Analysis
-
max time kernel
18s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08-08-2024 12:57
Static task
static1
Behavioral task
behavioral1
Sample
SynapseRemake.rar
Resource
win7-20240729-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
SynapseRemake.rar
Resource
win10v2004-20240802-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
SynapseRemake.rar
-
Size
11.0MB
-
MD5
ac75366bfe85cb2f7143fc04aaa58f5a
-
SHA1
653e9722c909631001eb77535bb334b2121ac758
-
SHA256
c0af90e45cb9abf999cdb3edfea4ed212defbee323dc7ec00d03ad6c0df0966d
-
SHA512
c10647e0b5dff5bb76b63f13bd426954f26d07602c0a418968b17b8ae049f9210ff63fe3f52791cfd0bfae399412fcc813e77ca5ffca24d6bb575f46c2db695a
-
SSDEEP
196608:YYu+vjSMgS5axyDVZ0gFPX4Ths+mcNBXy/luvMd9+bAE9F6z4ShBNCDTGFlU8V9a:HuPMgL0AgW52uve9LE9F6kucuk8V9Rxq
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2900 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2640 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2640 AUDIODG.EXE Token: 33 2640 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2640 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1400 wrote to memory of 2900 1400 cmd.exe 30 PID 1400 wrote to memory of 2900 1400 cmd.exe 30 PID 1400 wrote to memory of 2900 1400 cmd.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\SynapseRemake.rar1⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\SynapseRemake.rar2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2900
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2916
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5e41⤵
- Suspicious use of AdjustPrivilegeToken
PID:2640