Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-10-2024 23:25
Behavioral task
behavioral1
Sample
5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe
Resource
win7-20240903-en
General
-
Target
5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe
-
Size
868KB
-
MD5
31ce659e1e8cb2bdd2b634332b2195ec
-
SHA1
a2201f5e636d03091950c4e585420227b501ce3f
-
SHA256
5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9
-
SHA512
c5ce587d67f3e1880835061d61b0dc3fe8f6091a2a6038fc966d50995acbe9e9869c71f3f5cdaa4fd6b260a91c6500e0fc5ced90905684abf0510f2f81547839
-
SSDEEP
12288:BpJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V91dNDXBl2CUMS9:nJ39LyjbJkQFMhmC+6GD95DRYn9
Malware Config
Signatures
-
Detect Neshta payload 3 IoCs
Processes:
resource yara_rule behavioral1/files/0x0001000000010314-12.dat family_neshta behavioral1/memory/328-137-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/328-231-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Executes dropped EXE 4 IoCs
Processes:
5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exeSynaptics.exe._cache_Synaptics.exepid Process 2064 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe 2228 ._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe 2684 Synaptics.exe 2600 ._cache_Synaptics.exe -
Loads dropped DLL 13 IoCs
Processes:
5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exeSynaptics.exepid Process 328 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe 328 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe 2064 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe 2064 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe 2064 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe 2064 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe 2064 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe 328 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe 2684 Synaptics.exe 2684 Synaptics.exe 2684 Synaptics.exe 328 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe 328 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe -
Processes:
resource yara_rule behavioral1/files/0x0008000000015d75-23.dat upx behavioral1/memory/2228-37-0x0000000000400000-0x0000000000431000-memory.dmp upx behavioral1/memory/2684-76-0x00000000040F0000-0x0000000004121000-memory.dmp upx behavioral1/memory/2228-136-0x0000000000400000-0x0000000000431000-memory.dmp upx behavioral1/memory/2600-138-0x0000000000400000-0x0000000000431000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
Processes:
5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exedescription ioc Process File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~3\SYNAPT~1\SYNAPT~1.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe -
Drops file in Windows directory 1 IoCs
Processes:
5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exedescription ioc Process File opened for modification C:\Windows\svchost.com 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
EXCEL.EXE5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exeSynaptics.exe._cache_Synaptics.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Processes:
._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe._cache_Synaptics.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TypedURLs ._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TypedURLs ._cache_Synaptics.exe -
Modifies registry class 34 IoCs
Processes:
._cache_Synaptics.exe._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings ._cache_Synaptics.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 ._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff ._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell ._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell ._cache_Synaptics.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 ._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_FolderType = "{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}" ._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewVersion = "0" ._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 ._cache_Synaptics.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg ._cache_Synaptics.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU ._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff ._cache_Synaptics.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 ._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff ._cache_Synaptics.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings ._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff ._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU ._cache_Synaptics.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 ._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" ._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 ._cache_Synaptics.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots ._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots ._cache_Synaptics.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff ._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags ._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff ._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg ._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 ._cache_Synaptics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_FolderType = "{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}" ._cache_Synaptics.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewVersion = "0" ._cache_Synaptics.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f4225481e03947bc34db131e946b44c8dd50000 ._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 9e0000001a00eebbfe23000010007db10d7bd29c934a973346cc89022e7c00002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020002a0000000000efbe7e47b3fbe4c93b4ba2bad3f5d3cd46f98207ba827a5b6945b5d7ec83085f08cc20002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020000000 ._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewID = "{82BA0782-5B7A-4569-B5D7-EC83085F08CC}" ._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewID = "{82BA0782-5B7A-4569-B5D7-EC83085F08CC}" ._cache_Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 660 EXCEL.EXE -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
