Analysis
-
max time kernel
170s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/01/2024, 14:38
Static task
static1
Behavioral task
behavioral1
Sample
38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe
Resource
win10v2004-20231215-en
General
-
Target
38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe
-
Size
3.5MB
-
MD5
9faace482045ab5df714a1e42ccca112
-
SHA1
85156d4347decd70b060f7f90aea67fc7ca7bde8
-
SHA256
38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33
-
SHA512
874f04dfad6149d0635c84bf3e6c51caf74a7d5ae7ac62477d6760cfa19dfe8571c2da6e1b149e7f837407cc5e905b4767015e0608d3554ef2a9e05bb87ca083
-
SSDEEP
49152:9YREXSVMDi34QnsHyjtk2MYC5GDsVN/wEwqq8u5zn:S2SVMD8dnsmtk2alWqTuxn
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x0006000000023248-5.dat family_gh0strat -
ParallaxRat payload 21 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral2/memory/1716-249-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/1716-253-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/1716-256-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/1716-259-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/1716-260-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/1716-263-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/1716-265-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/1716-266-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/4928-275-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/4928-274-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/1716-267-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/1716-264-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/1716-258-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/1716-257-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/1716-255-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/1716-254-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/1716-252-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/1716-251-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/1716-250-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/1716-244-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral2/memory/1716-299-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\svchcst\Parameters\ServiceDll = "C:\\Windows\\system32\\240649968.bat" look2.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\retero.exe DllHost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\retero.exe DllHost.exe -
Executes dropped EXE 6 IoCs
pid Process 3228 look2.exe 3216 HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 5064 Synaptics.exe 1412 ._cache_Synaptics.exe 4036 svchcst.exe -
Loads dropped DLL 3 IoCs
pid Process 3228 look2.exe 2156 svchost.exe 4036 svchcst.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\240649968.bat look2.exe File opened for modification C:\Windows\SysWOW64\ini.ini look2.exe File created C:\Windows\SysWOW64\svchcst.exe svchost.exe File opened for modification C:\Windows\SysWOW64\svchcst.exe svchost.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1268 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1164 38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 1164 38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 1412 ._cache_Synaptics.exe 1412 ._cache_Synaptics.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 1412 ._cache_Synaptics.exe 1412 ._cache_Synaptics.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 1412 ._cache_Synaptics.exe 1412 ._cache_Synaptics.exe 1412 ._cache_Synaptics.exe 1412 ._cache_Synaptics.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 1412 ._cache_Synaptics.exe 1412 ._cache_Synaptics.exe 1412 ._cache_Synaptics.exe 1412 ._cache_Synaptics.exe 1412 ._cache_Synaptics.exe 1412 ._cache_Synaptics.exe 1412 ._cache_Synaptics.exe 1412 ._cache_Synaptics.exe 1412 ._cache_Synaptics.exe 1412 ._cache_Synaptics.exe 1412 ._cache_Synaptics.exe 1412 ._cache_Synaptics.exe 1412 ._cache_Synaptics.exe 1412 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1164 38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 1164 38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 1268 EXCEL.EXE 1268 EXCEL.EXE 1268 EXCEL.EXE 1268 EXCEL.EXE 1268 EXCEL.EXE -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1164 wrote to memory of 3228 1164 38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 92 PID 1164 wrote to memory of 3228 1164 38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 92 PID 1164 wrote to memory of 3228 1164 38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 92 PID 1164 wrote to memory of 3216 1164 38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 95 PID 1164 wrote to memory of 3216 1164 38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 95 PID 1164 wrote to memory of 3216 1164 38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 95 PID 3216 wrote to memory of 3560 3216 HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 96 PID 3216 wrote to memory of 3560 3216 HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 96 PID 3216 wrote to memory of 3560 3216 HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 96 PID 3216 wrote to memory of 5064 3216 HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 97 PID 3216 wrote to memory of 5064 3216 HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 97 PID 3216 wrote to memory of 5064 3216 HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 97 PID 5064 wrote to memory of 1412 5064 Synaptics.exe 98 PID 5064 wrote to memory of 1412 5064 Synaptics.exe 98 PID 5064 wrote to memory of 1412 5064 Synaptics.exe 98 PID 2156 wrote to memory of 4036 2156 svchost.exe 101 PID 2156 wrote to memory of 4036 2156 svchost.exe 101 PID 2156 wrote to memory of 4036 2156 svchost.exe 101 PID 3560 wrote to memory of 1716 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 