Analysis
-
max time kernel
146s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 13:32
Static task
static1
Behavioral task
behavioral1
Sample
81351025614fa49877fe720b29232748.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
81351025614fa49877fe720b29232748.exe
Resource
win10v2004-20231222-en
General
-
Target
81351025614fa49877fe720b29232748.exe
-
Size
1.0MB
-
MD5
81351025614fa49877fe720b29232748
-
SHA1
562d461be71f9a6174b4aa4ea6b7ea11cc7882b4
-
SHA256
7b35b77b3a955e72ffb5beadec92e06345aa719661cd2e3fe9ab283594fd5951
-
SHA512
8e4e42352ff3e07db7cfdd7b80ed428b3cbd649d756f6e6565d5bcb6a3c2d2f0b5b72280e0c6800463cb4d7b1789362b497ff5307d0af254cdba0e9ec47cad75
-
SSDEEP
12288:GMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9BL+AUbA1w/6xZZUD0X4k+:GnsJ39LyjbJkQFMhmC+6GD9ReSfZUAX8
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2148 ._cache_81351025614fa49877fe720b29232748.exe 2764 Synaptics.exe 2564 ._cache_Synaptics.exe -
Loads dropped DLL 14 IoCs
pid Process 1864 81351025614fa49877fe720b29232748.exe 1864 81351025614fa49877fe720b29232748.exe 1864 81351025614fa49877fe720b29232748.exe 1864 81351025614fa49877fe720b29232748.exe 2764 Synaptics.exe 2764 Synaptics.exe 2764 Synaptics.exe 1552 WerFault.exe 1552 WerFault.exe 1552 WerFault.exe 1552 WerFault.exe 1552 WerFault.exe 1552 WerFault.exe 1552 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 81351025614fa49877fe720b29232748.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1552 2564 WerFault.exe 30 -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 2 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1864 wrote to memory of 2148 1864 81351025614fa49877fe720b29232748.exe 28 PID 1864 wrote to memory of 2148 1864 81351025614fa49877fe720b29232748.exe 28 PID 1864 wrote to memory of 2148 1864 81351025614fa49877fe720b29232748.exe 28 PID 1864 wrote to memory of 2148 1864 81351025614fa49877fe720b29232748.exe 28 PID 1864 wrote to memory of 2764 1864 81351025614fa49877fe720b29232748.exe 29 PID 1864 wrote to memory of 2764 1864 81351025614fa49877fe720b29232748.exe 29 PID 1864 wrote to memory of 2764 1864 81351025614fa49877fe720b29232748.exe 29 PID 1864 wrote to memory of 2764 1864 81351025614fa49877fe720b29232748.exe 29 PID 2764 wrote to memory of 2564 2764 Synaptics.exe 30 PID 2764 wrote to memory of 2564 2764 Synaptics.exe 30 PID 2764 wrote to memory of 2564 2764 Synaptics.exe 30 PID 2764 wrote to memory of 2564 2764 Synaptics.exe 30 PID 2564 wrote to memory of 1552 2564 ._cache_Synaptics.exe 35 PID 2564 wrote to memory of 1552 2564 ._cache_Synaptics.exe 35 PID 2564 wrote to memory of 1552 2564 ._cache_Synaptics.exe 35 PID 2564 wrote to memory of 1552 2564 ._cache_Synaptics.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\81351025614fa49877fe720b29232748.exe"C:\Users\Admin\AppData\Local\Temp\81351025614fa49877fe720b29232748.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\._cache_81351025614fa49877fe720b29232748.exe"C:\Users\Admin\AppData\Local\Temp\._cache_81351025614fa49877fe720b29232748.exe"2⤵
- Executes dropped EXE
PID:2148
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 3564⤵
- Loads dropped DLL
- Program crash
PID:1552
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121KB
MD58c150da6d3f7dd9c5bc2a020865192c4
SHA13c382a2a631264ae586e93f16d907680a15f9dd1
SHA25655583e7ea02ad9f7fa6c2c5bfcc532b4644aa71a120a47beb71a7dfe23e2bbe8
SHA512ffe07887648c6426afcdac7d648ee6c56cd3d214edad5e1c937e18118e5e40e7e43556f0b71c5a8abe6bd0d0df1288903e88ad34b53b29c04c53c35e5f12a92a
-
Filesize
15KB
MD5138bbaa2c07c252b877e50b9ec8874f1
SHA1167ddf5cdd0d6d1acf9bff8c68cd4bf3a05a1501
SHA256ae5d0742253f8003a1cd372e16ea6854aae6cefa35ca5984e110b45fabadaf71
