Analysis
-
max time kernel
113s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02/11/2024, 13:15
Behavioral task
behavioral1
Sample
e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe
Resource
win7-20241023-en
General
-
Target
e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe
-
Size
858KB
-
MD5
c14f74ca3fd57ebb6048b02e61e49930
-
SHA1
3bd40bd93385c0c74ab472499e752415cd0e0ebc
-
SHA256
e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6
-
SHA512
b8222ded355d9041f6ce03b59c8388841e005d02d5f24e1e7f9746d9a365423fa4381555e9502911a496fa3c506bd176de4961059ef338f0da5f53ec3750bdd5
-
SSDEEP
12288:8pJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9F9xkL29vn7/MS9:YJ39LyjbJkQFMhmC+6GD9NkqhTn9
Malware Config
Signatures
-
Detect Neshta payload 6 IoCs
resource yara_rule behavioral2/files/0x0006000000020228-194.dat family_neshta behavioral2/memory/1064-336-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1064-344-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1064-348-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1064-352-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1064-356-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Detected Nirsoft tools 2 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/4868-337-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral2/memory/772-340-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe -
Executes dropped EXE 4 IoCs
pid Process 1948 e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe 4868 ._cache_e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe 2792 Synaptics.exe 772 ._cache_Synaptics.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ ._cache_e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\Windows\SysWOW64\ ._cache_Synaptics.exe -
resource yara_rule behavioral2/files/0x0007000000023ca0-17.dat upx behavioral2/memory/4868-72-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4868-337-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/772-340-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~3\SYNAPT~1\SYNAPT~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1444 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1444 EXCEL.EXE 1444 EXCEL.EXE 1444 EXCEL.EXE 1444 EXCEL.EXE 1444 EXCEL.EXE 1444 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1064 wrote to memory of 1948 1064 e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe 84 PID 1064 wrote to memory of 1948 1064 e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe 84 PID 1064 wrote to memory of 1948 1064 e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe 84 PID 1948 wrote to memory of 4868 1948 e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe 86 PID 1948 wrote to memory of 4868 1948 e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe 86 PID 1948 wrote to memory of 4868 1948 e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe 86 PID 1948 wrote to memory of 2792 1948 e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe 87 PID 1948 wrote to memory of 2792 1948 e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe 87 PID 1948 wrote to memory of 2792 1948 e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe 87 PID 2792 wrote to memory of 772 2792 Synaptics.exe 88 PID 2792 wrote to memory of 772 2792 Synaptics.exe 88 PID 2792 wrote to memory of 772 2792 Synaptics.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe"C:\Users\Admin\AppData\Local\Temp\e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\3582-490\e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\._cache_e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4868
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:772
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1444
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD53b73078a714bf61d1c19ebc3afc0e454
SHA19abeabd74613a2f533e2244c9ee6f967188e4e7e
SHA256ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29
SHA51275959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4
-
C:\Users\Admin\AppData\Local\Temp\._cache_e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe
Filesize64KB
MD58cc6cff43c3c641bdcc89a950f357383
SHA1a254bf05ef1de00706f6bfa9083e18a2a68e6f79
SHA2565a9a0dad900f5d3c90bc78d3ee4bb3f3e6be253732c9199770418048ca7bb0a1
SHA512f121c3cae6209d13874583b4ba05d780d267d4e80e3a738f39e2f671ea40ff57a802d0be3ee88c393f41d1ea34c3a8943d0030884ccd4d186c1efe75a22ab981
-
C:\Users\Admin\AppData\Local\Temp\3582-490\e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe
Filesize818KB
MD5993577f07019db5c36e37e2cd2fc1f7f
SHA183d8a86b03db23619664f53b160979cf87c7319d
SHA2560a3752e2e63b47910a585b464941d847e2fc7159a78780e830d058b1e4e42e98
SHA51203e3a9deffc9e27c16c869649ed348dda7b2917bef7effabeffe35081a0fd328a22932cff318dadf73df7ee679faf3e65440fec1cfd266df747872c0bcd5dd03
-
Filesize
23KB
MD5743d53e1f8eef4e8a7b47daddad9e50e
SHA1efd11084b7104175e1039f1c300a03c19e3fc02b
SHA25605e876ea015de0e73e5775abfa7b2b4a9ed1849c6b75adb664207eeb6cf058d3
SHA5124e3f7465b2d3bb35cd2eee20353e5237a65b8bba0c15d8e9c72a6181d054bd6071f217ee3088c11e70232211bf3014e3c95adea82a782f4aca4dcb76262a812f
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04