Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
359s -
max time network
359s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 14:51
Static task
static1
Behavioral task
behavioral1
Sample
Synapse X.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Synapse X.exe
Resource
win10v2004-20240802-en
General
-
Target
Synapse X.exe
-
Size
374KB
-
MD5
b69c13e0099df6821ba000cb9d39819b
-
SHA1
6a36cf9a4a9ff90f8ddf21f62db94ef2691b85ee
-
SHA256
cbff32a11e742c778f5d2d94da6699af7302ec751111b06c37f665768eaf2d02
-
SHA512
0c7b4d42f46a04574d8adf6d6149e0a81bc4cbafcb2e46557b0bd083f82fdd8dbf7cc166ee0da1cdf5048605f0e83f50a1e064a5c581a97b1aefc4533d9954bb
-
SSDEEP
6144:H83Kwo3BjOALaQIigh4f86OZUjUKnmuv9uVYwEHCnGuBt+1:Hxz7r86h0uv8V5nxj+1
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 pastebin.com 4 pastebin.com -
Program crash 1 IoCs
pid pid_target Process procid_target 1744 2012 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synapse X.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2012 Synapse X.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1744 2012 Synapse X.exe 31 PID 2012 wrote to memory of 1744 2012 Synapse X.exe 31 PID 2012 wrote to memory of 1744 2012 Synapse X.exe 31 PID 2012 wrote to memory of 1744 2012 Synapse X.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Synapse X.exe"C:\Users\Admin\AppData\Local\Temp\Synapse X.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2012 -s 27282⤵
- Program crash
PID:1744
-