SHA5129c416a7a26e6ad8167fcaf3e5a3444fa6d23413ba4b5dd0fc4ea5ba260a80da77f53a8c4d0e5dbd9ae30f15e42a1ecd74655a4f01a996c431dc6bfe014810c3f
-
Filesize
79KB
MD55939106129b2fbcc7c2d94cf2b8a905f
SHA1b9b8ba962c02866ff0b5c2ff529980efe403ff7f
SHA2569594fd0e1fd84ccf9cef200c6ff578e015fdd16c1e8442c604fe39b14422ce7d
SHA512c0dcbf4dc44055516a8aef00182641b6e358ab6b8e8d1ceebf007f4eab05756d9f3e0c99b26eb4cacca5ccc382cee04ae9c9fd39ff65276eda90775373882bd6
-
Filesize
81KB
MD5c132a266d9bfb3e8da7339ea82168d71
SHA195dcdb41acf85574f7fb3a24eeb3ad1f5ad2a3d1
SHA256b86d4b7e88ac9b1fa7eb65216b37197d52c7737cbd8b42aabe28f5ae931652e4
SHA512be2e50773718315e2aaa1b5af2b7826f2ce3cf235d7e8ad728e1b3da78742743203c79ec1f7ec652999da5c88cc936c039f62ed1eb5aef0179dd79e4ce525b12
-
Filesize
91KB
MD5dfbbdbdfc332fdc90066afd8a1a42740
SHA15254296f0fb48bdc9a53041bdbefe727330c4f13
SHA256e8882e40e375a30fb0185c92863264e65f67acccc54c80d3866aa5e4ded8143c
SHA51299eb5cdb61133429f31be509a06d9c7f11dc70201f60d68a13b4d72e90da1cc3bac59d2be5d6be7218f5602c9470179864da3761f10854b0daa5874660e94935
-
Filesize
45KB
MD536c97cb264ecf65c45055545ad0e876f
SHA13992f95898230155bf1af4b9c75407a6f47e86f4
SHA256b794aa5c5cff288780d7b4ac8f3854a13ca43a8912519a9bee6c3b70c30f53ca
SHA5127004828859d9365cf820b63c968006e0d260034451489a6e507ebaa81f5dac9853fee30e31632c4ee65b58d1f960ba31f0fba6207537c8f67e2029e66890b25b
-
Filesize
9KB
MD562f650eaf5737b6b40aad7697c333de9
SHA1cbdb8e8e71d2fb4f0a4db04f901c11c83bc4da56
SHA256ddd319fe44188ab007bff1e0bee0af59e8ba4860fb8ae903593a4bbb27644f27
SHA512d0d1b53e8fc71813f510253c13dafb45e3873d05d669c5da1595060204db019d1ad42b76bb5d35d3cff4c11234f4b1d670e6f86e932a41fdd5bec937f8c7bc2e
-
Filesize
42KB
MD55d2f5fa8d8d79963192aba75e7cad566
SHA1ef4bb72aebab0732d7df76ca83dc6e189a5f4746
SHA2568a73ebc194ce098fcfb8bbab8de3d5ab71776b5833601882053171431a17af99
SHA512ea05b00526a5e95d2957ef68696bfb1ed824ca62d95b220aebfdd48870251fa76f2603ece08b1e3da70bdb9f20276add8670dec824468e45312a75da0e340331
-
Filesize
72KB
MD5f88684b0356017094f8a676e6050fc77
SHA1b54ce3c074a22ecb3b8e981e91e22577795dfedb
SHA2562b96b5e9dbe2feca77f7d3f921db9088ddafc44063e2f64d40e9ecad6bd41ec9
SHA51227755e081411b3e046fc4b4f42f0c501ba9ee7bfe70b7cf4de69f0ee15ff3e5860d3c1b11759034f92455e60e28128f13d9b60e3ccaa03cbc20365a365000f20
-
Filesize
61KB
MD5ccfd0ecc3139aa9c879c1328380e5321
SHA18f984b05b30726952632e6068355adaf839e11df
SHA25617225a2946120a7e5a76b3234ac58f41c00f1346e6b197dddb47139019ec2011
SHA51298b4528e527165a54808c0e8e77e6d2284bb64e80de3816670f5f24251aa31e0421cb759f08e7fe691514d3c1f6f4f9021b1eabcef2ba90a4920d5c3e167141a
-
Filesize
111KB
MD56605296f5a870a66b2c273f7c6cadf5c
SHA17e2aaa958146954cded6b22c3adf6cd884e475f3
SHA256292018cba5bc60f08e231a34991259e779775c21adef226aef1ff8ccb358f5ee
SHA5128e78707be31177f3c50c8d07c051d522786add605de227ffff8d0b96e41f3d770f7a3bc5134588efac71f5f43dae0c5c667e148541442af073f8baa61bd51fd8
-
Filesize
86KB
MD5239dae7f08f8ae2754550f11285ad6d3
SHA1a9ed3120711d4ba3b4b7a0faa3ee88a66ffec22b
SHA256af6e2dd3c859da8841e1ae8936a51d66c0c0fbea700a319ba70c107ea767ba42
SHA512593cff1d1afdc19cb451417010a67607aa7d991043d69308084a638c8176e016585cdbc937fdad4ce9bed960ca4809926fba89de71805affc9e782a194aa92c6
-
Filesize
57KB
MD5d38960979cb6f77a030b2886201ccc8d
SHA1e9f46dc30b779622e256d0c507c403277b32980e
SHA256bf7e26bc97c7c488aa451a2e827b8e2b633c993af96cb90385a6cea79e49afeb
SHA51281e22881b714d9a336ab334b8ab11039f463c5b959f832c85af8c9199c479e6eff1dda69c50da424e4b7267845767883d9d973e3ef32e14cb7822003d2734858
-
Filesize
301KB
MD5c8d0166f0514b28771d173bfa7f0a5b5
SHA1a665d8586b00b924159a9cada82cfd48a4dead31
SHA256132317183d6356e3d4a9d8c7f237d60ca0356587f03a18fdb7178a11e7c24de8
SHA51259d4ad9c5758d23afdad48314a2f62017eb582e2a892611fc65c2d074880c93bdfa95f38af4e21258dff4c664faa0b5943e81edcf2fbcc1278eca294688b2bb8