Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 10:50
Static task
static1
Behavioral task
behavioral1
Sample
1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe
Resource
win10v2004-20240412-en
General
-
Target
1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe
-
Size
767KB
-
MD5
ae2f422a1ca6558ca6dd723c1b351b7a
-
SHA1
eeec0b0012f1b6c41a70f6f13d2ec01e0b3ef6ad
-
SHA256
1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda
-
SHA512
30a0ea93646669e6b2aac357e36c558da8fbd166435cc05d33daf80e01d12c4dfa903e6532ff0e58c47faee12c63998aa2313bb2e73650878f3d050654c751c3
-
SSDEEP
12288:WMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9Ks:WnsJ39LyjbJkQFMhmC+6GD9R
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2984 ._cache_1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe 2564 Synaptics.exe 2580 Runtime Broker.exe 1724 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 2264 1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe 2264 1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe 2264 1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe 2564 Synaptics.exe 2564 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\????? = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2984 ._cache_1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2984 2264 1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe 28 PID 2264 wrote to memory of 2984 2264 1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe 28 PID 2264 wrote to memory of 2984 2264 1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe 28 PID 2264 wrote to memory of 2984 2264 1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe 28 PID 2264 wrote to memory of 2564 2264 1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe 29 PID 2264 wrote to memory of 2564 2264 1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe 29 PID 2264 wrote to memory of 2564 2264 1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe 29 PID 2264 wrote to memory of 2564 2264 1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe 29 PID 2984 wrote to memory of 2580 2984 ._cache_1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe 30 PID 2984 wrote to memory of 2580 2984 ._cache_1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe 30 PID 2984 wrote to memory of 2580 2984 ._cache_1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe 30 PID 2564 wrote to memory of 1724 2564 Synaptics.exe 31 PID 2564 wrote to memory of 1724 2564 Synaptics.exe 31 PID 2564 wrote to memory of 1724 2564 Synaptics.exe 31 PID 2564 wrote to memory of 1724 2564 Synaptics.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe"C:\Users\Admin\AppData\Local\Temp\1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\._cache_1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe"C:\Users\Admin\AppData\Local\Temp\._cache_1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Runtime Broker.exe"C:\Users\Admin\AppData\Local\Runtime Broker.exe"3⤵
- Executes dropped EXE
PID:2580
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:1724
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
767KB
MD5ae2f422a1ca6558ca6dd723c1b351b7a
SHA1eeec0b0012f1b6c41a70f6f13d2ec01e0b3ef6ad
SHA2561d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda
SHA51230a0ea93646669e6b2aac357e36c558da8fbd166435cc05d33daf80e01d12c4dfa903e6532ff0e58c47faee12c63998aa2313bb2e73650878f3d050654c751c3
-
\Users\Admin\AppData\Local\Temp\._cache_1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe
Filesize22KB
MD5c664f5be59fb3a17761dd2ada9eef228
SHA11f32c2b1aa103c73c9fb9624e53318d5bc8d60f1
SHA2562a567c61c401c4fd6f7a4ae88265d7a0dbd0c14fdcc116f8c5d98da6022066ec
SHA512c24a25237d009715f3b98fdf4489af8a484ab93091dbbd6ab1815946c9af24cff3f026bb3e7bff969348621cc82769b7fd1dde5bdbaba14768b229cac85b2259