Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 09:49
Behavioral task
behavioral1
Sample
SynapseLauncher.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SynapseLauncher.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
redeem.cmd
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
redeem.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
resethwid.cmd
Resource
win7-20240903-en
General
-
Target
SynapseLauncher.exe
-
Size
4.1MB
-
MD5
7d298245f200fa8fdd2da58830b286fb
-
SHA1
a837c87c6c2c12b8bd1dae3a38bee7468f53907d
-
SHA256
93e4666d53d8437b111de4bbc936183c3ee505cea719d0faa1d650e6d3cd4634
-
SHA512
16f36b8b8577f62faebcc3ab148c877a17c208d8e29eb285d904f47b301f8c26c2227ea299c416f626bd62b1b79358ccda741c8b9054fcf0501e40b89792dee6
-
SSDEEP
98304:Y1bT9OqJzqQ1KtN35Nu7zVFPbCV7aTImb/DXNv8ry4NDDaHN:YZPJm8SN35NMzVFPOQTIm/Nwy4NDC
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ SynapseLauncher.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SynapseLauncher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SynapseLauncher.exe -
resource yara_rule behavioral1/memory/2512-0-0x000000013F5D0000-0x0000000140092000-memory.dmp themida behavioral1/memory/2512-4-0x000000013F5D0000-0x0000000140092000-memory.dmp themida behavioral1/memory/2512-3-0x000000013F5D0000-0x0000000140092000-memory.dmp themida behavioral1/memory/2512-5-0x000000013F5D0000-0x0000000140092000-memory.dmp themida behavioral1/memory/2512-2-0x000000013F5D0000-0x0000000140092000-memory.dmp themida behavioral1/memory/2512-6-0x000000013F5D0000-0x0000000140092000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SynapseLauncher.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2512 SynapseLauncher.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SynapseLauncher.exe"C:\Users\Admin\AppData\Local\Temp\SynapseLauncher.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2512