Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 09:49
Behavioral task
behavioral1
Sample
SynapseLauncher.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SynapseLauncher.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
redeem.cmd
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
redeem.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
resethwid.cmd
Resource
win7-20240903-en
General
-
Target
resethwid.cmd
-
Size
46B
-
MD5
01860cb9ef68521cb490de8492cddff7
-
SHA1
608399da35b7506a05eb949b8e0778cba937c780
-
SHA256
dbbc8d693171130722551524d75edb17a31221cecfe28755c2e10d7d0ca8256f
-
SHA512
08018e4b9b8902f5dbd73f02864bdd40e467e573f88eaa20530ef2262f1c5fb7ce96a144f8c83ed100fcd00a55ae4dcfacb6210a28ffb6e2bb9ee21fe7466166
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ SynapseLauncher.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SynapseLauncher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SynapseLauncher.exe -
resource yara_rule behavioral5/memory/2668-0-0x000000013FC30000-0x00000001406F2000-memory.dmp themida behavioral5/memory/2668-1-0x000000013FC30000-0x00000001406F2000-memory.dmp themida behavioral5/memory/2668-5-0x000000013FC30000-0x00000001406F2000-memory.dmp themida behavioral5/memory/2668-2-0x000000013FC30000-0x00000001406F2000-memory.dmp themida behavioral5/memory/2668-3-0x000000013FC30000-0x00000001406F2000-memory.dmp themida behavioral5/memory/2668-6-0x000000013FC30000-0x00000001406F2000-memory.dmp themida -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2668 SynapseLauncher.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2668 2400 cmd.exe 31 PID 2400 wrote to memory of 2668 2400 cmd.exe 31 PID 2400 wrote to memory of 2668 2400 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\resethwid.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\SynapseLauncher.exeSynapseLauncher.exe resethwid2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2668
-