Analysis
-
max time kernel
59s -
max time network
63s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
03/10/2024, 15:02
General
-
Target
SynapseLauncher.exe
-
Size
4.1MB
-
MD5
7d298245f200fa8fdd2da58830b286fb
-
SHA1
a837c87c6c2c12b8bd1dae3a38bee7468f53907d
-
SHA256
93e4666d53d8437b111de4bbc936183c3ee505cea719d0faa1d650e6d3cd4634
-
SHA512
16f36b8b8577f62faebcc3ab148c877a17c208d8e29eb285d904f47b301f8c26c2227ea299c416f626bd62b1b79358ccda741c8b9054fcf0501e40b89792dee6
-
SSDEEP
98304:Y1bT9OqJzqQ1KtN35Nu7zVFPbCV7aTImb/DXNv8ry4NDDaHN:YZPJm8SN35NMzVFPOQTIm/Nwy4NDC
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ SynapseLauncher.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SynapseLauncher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SynapseLauncher.exe -
resource yara_rule behavioral1/memory/4128-0-0x00007FF7C0A80000-0x00007FF7C1542000-memory.dmp themida behavioral1/memory/4128-2-0x00007FF7C0A80000-0x00007FF7C1542000-memory.dmp themida behavioral1/memory/4128-3-0x00007FF7C0A80000-0x00007FF7C1542000-memory.dmp themida behavioral1/memory/4128-4-0x00007FF7C0A80000-0x00007FF7C1542000-memory.dmp themida behavioral1/memory/4128-5-0x00007FF7C0A80000-0x00007FF7C1542000-memory.dmp themida behavioral1/memory/4128-6-0x00007FF7C0A80000-0x00007FF7C1542000-memory.dmp themida behavioral1/memory/4128-12-0x00007FF7C0A80000-0x00007FF7C1542000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SynapseLauncher.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4128 SynapseLauncher.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4128 SynapseLauncher.exe 4128 SynapseLauncher.exe -
cURL User-Agent 2 IoCs
Uses User-Agent string associated with cURL utility.
description flow ioc HTTP User-Agent header 3 curl/8.4.0-DEV HTTP User-Agent header 4 curl/8.4.0-DEV
Processes
-
C:\Users\Admin\AppData\Local\Temp\SynapseLauncher.exe"C:\Users\Admin\AppData\Local\Temp\SynapseLauncher.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4128