE77E90000-0x00007FFE78085000-memory.dmp

    Filesize

    2.0MB

  • memory/2304-78-0x00007FFE77E90000-0x00007FFE78085000-memory.dmp

    Filesize

    2.0MB

  • memory/2304-80-0x00007FFE77E90000-0x00007FFE78085000-memory.dmp

    Filesize

    2.0MB

  • memory/2304-82-0x00007FFE358C0000-0x00007FFE358D0000-memory.dmp

    Filesize

    64KB

  • memory/2304-84-0x00007FFE77E90000-0x00007FFE78085000-memory.dmp

    Filesize

    2.0MB

  • memory/2304-85-0x00007FFE77E90000-0x00007FFE78085000-memory.dmp

    Filesize

    2.0MB

  • memory/2304-83-0x00007FFE77E90000-0x00007FFE78085000-memory.dmp

    Filesize

    2.0MB

  • memory/2304-81-0x00007FFE77E90000-0x00007FFE78085000-memory.dmp

    Filesize

    2.0MB

  • memory/2304-106-0x00007FFE77E90000-0x00007FFE78085000-memory.dmp

    Filesize

    2.0MB

  • memory/2304-77-0x00007FFE77E90000-0x00007FFE78085000-memory.dmp

    Filesize

    2.0MB

  • memory/2304-71-0x00007FFE77E90000-0x00007FFE78085000-memory.dmp

    Filesize

    2.0MB

  • memory/2304-75-0x00007FFE77E90000-0x00007FFE78085000-memory.dmp

    Filesize

    2.0MB

  • memory/2304-73-0x00007FFE77E90000-0x00007FFE78085000-memory.dmp

    Filesize

    2.0MB

  • memory/2304-70-0x00007FFE37F10000-0x00007FFE37F20000-memory.dmp

    Filesize

    64KB

  • memory/2304-69-0x00007FFE37F10000-0x00007FFE37F20000-memory.dmp

    Filesize

    64KB

  • memory/2304-68-0x00007FFE37F10000-0x00007FFE37F20000-memory.dmp

    Filesize

    64KB

  • memory/2304-67-0x00007FFE37F10000-0x00007FFE37F20000-memory.dmp

    Filesize

    64KB

  • memory/2304-66-0x00007FFE37F10000-0x00007FFE37F20000-memory.dmp

    Filesize

    64KB

  • memory/3556-64-0x0000000000400000-0x0000000000693000-memory.dmp

    Filesize

    2.6MB

  • memory/3556-0-0x0000000000950000-0x0000000000951000-memory.dmp

    Filesize

    4KB

  • memory/3808-65-0x00000000023F0000-0x00000000023F1000-memory.dmp

    Filesize

    4KB

  • memory/3808-100-0x0000000000400000-0x0000000000693000-memory.dmp

    Filesize

    2.6MB

  • memory/3808-105-0x00000000023F0000-0x00000000023F1000-memory.dmp

    Filesize

    4KB

  • memory/3808-111-0x0000000000400000-0x0000000000693000-memory.dmp

    Filesize

    2.6MB

  • memory/3808-131-0x0000000000400000-0x0000000000693000-memory.dmp

    Filesize

    2.6MB