Analysis

  • max time kernel
    140s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:31

General

  • Target

    syncthing-windows-setup.exe

  • Size

    3.7MB

  • MD5

    9ac7470154151f6d67926639f15d72e3

  • SHA1

    059f0de27fabb460e678aa18cc6c40fb814a96b5

  • SHA256

    6beef08b1b5b225dd5ff070e0f8d1f9aad5263e90f117f3f95547a5a14df3284

  • SHA512

    6feccf7ce61fdd1c2c2d50dbe046832ae59f8ab1ecba1aa212e3d4b7967e7a78a56c4ee89d696a900e689ef2190b1e6ae7aee037842f21aefe5a86cbb3f8de2a

  • SSDEEP

    98304:XwREiz3fO8eBdQcc0+jyKKwCgS1r7FWkIdMwZgp:liTPeBiVyKCr7IkOO

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\syncthing-windows-setup.exe
    "C:\Users\Admin\AppData\Local\Temp\syncthing-windows-setup.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Users\Admin\AppData\Local\Temp\is-E01OG.tmp\syncthing-windows-setup.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-E01OG.tmp\syncthing-windows-setup.tmp" /SL5="$30150,2951354,845824,C:\Users\Admin\AppData\Local\Temp\syncthing-windows-setup.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\is-E01OG.tmp\syncthing-windows-setup.tmp

    Filesize

    3.2MB

    MD5

    6a670562f7e78ccce81af4e9cbdb4a33

    SHA1

    ef79c3a41fed18da68389572d9d7147bcddc6ea5

    SHA256

    afcfc1e6b8d895e1eccba59f1bc25066803a50af93b4c5f564efd327f51bbe06

    SHA512

    aa01759f229f78097200839e2bd6d60157e1912eab4a420e555f83d2edee558bfb4ef35eefcf1eea6b50ae36b3f77cf53a87fc54a270602f27915c38d328f96f

  • memory/2520-8-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/2520-9-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/2520-10-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/2520-13-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/2520-12-0x00000000008F0000-0x0000000000C33000-memory.dmp

    Filesize

    3.3MB

  • memory/2968-2-0x0000000000871000-0x0000000000919000-memory.dmp

    Filesize

    672KB

  • memory/2968-0-0x0000000000870000-0x000000000094C000-memory.dmp

    Filesize

    880KB

  • memory/2968-11-0x0000000000870000-0x000000000094C000-memory.dmp

    Filesize

    880KB