._cache_Synaptics.exe._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exepid Process 2600 ._cache_Synaptics.exe 2228 ._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
._cache_Synaptics.exe._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exeEXCEL.EXEpid Process 2600 ._cache_Synaptics.exe 2228 ._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe 660 EXCEL.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exeSynaptics.exedescription pid Process procid_target PID 328 wrote to memory of 2064 328 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe 30 PID 328 wrote to memory of 2064 328 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe 30 PID 328 wrote to memory of 2064 328 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe 30 PID 328 wrote to memory of 2064 328 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe 30 PID 2064 wrote to memory of 2228 2064 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe 31 PID 2064 wrote to memory of 2228 2064 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe 31 PID 2064 wrote to memory of 2228 2064 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe 31 PID 2064 wrote to memory of 2228 2064 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe 31 PID 2064 wrote to memory of 2684 2064 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe 32 PID 2064 wrote to memory of 2684 2064 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe 32 PID 2064 wrote to memory of 2684 2064 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe 32 PID 2064 wrote to memory of 2684 2064 5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe 32 PID 2684 wrote to memory of 2600 2684 Synaptics.exe 33 PID 2684 wrote to memory of 2600 2684 Synaptics.exe 33 PID 2684 wrote to memory of 2600 2684 Synaptics.exe 33 PID 2684 wrote to memory of 2600 2684 Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe"C:\Users\Admin\AppData\Local\Temp\5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe"C:\Users\Admin\AppData\Local\Temp\._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2228
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2600
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:660
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD5cf6c595d3e5e9667667af096762fd9c4
SHA19bb44da8d7f6457099cb56e4f7d1026963dce7ce
SHA256593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d
SHA512ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80
-
C:\Users\Admin\AppData\Local\Temp\._cache_5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe
Filesize74KB
MD550fa0999fdcb73093fd97baeb588da63
SHA1aee58afbdb9728b7229d68face88d22f0c489b71
SHA256eefdef80e5a5fdfe4fede76fb38f389e43aaea2029f76867951c1cb309fd0089
SHA5124fcca37d3c566a3c81d0ac9d25942f85813b553f55acea3d70ebe7e3d6ba98fd5540edcd35eca72dccb700142b50477c6ec0021702c72c7569e17a0887b76e21
-
Filesize
21KB
MD5a1b56d1adc1216a182bea6f3497228e6
SHA1784916969c067920e26f3258b1830c677c1b51e0
SHA256f4934b470dd06fb2515026b559f21618073afeef5a2ca76272f46fe8b5a678c1
SHA5120810fed30ab624c2cd46ebeb1202f3c5ff315ced43924846e418d33b5ff9002c328b68788c8aec33b60be6fd7860bd453849af1df0f40b9f788761064e6ab6d4
-
Filesize
25KB
MD51daa557f381974584e17766f8738fe59
SHA12ead12f2560bc0df78f71e406a3bcc01b87fab3e
SHA2567b96b4a7d546fe62213daa58e9e4d72bfb259c3064c88146f7c9faf11a00dd86
SHA5128301a93e2a43b19b6fc468004a2218380b58b32dcd46f097c60f665b94ba73bed7dcb98a56db58294ae39368496bdf67870b3c4ca02a58f1d90bf5dfe998767a
-
Filesize
23KB
MD5ce693ee87407c47a2334419e4cbbac4b
SHA1fa573dff59577d2d4bb54202153383ef6f3516a2
SHA2561c09322849d6d8cba34f747e6aee5dfda7e53c4268f4f9472b37a5b95eb7bf0e
SHA512860bac2cf047c258f2ff856373e230840e0cbc27f4e7c7fbe3fa0f4ac5e7bc0ca3a11ffade7ec1bc872ae1e7d26b2ab99b9cefbf2c8875bacecdea13caec63c0
-
Filesize
21KB
MD51b980332558102741049ed882d3890f7
SHA187d39d68af1853babe9f16ed3d5c91f87a81a9b0
SHA256d408e6b91a2bb99ff152cfedc39fbb7a1c0003d8b2791f45bed8d75f46ae5cda
SHA512cfde0d327b11d4c96f1f3a3c27af5687c973ec960c01c8a5e1c9610215660c2e6a2d0bb25bb088dc24996a1273aa83bcccbbfe8a1968a4fd3cf1385ffcfd2d34
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
26KB
MD578e0f05dec058ebb60e38dfd22341995
SHA1188409eeedd62f2753b2dc94748cafbd6f6938e6
SHA256e2d59da23ad83244e537529e94b2a67e60257746c3ae5a6b67f7a19d8342d2d2
SHA51209cc6ac3419a0767cd8b385261005d1768b1ea660938abe91b32e6d423e6c3167fb5b85dccec71e9e218a31b78a5d76f847881522d223a62b9a120f91672a754
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
\Users\Admin\AppData\Local\Temp\3582-490\5cba7c1d08dcf2912a5abb0d0dc2bfec46138a7a628df9e025ba9a4eaf1eb5a9.exe
Filesize828KB
MD57d5724acae0035a43ce2e1dbd26ad922
SHA1983f2ad2a4ba4a583642d60fd38037037a11145f
SHA2561c64ef3803d7117182aa028dcae107a4f37af2662df8b7935ecf5cd99b75b948
SHA51204d524c750d9d54ca1336361fab53c33ebcd1a625363546e1d0e1603db43c9854ca7325ac1e00da81a4e5853aae4c98d0caf148752411ab0663990b5eb6cc695