Analysis
-
max time kernel
23s -
max time network
20s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
10/05/2024, 16:58
General
-
Target
Synapse Launcher.exe
-
Size
3.2MB
-
MD5
e2714f403955519640abda3d9994ab49
-
SHA1
2f49f53f4c8b84440690a3e930920c56131d7008
-
SHA256
22445a645229adce8803c92dbd9fe58beb3e50115352696e1adbab4dbcef0828
-
SHA512
3efc0da405999d7b8a0bdf682a5bf179477d31e34823f8d7c9e19da44801481cbcc151f4d39a40e323f4fc087a0fc068eeff216c2d227fa1b5747394d4112cea
-
SSDEEP
49152:Qv3I22SsaNYfdPBldt698dBcjHurHArgoGdDTHHB72eh2NTz:Qv422SsaNYfdPBldt6+dBcjHurHAs
Malware Config
Extracted
quasar
1.4.1
SynapseX
espiny-38468.portmap.host:38468
987e6177-8b62-48ea-8ca9-c699971b74ba
-
encryption_key
C7EC88A5CCB59BD73EF3F7D4787818BE89C06664
-
install_name
Boot 10.5.exe
-
log_directory
Windows Logs
-
reconnect_delay
3000
-
startup_key
Windows 10 Boot
-
subdirectory
Windows 10 Boot
Signatures
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/memory/5016-1-0x0000000000DB0000-0x00000000010F0000-memory.dmp family_quasar behavioral1/files/0x000100000002a9d1-6.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 3304 Boot 10.5.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\system32\Windows 10 Boot Boot 10.5.exe File created C:\Windows\system32\Windows 10 Boot\Boot 10.5.exe Synapse Launcher.exe File opened for modification C:\Windows\system32\Windows 10 Boot\Boot 10.5.exe Synapse Launcher.exe File opened for modification C:\Windows\system32\Windows 10 Boot Synapse Launcher.exe File opened for modification C:\Windows\system32\Windows 10 Boot\Boot 10.5.exe Boot 10.5.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4980 schtasks.exe 4984 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5016 Synapse Launcher.exe Token: SeDebugPrivilege 3304 Boot 10.5.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5016 wrote to memory of 4980 5016 Synapse Launcher.exe 81 PID 5016 wrote to memory of 4980 5016 Synapse Launcher.exe 81 PID 5016 wrote to memory of 3304 5016 Synapse Launcher.exe 83 PID 5016 wrote to memory of 3304 5016 Synapse Launcher.exe 83 PID 3304 wrote to memory of 4984 3304 Boot 10.5.exe 85 PID 3304 wrote to memory of 4984 3304 Boot 10.5.exe 85 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Synapse Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Synapse Launcher.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Windows\system32\Windows 10 Boot\Boot 10.5.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:4980
-
-
C:\Windows\system32\Windows 10 Boot\Boot 10.5.exe"C:\Windows\system32\Windows 10 Boot\Boot 10.5.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Windows\system32\Windows 10 Boot\Boot 10.5.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:4984
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5e2714f403955519640abda3d9994ab49
SHA12f49f53f4c8b84440690a3e930920c56131d7008
SHA25622445a645229adce8803c92dbd9fe58beb3e50115352696e1adbab4dbcef0828
SHA5123efc0da405999d7b8a0bdf682a5bf179477d31e34823f8d7c9e19da44801481cbcc151f4d39a40e323f4fc087a0fc068eeff216c2d227fa1b5747394d4112cea