Analysis

  • max time kernel
    121s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    06/08/2024, 16:59

General

  • Target

    Synapse X.exe.xml

  • Size

    186B

  • MD5

    b51c130a957051ba9fb2245bf76fb6f6

  • SHA1

    42181e5745daab2a0e8cf87693142828306f9bda

  • SHA256

    7921098e47e894412fdfd0cafe0f88cc68497740998eac17c68c00129069d803

  • SHA512

    fa2ac3eff5d51aea7acc9cf6aa018a77fae295d55c5bf808c9d7048c801baf4626568f00fb001a9f2780c46dce294482cfeb3045aabe139ddc557c0d3bc11640

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Synapse X.exe.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:292
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2344
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2408
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2400

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          602804c445abdf8372e11669b459cef0

          SHA1

          0c811375da63e30f6957a226933aab7220ff0351

          SHA256

          d12f684e9b245451d4a28929b5c933806ff31d20df70537e4d3123aed9d1c94b

          SHA512

          85c67dff895d1ad96e90c84a1199b01ffc8d3f6f7204b881b683a4e6263857eec74f9dc5b4fbf5e22def9f7ed635f47a06fef566a607a9bd2462d4da18e8e9de

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          56e3ffc9c13d1116d2b3cf8daa694b29

          SHA1

          c90156ee603022085acbc4941336229f8cd80dd8

          SHA256

          f6b0f5d44faf6584609fca8190309c353ae25a23a94d0dce9684540fa7234fc2

          SHA512

          e698984fdf4d58a207b71609ca7a4697478b5b510ba1804f23adeb95101999632a306944afd5d8f9910bce4589bb3175bb399917a8e42cc8764ac51dede7355e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          5700912cdb7bcdab61406d04e21a4406

          SHA1

          32c21507f1b22562d45fc3e1806cc002408318a8

          SHA256

          8cd7b16a91c4b6d6aa199f9a302f588d421b23625434b0e2c3d3964d31ed8812

          SHA512

          475dd797e7f6b8b54442293547ab34fb074fd7754d956be74d4b76de1e560e318b04cb564059c37988ab40c7322949fc5385e847dd5827aee67594bc9cce5411

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          2010279aa2fe37acc9dcbed1f95829b5

          SHA1

          76aa551c313768365950be7739a5f577ea06f4f6

          SHA256

          390213ed57d3495280c84257f4f2b1bc4b5a5c775e0abceed5d0c61c5b6c2f8c

          SHA512

          0e1d560a94334e2e37a07779115fa2c0e88178e829d9a6e227b524aad955305f9837b469b1d470ce50387f727db8574af5abe603be2d3cba03eaf3f8d29e4f45

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          fdf5d0b39811177d176ac00bde6cdf46

          SHA1

          0ffe829a8a618398046c3682936b7936f1c5a267

          SHA256

          3636bf542d2a8a5e97322d1101eb1276657808ddc15a0d7f65f48c415e422778

          SHA512

          57068071f50cd179f88e903c9c3575ab28e89e4f22a31ba4ad976820f9c62cca96e0e6ba0be78c2a8e65ee18b4a1f52e1f1bbb030d7b2580532955f84a76fee9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d93f40376e91695180b93aebd4053837

          SHA1

          1032bc102a502f21149ceda3db5240c42b160c78

          SHA256

          00d048285ead70878dd028bf308b2be0130a14dfd130025116bb5a271400aac4

          SHA512

          efe889b6fa3ec2b38f0d1d89967e2d71d882fe638f0cfebc0f4102e9e5156b46d79fedb941a376418bf24a6bb4977df4255ce4672eba10eb5bd61d0c5c6f8c46

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          1bf0a60de331e28595b9f0ff95505b13

          SHA1

          84c929651ee79a7758613cbfa8a77080091296dd

          SHA256

          dabe4870edb308848897860da40dbb64b85dc3fc3e1ab6a5b35a07d7ae99308b

          SHA512

          972b82225272788673fd12f6839295d5702460a6f36645a235ae69859fa67515f7cb683eb409601d1f77486b8df69faa7ea98e68b3702cd3211a045fa3b9965e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ca928cbd708c1b6a2f8f8634ef9db398

          SHA1

          7e6821c065e7c332db12d3f5e2d878edd7d676ef

          SHA256

          cee4e3a228c55135f674d2a18863f3849e7b823450c64c9d49a884a545dae69e

          SHA512

          a0fa652bd38b945d8c8cc73b8b9aea0d7aa07014f3cb05d4228fbfe1f8451125d707e300177fd8fca06136314ceb093efc8425132c45e8e7fca17efc8170c4ca

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          f31c8a0b904bff2727a19fb3100d5899

          SHA1

          e74f1880efd9171e14551c7265fd32ef8ff7951d

          SHA256

          2241ac3e4a8e4250fe6a6fee618b84c665b6e082927b8fd276239c0f1b3e80d8

          SHA512

          75bfe0cd7af1d5acf5e2cefcfb51dad0151162f1595551a635159ddb05ced121630ac65bbb20a124e9c8e077c50d3f053d6aa1ca5278b7731256e2d00a2a1d38

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          08e309883d0d63497f46dab16f0173c9

          SHA1

          7362e6d68888efc088be0fbdccb1818625cda563

          SHA256

          2735a4f9b8c537afd9196e3b3fa0f63cfe56f1adfea251481b69ce8bbaa0d994

          SHA512

          962edee29053e36a040be72e342f9072ec852bcd8d90638c694be1cabc4b868dda77cc242950e9ade80402e83123840f5a702c858b2f1d7d7f4b88746fc844fd

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          379515dd1de5d53f3c9feb839d3f1005

          SHA1

          8a176c56bf60035f975196f20a51655c3fde550a

          SHA256

          00faa16e469e4be17f4fa850ac299422830fea8dade190e2b4714b2abc28e3e0

          SHA512

          1a3c0065c426fa42f8c3f515cbb9e1ecdd41caa0e2634767baf9c5eb4ec566ca4158b496375b6b3f8663de274331a55414739528a053a33f0319619845821508

        • C:\Users\Admin\AppData\Local\Temp\CabB7BC.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\TarBC91.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b