Overview
overview
10Static
static
10SynapseX r...er.exe
windows7-x64
10SynapseX r...er.exe
windows10-2004-x64
SynapseX r...Ek.exe
windows7-x64
1SynapseX r...Ek.exe
windows10-2004-x64
1SynapseX r...re.dll
windows7-x64
3SynapseX r...re.dll
windows10-2004-x64
3SynapseX r...ss.exe
windows7-x64
1SynapseX r...ss.exe
windows10-2004-x64
1SynapseX r...re.dll
windows7-x64
3SynapseX r...re.dll
windows10-2004-x64
3SynapseX r...pf.dll
windows7-x64
1SynapseX r...pf.dll
windows10-2004-x64
1SynapseX r...rp.dll
windows7-x64
1SynapseX r...rp.dll
windows10-2004-x64
1SynapseX r...r.html
windows7-x64
1SynapseX r...r.html
windows10-2004-x64
1SynapseX r...LS.dll
windows7-x64
9SynapseX r...LS.dll
windows10-2004-x64
9SynapseX r...tt.exe
windows7-x64
1SynapseX r...tt.exe
windows10-2004-x64
1SynapseX r...or.dll
windows7-x64
9SynapseX r...or.dll
windows10-2004-x64
9SynapseX r...lf.dll
windows7-x64
1SynapseX r...lf.dll
windows10-2004-x64
1SynapseX r...47.dll
windows10-2004-x64
3SynapseX r...GL.dll
windows7-x64
1SynapseX r...GL.dll
windows10-2004-x64
1SynapseX r...v2.dll
windows7-x64
3SynapseX r...v2.dll
windows10-2004-x64
3SynapseX r...ef.dll
windows7-x64
1SynapseX r...ef.dll
windows10-2004-x64
1SynapseX r...mp.exe
windows7-x64
9Analysis
-
max time kernel
143s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 18:33
Behavioral task
behavioral1
Sample
SynapseX revamaped V1.2/Synapse X Launcher.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
SynapseX revamaped V1.2/Synapse X Launcher.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
SynapseX revamaped V1.2/bin/359k6u5HUNL4tEk.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
SynapseX revamaped V1.2/bin/359k6u5HUNL4tEk.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
SynapseX revamaped V1.2/bin/CefSharp.BrowserSubprocess.Core.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
SynapseX revamaped V1.2/bin/CefSharp.BrowserSubprocess.Core.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
SynapseX revamaped V1.2/bin/CefSharp.BrowserSubprocess.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
SynapseX revamaped V1.2/bin/CefSharp.BrowserSubprocess.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
SynapseX revamaped V1.2/bin/CefSharp.Core.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
SynapseX revamaped V1.2/bin/CefSharp.Core.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
SynapseX revamaped V1.2/bin/CefSharp.Wpf.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
SynapseX revamaped V1.2/bin/CefSharp.Wpf.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
SynapseX revamaped V1.2/bin/CefSharp.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
SynapseX revamaped V1.2/bin/CefSharp.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
SynapseX revamaped V1.2/bin/Editor.html
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
SynapseX revamaped V1.2/bin/Editor.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
SynapseX revamaped V1.2/bin/JTYGLdAQoGLS.dll
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
SynapseX revamaped V1.2/bin/JTYGLdAQoGLS.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
SynapseX revamaped V1.2/bin/OoxIi8qtt.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
SynapseX revamaped V1.2/bin/OoxIi8qtt.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
SynapseX revamaped V1.2/bin/SynapseInjector.dll
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
SynapseX revamaped V1.2/bin/SynapseInjector.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
SynapseX revamaped V1.2/bin/chrome_elf.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
SynapseX revamaped V1.2/bin/chrome_elf.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
SynapseX revamaped V1.2/bin/d3dcompiler_47.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral26
Sample
SynapseX revamaped V1.2/bin/libEGL.dll
Resource
win7-20240221-en
Behavioral task
behavioral27
Sample
SynapseX revamaped V1.2/bin/libEGL.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral28
Sample
SynapseX revamaped V1.2/bin/libGLESv2.dll
Resource
win7-20240508-en
Behavioral task
behavioral29
Sample
SynapseX revamaped V1.2/bin/libGLESv2.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral30
Sample
SynapseX revamaped V1.2/bin/libcef.dll
Resource
win7-20240221-en
Behavioral task
behavioral31
Sample
SynapseX revamaped V1.2/bin/libcef.dll
Resource
win10v2004-20240508-en
General
-
Target
SynapseX revamaped V1.2/bin/JTYGLdAQoGLS.dll
-
Size
105.4MB
-
MD5
1010143952121d7bd02554d1b3a82315
-
SHA1
312bb88c173170505eb473592d4303e6b22c8a2c
-
SHA256
780ce27d48318911dfabe5111970b2256e6a179730d992f927e7486b6af4ad41
-
SHA512
c4687777ae5f37abdc85ec30b5a4a0b6e202bb56e2883c62a6a75c898bb26d54f11ca7dc3dce0ca42242838de5e27e5d0fe17dfdcfc3db5f8c59140e92eaa5db
-
SSDEEP
1572864:DnWGag30Nn6vX+CK2ravtqijSQBj5NZy/h3meg4lWbJiLGOglBLnR5s409P7pq:DnWGatNn+tStqijSQBj5yPfWbcgjSXc
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 496 4988 WerFault.exe rundll32.exe 4260 4988 WerFault.exe rundll32.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVendor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSReleaseDate rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2060 wrote to memory of 4988 2060 rundll32.exe rundll32.exe PID 2060 wrote to memory of 4988 2060 rundll32.exe rundll32.exe PID 2060 wrote to memory of 4988 2060 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\SynapseX revamaped V1.2\bin\JTYGLdAQoGLS.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\SynapseX revamaped V1.2\bin\JTYGLdAQoGLS.dll",#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Checks processor information in registry
- Enumerates system info in registry
PID:4988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 6523⤵
- Program crash
PID:496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 6603⤵
- Program crash
PID:4260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4988 -ip 49881⤵PID:2144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4988 -ip 49881⤵PID:3108