Overview
overview
10Static
static
10SynapseX.r....2.rar
windows7-x64
10SynapseX.r....2.rar
windows10-2004-x64
3SynapseX r...er.exe
windows7-x64
10SynapseX r...er.exe
windows10-2004-x64
10SynapseX r...7c.bin
windows7-x64
3SynapseX r...7c.bin
windows10-2004-x64
3SynapseX r...Ek.exe
windows7-x64
1SynapseX r...Ek.exe
windows10-2004-x64
1SynapseX r...re.dll
windows7-x64
3SynapseX r...re.dll
windows10-2004-x64
3SynapseX r...ss.exe
windows7-x64
1SynapseX r...ss.exe
windows10-2004-x64
1SynapseX r...re.dll
windows7-x64
3SynapseX r...re.dll
windows10-2004-x64
3SynapseX r...pf.dll
windows7-x64
1SynapseX r...pf.dll
windows10-2004-x64
1SynapseX r...rp.dll
windows7-x64
1SynapseX r...rp.dll
windows10-2004-x64
1SynapseX r...r.html
windows7-x64
1SynapseX r...r.html
windows10-2004-x64
1SynapseX r...LS.dll
windows7-x64
9SynapseX r...LS.dll
windows10-2004-x64
9SynapseX r...tt.exe
windows7-x64
1SynapseX r...tt.exe
windows10-2004-x64
1SynapseX r...or.dll
windows7-x64
9SynapseX r...or.dll
windows10-2004-x64
9SynapseX r...�S.txt
windows7-x64
1SynapseX r...�S.txt
windows10-2004-x64
1SynapseX r...lf.dll
windows7-x64
1SynapseX r...lf.dll
windows10-2004-x64
1SynapseX r...47.dll
windows10-2004-x64
3SynapseX r...GL.dll
windows7-x64
1Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 21:56
Behavioral task
behavioral1
Sample
SynapseX.revamaped.V1.2.rar
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
SynapseX.revamaped.V1.2.rar
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
SynapseX revamaped V1.2/Synapse X Launcher.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
SynapseX revamaped V1.2/Synapse X Launcher.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
SynapseX revamaped V1.2/auth/internal/3132e54eb7c.bin
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
SynapseX revamaped V1.2/auth/internal/3132e54eb7c.bin
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
SynapseX revamaped V1.2/bin/359k6u5HUNL4tEk.exe
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
SynapseX revamaped V1.2/bin/359k6u5HUNL4tEk.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
SynapseX revamaped V1.2/bin/CefSharp.BrowserSubprocess.Core.dll
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
SynapseX revamaped V1.2/bin/CefSharp.BrowserSubprocess.Core.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
SynapseX revamaped V1.2/bin/CefSharp.BrowserSubprocess.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
SynapseX revamaped V1.2/bin/CefSharp.BrowserSubprocess.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
SynapseX revamaped V1.2/bin/CefSharp.Core.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
SynapseX revamaped V1.2/bin/CefSharp.Core.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
SynapseX revamaped V1.2/bin/CefSharp.Wpf.dll
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
SynapseX revamaped V1.2/bin/CefSharp.Wpf.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
SynapseX revamaped V1.2/bin/CefSharp.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
SynapseX revamaped V1.2/bin/CefSharp.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
SynapseX revamaped V1.2/bin/Editor.html
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
SynapseX revamaped V1.2/bin/Editor.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
SynapseX revamaped V1.2/bin/JTYGLdAQoGLS.dll
Resource
win7-20240419-en
Behavioral task
behavioral22
Sample
SynapseX revamaped V1.2/bin/JTYGLdAQoGLS.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
SynapseX revamaped V1.2/bin/OoxIi8qtt.exe
Resource
win7-20240220-en
Behavioral task
behavioral24
Sample
SynapseX revamaped V1.2/bin/OoxIi8qtt.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
SynapseX revamaped V1.2/bin/SynapseInjector.dll
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
SynapseX revamaped V1.2/bin/SynapseInjector.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
SynapseX revamaped V1.2/bin/bps/EMIL LÄS.txt
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
SynapseX revamaped V1.2/bin/bps/EMIL LÄS.txt
Resource
win10v2004-20240426-en
Behavioral task
behavioral29
Sample
SynapseX revamaped V1.2/bin/chrome_elf.dll
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
SynapseX revamaped V1.2/bin/chrome_elf.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
SynapseX revamaped V1.2/bin/d3dcompiler_47.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral32
Sample
SynapseX revamaped V1.2/bin/libEGL.dll
Resource
win7-20240508-en
General
-
Target
SynapseX revamaped V1.2/auth/internal/3132e54eb7c.bin
-
Size
2B
-
MD5
f3b25701fe362ec84616a93a45ce9998
-
SHA1
d62636d8caec13f04e28442a0a6fa1afeb024bbb
-
SHA256
b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
-
SHA512
98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\.bin\ = "bin_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\bin_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\bin_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\bin_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\.bin rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\bin_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\bin_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\bin_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2796 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2796 AcroRd32.exe 2796 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2968 wrote to memory of 2668 2968 cmd.exe rundll32.exe PID 2968 wrote to memory of 2668 2968 cmd.exe rundll32.exe PID 2968 wrote to memory of 2668 2968 cmd.exe rundll32.exe PID 2668 wrote to memory of 2796 2668 rundll32.exe AcroRd32.exe PID 2668 wrote to memory of 2796 2668 rundll32.exe AcroRd32.exe PID 2668 wrote to memory of 2796 2668 rundll32.exe AcroRd32.exe PID 2668 wrote to memory of 2796 2668 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\SynapseX revamaped V1.2\auth\internal\3132e54eb7c.bin"1⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\SynapseX revamaped V1.2\auth\internal\3132e54eb7c.bin2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\SynapseX revamaped V1.2\auth\internal\3132e54eb7c.bin"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD589917516d595f43ecb12bee132d41b59
SHA157f27ddfa9a7fc6adf67e53e0479ba9499234ba8
SHA2561145b1e51986b2cc55a0b44dad75a1d9f1b8d47ca221b84df6656f0452c98be1
SHA51289b717c643ddf33fe85da978adbda73e0e8e4780ff078d77392fd749ac6fec103ce8957fb04d0322644087f90f4a16132a5406be202796773f75bed0a4657bbd