Analysis
-
max time kernel
140s -
max time network
137s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
14/09/2024, 08:42
Behavioral task
behavioral1
Sample
SynapseLauncher.exe
Resource
win10-20240404-en
5 signatures
150 seconds
General
-
Target
SynapseLauncher.exe
-
Size
4.1MB
-
MD5
7d298245f200fa8fdd2da58830b286fb
-
SHA1
a837c87c6c2c12b8bd1dae3a38bee7468f53907d
-
SHA256
93e4666d53d8437b111de4bbc936183c3ee505cea719d0faa1d650e6d3cd4634
-
SHA512
16f36b8b8577f62faebcc3ab148c877a17c208d8e29eb285d904f47b301f8c26c2227ea299c416f626bd62b1b79358ccda741c8b9054fcf0501e40b89792dee6
-
SSDEEP
98304:Y1bT9OqJzqQ1KtN35Nu7zVFPbCV7aTImb/DXNv8ry4NDDaHN:YZPJm8SN35NMzVFPOQTIm/Nwy4NDC
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ SynapseLauncher.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SynapseLauncher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SynapseLauncher.exe -
resource yara_rule behavioral1/memory/5052-0-0x00007FF729DC0000-0x00007FF72A882000-memory.dmp themida behavioral1/memory/5052-2-0x00007FF729DC0000-0x00007FF72A882000-memory.dmp themida behavioral1/memory/5052-3-0x00007FF729DC0000-0x00007FF72A882000-memory.dmp themida behavioral1/memory/5052-4-0x00007FF729DC0000-0x00007FF72A882000-memory.dmp themida behavioral1/memory/5052-5-0x00007FF729DC0000-0x00007FF72A882000-memory.dmp themida behavioral1/memory/5052-6-0x00007FF729DC0000-0x00007FF72A882000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SynapseLauncher.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5052 SynapseLauncher.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SynapseLauncher.exe"C:\Users\Admin\AppData\Local\Temp\SynapseLauncher.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5052