Analysis

  • max time kernel
    83s
  • max time network
    87s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-03-2024 15:25

General

  • Target

    https://github.com/DevXXORO/Synapse-X-Cracked

Score
10/10

Malware Config

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/DevXXORO/Synapse-X-Cracked
    1⤵
      PID:1952
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --mojo-platform-channel-handle=5144 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:1
      1⤵
        PID:3076
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=4540 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:1
        1⤵
          PID:1464
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3416 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:8
          1⤵
            PID:528
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --mojo-platform-channel-handle=6028 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:1
            1⤵
              PID:1020
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=4004 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:8
              1⤵
                PID:3560
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --no-appcompat-clear --mojo-platform-channel-handle=5524 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:8
                1⤵
                  PID:3212
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --mojo-platform-channel-handle=5512 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:1
                  1⤵
                    PID:1232
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=6336 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:8
                    1⤵
                      PID:3012
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --mojo-platform-channel-handle=6652 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:8
                      1⤵
                        PID:3892
                      • C:\Users\Admin\Downloads\SynapseX.exe
                        "C:\Users\Admin\Downloads\SynapseX.exe"
                        1⤵
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:5112
                        • C:\Windows\System32\Wbem\wmic.exe
                          "wmic.exe" csproduct get uuid
                          2⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3996
                      • C:\Users\Admin\Downloads\SynapseX.exe
                        "C:\Users\Admin\Downloads\SynapseX.exe"
                        1⤵
                          PID:884
                        • C:\Users\Admin\Downloads\SynapseX.exe
                          "C:\Users\Admin\Downloads\SynapseX.exe"
                          1⤵
                            PID:4480
                          • C:\Users\Admin\Downloads\SynapseX.exe
                            "C:\Users\Admin\Downloads\SynapseX.exe"
                            1⤵
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:3796
                            • C:\Windows\System32\Wbem\wmic.exe
                              "wmic.exe" csproduct get uuid
                              2⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2520
                          • C:\Users\Admin\Downloads\SynapseX.exe
                            "C:\Users\Admin\Downloads\SynapseX.exe"
                            1⤵
                              PID:3020
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --mojo-platform-channel-handle=6888 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:8
                              1⤵
                                PID:4996
                              • C:\Users\Admin\Downloads\SynapseX.exe
                                "C:\Users\Admin\Downloads\SynapseX.exe"
                                1⤵
                                  PID:4912
                                • C:\Users\Admin\Downloads\SynapseX.exe
                                  "C:\Users\Admin\Downloads\SynapseX.exe"
                                  1⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:3020
                                  • C:\Windows\System32\Wbem\wmic.exe
                                    "wmic.exe" csproduct get uuid
                                    2⤵
                                      PID:2520

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SynapseX.exe.log

                                    Filesize

                                    1KB

                                    MD5

                                    4c8fa14eeeeda6fe76a08d14e08bf756

                                    SHA1

                                    30003b6798090ec74eb477bbed88e086f8552976

                                    SHA256

                                    7ebfcfca64b0c1c9f0949652d50a64452b35cefe881af110405cd6ec45f857a5

                                    SHA512

                                    116f80182c25cf0e6159cf59a35ee27d66e431696d29ec879c44521a74ab7523cbfdefeacfb6a3298b48788d7a6caa5336628ec9c1d8b9c9723338dcffea4116

                                  • memory/884-7-0x00007FFEAAE10000-0x00007FFEAB8D1000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/884-2-0x00007FFEAAE10000-0x00007FFEAB8D1000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/3020-18-0x00007FFEAAE10000-0x00007FFEAB8D1000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/3020-17-0x00007FFEAAE10000-0x00007FFEAB8D1000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/3020-12-0x00007FFEAAE10000-0x00007FFEAB8D1000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/3020-15-0x00007FFEAAE10000-0x00007FFEAB8D1000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/3796-10-0x00007FFEAAE10000-0x00007FFEAB8D1000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/3796-11-0x0000028E31F80000-0x0000028E31F90000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3796-14-0x00007FFEAAE10000-0x00007FFEAB8D1000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4480-0-0x000002D3EAD00000-0x000002D3EAD40000-memory.dmp

                                    Filesize

                                    256KB

                                  • memory/4480-8-0x00007FFEAAE10000-0x00007FFEAB8D1000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4480-1-0x00007FFEAAE10000-0x00007FFEAB8D1000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4912-16-0x00007FFEAAE10000-0x00007FFEAB8D1000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4912-13-0x00007FFEAAE10000-0x00007FFEAB8D1000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/5112-6-0x000001205A6D0000-0x000001205A6E0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/5112-9-0x00007FFEAAE10000-0x00007FFEAB8D1000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/5112-5-0x00007FFEAAE10000-0x00007FFEAB8D1000-memory.dmp

                                    Filesize

                                    10.8MB