102 PID 3560 wrote to memory of 1716 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 102 PID 3560 wrote to memory of 1716 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 102 PID 3560 wrote to memory of 1716 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 102 PID 3560 wrote to memory of 1716 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 102 PID 3560 wrote to memory of 1716 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 102 PID 3560 wrote to memory of 1716 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 102 PID 3560 wrote to memory of 1716 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 102 PID 3560 wrote to memory of 1716 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 102 PID 3560 wrote to memory of 1716 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 102 PID 3560 wrote to memory of 1716 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 102 PID 3560 wrote to memory of 1716 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 102 PID 3560 wrote to memory of 1716 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 102 PID 3560 wrote to memory of 1716 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 102 PID 3560 wrote to memory of 1716 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 102 PID 3560 wrote to memory of 1716 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 102 PID 3560 wrote to memory of 1716 3560 ._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe 102 PID 1412 wrote to memory of 4928 1412 ._cache_Synaptics.exe 104 PID 1412 wrote to memory of 4928 1412 ._cache_Synaptics.exe 104 PID 1412 wrote to memory of 4928 1412 ._cache_Synaptics.exe 104 PID 1412 wrote to memory of 4928 1412 ._cache_Synaptics.exe 104 PID 1412 wrote to memory of 4928 1412 ._cache_Synaptics.exe 104 PID 1412 wrote to memory of 4928 1412 ._cache_Synaptics.exe 104 PID 1412 wrote to memory of 4928 1412 ._cache_Synaptics.exe 104 PID 1412 wrote to memory of 4928 1412 ._cache_Synaptics.exe 104 PID 1412 wrote to memory of 4928 1412 ._cache_Synaptics.exe 104 PID 1412 wrote to memory of 4928 1412 ._cache_Synaptics.exe 104 PID 1412 wrote to memory of 4928 1412 ._cache_Synaptics.exe 104 PID 1412 wrote to memory of 4928 1412 ._cache_Synaptics.exe 104 PID 1412 wrote to memory of 4928 1412 ._cache_Synaptics.exe 104 PID 1412 wrote to memory of 4928 1412 ._cache_Synaptics.exe 104 PID 1412 wrote to memory of 4928 1412 ._cache_Synaptics.exe 104 PID 1412 wrote to memory of 4928 1412 ._cache_Synaptics.exe 104 PID 1412 wrote to memory of 4928 1412 ._cache_Synaptics.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe"C:\Users\Admin\AppData\Local\Temp\38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\look2.exeC:\Users\Admin\AppData\Local\Temp\\look2.exe2⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:3228
-
-
C:\Users\Admin\AppData\Local\Temp\HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exeC:\Users\Admin\AppData\Local\Temp\HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe"C:\Users\Admin\AppData\Local\Temp\._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe"C:\Users\Admin\AppData\Local\Temp\._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe"4⤵PID:1716
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate5⤵PID:4928
-
-
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchcst"1⤵PID:1412
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchcst"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\svchcst.exeC:\Windows\system32\svchcst.exe "c:\windows\system32\240649968.bat",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4036
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1268
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- Drops startup file
PID:4720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe
Filesize381KB
MD5172ad4330f354a946837c90d0a4e56b2
SHA1d79f808f72e9403aea8880e95ecbbee5ad555cd7
SHA256296789f4ee01c92f8e4a6547d190385f699faa518ebd949a09b3eb215ad90810
SHA512312b7a163bbe8322bb98a88ecea40fa784863c491b79deb6a4da494af6ee1056d809e3f367736b756498cc597e8c6017776c327f00f10fa7dc1a51843ff7445d
-
C:\Users\Admin\AppData\Local\Temp\HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe
Filesize197KB
MD54a18a5ef2bd1e3cc2993b305b049b1db
SHA12c36ecab91be49abd270d505e5035f621b2310f6
SHA256e02b2becadf16c3a6b7a159037652dca8243ae55a842d9fbca9e751cf7a7e832
SHA512d784d1414adabc132e5112190979752fd6c843887e9d203a52822af2401eaa6ffe5cf40395adcf241eff34f58f514a76b1b7f62898ee6d950be643cc08eaa188
-
C:\Users\Admin\AppData\Local\Temp\HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe
Filesize1.1MB
MD5afbaff5b0f0641f35768f0022f4e0e8f
SHA13557f9e1fdf407bf523d851410a26f7512d88111
SHA256e000ac762a38933cb03ae247615b5335a5f12b6114c769c29e7d05fc940fffd4
SHA512336400ea3b37a5f218f83fef49b360725fda5cb54c3a7cfe3b8b43e2fda0a40ce4d56d954cbdeb623caa0e537059ec948b28f492d7d5280cc37d08803653bc8c
-
Filesize
96KB
MD5dec1c063e6fba01678c9078ec2e87894
SHA15119f1d4627444adaf73c8721b4fb1d5c4ea2a75
SHA25678fcaf28dc78ba6bebac7f963e41972ff173cd561f3bc1e27d5db2cef01fec82
SHA512ed34ac1ff24c5511f1d3293745352cee8394902bb3b659523ddfe9ce291f14b5da55b90e758f6720c34cc4f5c6388f23c35a5205bbde187df43c3c8d621db1c2
-
Filesize
337KB
MD52f3b6f16e33e28ad75f3fdaef2567807
SHA185e907340faf1edfc9210db85a04abd43d21b741
SHA25686492ebf2d6f471a5ee92977318d099b3ea86175b5b7ae522237ae01d07a4857
SHA512db17e99e2df918cfc9ccbe934adfe73f0777ce1ce9f28b57a4b24ecd821efe2e0b976a634853247b77b16627d2bb3af4ba20306059d1d25ef38ffada7da3e3a4
-
Filesize
51KB
MD5c49425fc170f0f409fb14b26d92e6825
SHA1b98bce0ff50d054d44b2aa337057fccb9964aa71
SHA2568dbd24c9f28b90fef859ae3a9dadcd35d48bc0ddb954145becf2371f32cb5a7a
SHA512bb81910323b65c445b094ac23fea784417458e70bc31435c9dd878f366888ea5df32ccc9501c9ee3b8c4bd8db15884611e7264e6960186518b9ded9e684875cc